Static task
static1
Behavioral task
behavioral1
Sample
1a1354dfa543dc52472656891cd100e61f1a4e3cb1b6f9ed224286372182522c.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
1a1354dfa543dc52472656891cd100e61f1a4e3cb1b6f9ed224286372182522c.exe
Resource
win10v2004-20220812-en
General
-
Target
1a1354dfa543dc52472656891cd100e61f1a4e3cb1b6f9ed224286372182522c
-
Size
901KB
-
MD5
676e41b36a4ffa1c154575675ff0aeac
-
SHA1
c954909b245a27fa846e41a98841195e0b4f6163
-
SHA256
1a1354dfa543dc52472656891cd100e61f1a4e3cb1b6f9ed224286372182522c
-
SHA512
61f6d523d5ed7564ffeec15ed3a186bcf8e0c07462f8643df6a81487b35c5b56466e38e5d80a2ca53935d10622e30775df04d9e68c76d6da81bbe74255138129
-
SSDEEP
12288:hQt+Le2pQtF6o1RrR9/ESZ574zMAO6pVuZtMM3:CYJo1lR9/ES38zMAO6pVuZ
Malware Config
Signatures
Files
-
1a1354dfa543dc52472656891cd100e61f1a4e3cb1b6f9ed224286372182522c.exe windows x86
d312ecaad52b935cff45328012316244
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetSystemTime
GetProcAddress
lstrlenA
WriteFile
WinExec
WaitForMultipleObjects
SystemTimeToFileTime
Sleep
SetFilePointer
SetErrorMode
SetEndOfFile
ReadFile
QueryPerformanceCounter
LeaveCriticalSection
IsDBCSLeadByte
InitializeCriticalSection
GlobalUnlock
GlobalLock
GlobalFree
GlobalAlloc
GetVersionExA
GetTimeZoneInformation
GetModuleHandleW
GetStartupInfoA
GetModuleHandleA
LoadLibraryA
GetModuleFileNameA
GetFileSize
GetCommandLineA
GetCPInfo
GetACP
ExitThread
ExitProcess
EnterCriticalSection
DeleteFileA
DeleteCriticalSection
CreateThread
CreateProcessA
CreateFileA
CopyFileA
CloseHandle
VirtualAllocEx
user32
TranslateMessage
UpdateWindow
WindowFromPoint
TranslateAcceleratorA
TrackPopupMenu
ShowWindow
SetWindowPos
SetWindowLongA
SetTimer
SetMenu
SetFocus
SetDlgItemTextA
SetCursor
SetClipboardData
SetCapture
ScreenToClient
ReleaseDC
ReleaseCapture
RegisterClassA
PostQuitMessage
PostMessageA
OpenClipboard
MessageBoxA
MapVirtualKeyA
LoadStringA
LoadMenuA
LoadIconA
LoadAcceleratorsA
KillTimer
IsWindow
InvalidateRect
GetWindowTextLengthA
GetWindowRect
GetWindowLongA
GetWindow
GetSubMenu
GetMessageA
GetMenu
GetKeyState
GetFocus
GetDlgItemTextA
GetDlgItem
GetDesktopWindow
GetDC
GetCursorPos
GetClipboardData
GetClientRect
GetCapture
FillRect
EndPaint
EndDialog
EnableWindow
EnableMenuItem
EmptyClipboard
DispatchMessageA
DialogBoxParamA
DestroyWindow
DestroyMenu
DeleteMenu
DefWindowProcA
DdeUninitialize
DdeInitializeA
DdeFreeStringHandle
DdeDisconnect
DdeCreateStringHandleA
DdeConnect
DdeClientTransaction
CreateWindowExA
CloseClipboard
ClientToScreen
CheckMenuItem
BeginPaint
LoadCursorA
MoveWindow
gdi32
DeleteDC
DeleteObject
EndDoc
EndPage
EndPath
EnumFontFamiliesA
ExtCreatePen
ExtTextOutA
FillPath
GdiFlush
GetBkColor
GetBkMode
GetClipBox
GetClipRgn
GetDeviceCaps
GetObjectA
DPtoLP
GetTextAlign
GetTextColor
GetTextExtentPoint32A
GetTextMetricsA
IntersectClipRect
LPtoDP
LineTo
MoveToEx
PolyBezierTo
RealizePalette
RestoreDC
SaveDC
SelectClipPath
SelectClipRgn
SelectObject
SelectPalette
CreateSolidBrush
CreateRectRgn
CreatePen
CreatePalette
CreateFontIndirectA
CreateDIBSection
CreateCompatibleDC
CreateCompatibleBitmap
BitBlt
BeginPath
GetSystemPaletteEntries
CreateMetaFileW
StrokePath
StretchDIBits
StartPage
StartDocA
SetTextColor
SetTextAlign
SetPolyFillMode
SetDIBitsToDevice
SetBkMode
SetBkColor
comdlg32
PrintDlgA
GetOpenFileNameA
GetSaveFileNameA
advapi32
RegCreateKeyA
RegSetValueExA
RegSetValueA
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
RegQueryValueA
shell32
DragAcceptFiles
DragQueryFileA
Sections
.text Size: 643KB - Virtual size: 642KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
63 Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
62 Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
61 Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
60 Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
59 Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
58 Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
57 Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
56 Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
55 Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
54 Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
53 Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
52 Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
51 Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
5 Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 77KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ