Static task
static1
Behavioral task
behavioral1
Sample
46ed5d053293db481b375a55645288178ac0601310849e7da6d3a56060f6e10c.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
46ed5d053293db481b375a55645288178ac0601310849e7da6d3a56060f6e10c.exe
Resource
win10v2004-20221111-en
General
-
Target
46ed5d053293db481b375a55645288178ac0601310849e7da6d3a56060f6e10c
-
Size
622KB
-
MD5
5a99c21e8f21c3c13dd1cd94aad93946
-
SHA1
cd0f38d082e567e65df67be18fa457f8dcd985d2
-
SHA256
46ed5d053293db481b375a55645288178ac0601310849e7da6d3a56060f6e10c
-
SHA512
5d251bf46562c15f1d5103fdbe296d33333dd46aa4268c6125fc90beaffcf7c6c04850be3231d682e791e068c92951ce70dbf3d8d749bc2c7bf71b793be1bd11
-
SSDEEP
12288:qVBlOya1zPn4B5xMT5RZmG2EuvUO4pgRKYuake:6BlY1zwBU5RYG2PMO4pgRKYj
Malware Config
Signatures
Files
-
46ed5d053293db481b375a55645288178ac0601310849e7da6d3a56060f6e10c.exe windows x86
be1f8efc097bac17fe494d3fb3be0827
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
ImageList_GetIcon
ImageList_Duplicate
ImageList_Remove
ImageList_Read
ImageList_GetBkColor
InitCommonControlsEx
ImageList_DragLeave
ImageList_DragMove
CreateToolbar
ImageList_GetIconSize
ImageList_Create
ImageList_Add
ImageList_Destroy
gdi32
StrokeAndFillPath
SetBrushOrgEx
wininet
InternetCrackUrlW
kernel32
GetCPInfo
LeaveCriticalSection
HeapSize
LCMapStringW
TlsGetValue
GetEnvironmentStrings
UnhandledExceptionFilter
HeapCreate
GetCurrentThread
SetLastError
TlsAlloc
QueryPerformanceCounter
RtlUnwind
WideCharToMultiByte
GetTimeFormatA
TlsFree
HeapDestroy
SetEnvironmentVariableA
ReadConsoleOutputCharacterW
LCMapStringA
EnumResourceNamesA
GetStartupInfoW
GetModuleFileNameW
VirtualFree
GetProfileStringA
FlushFileBuffers
DeleteCriticalSection
GetStdHandle
lstrcpyW
EnumSystemLocalesA
GetACP
SetTimeZoneInformation
InterlockedExchange
GetCurrentThreadId
SetStdHandle
SetFilePointer
TerminateProcess
VirtualAlloc
GetFileType
GetOEMCP
VirtualQuery
HeapAlloc
GetUserDefaultLCID
GetVersionExA
LoadLibraryA
GetEnvironmentStringsW
GetCommandLineA
GetSystemTimeAsFileTime
FreeEnvironmentStringsA
GetModuleFileNameA
GetStringTypeW
IsValidCodePage
SuspendThread
VirtualProtect
ReadFile
GetStartupInfoA
GetLastError
GetProcAddress
FreeLibraryAndExitThread
GetLongPathNameW
MultiByteToWideChar
EnterCriticalSection
CreateMutexA
GetTimeZoneInformation
SetHandleCount
GetSystemInfo
GetStringTypeA
GetLocaleInfoW
GetCurrentProcess
VirtualFreeEx
ExpandEnvironmentStringsW
IsValidLocale
HeapReAlloc
CompareStringA
GlobalLock
GetDateFormatA
FreeEnvironmentStringsW
GetCurrencyFormatW
GetLocaleInfoA
GetTickCount
CloseHandle
ExitProcess
GetCommandLineW
InitializeCriticalSection
CompareStringW
IsBadWritePtr
TlsSetValue
OpenMutexA
GetModuleHandleA
WriteFile
GetCurrentProcessId
HeapFree
comdlg32
ChooseFontW
user32
RegisterClassExA
GetTopWindow
SendMessageTimeoutA
BeginPaint
RegisterClassA
Sections
.text Size: 380KB - Virtual size: 380KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 58KB - Virtual size: 78KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 115KB - Virtual size: 114KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 67KB - Virtual size: 66KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ