Static task
static1
Behavioral task
behavioral1
Sample
5fa1c413d07f3b1b01b9b1d624398816b7a9eb7aa98e087102b7650d79ea7fcd.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5fa1c413d07f3b1b01b9b1d624398816b7a9eb7aa98e087102b7650d79ea7fcd.exe
Resource
win10v2004-20221111-en
General
-
Target
5fa1c413d07f3b1b01b9b1d624398816b7a9eb7aa98e087102b7650d79ea7fcd
-
Size
218KB
-
MD5
67297ac2eb5ca5109fbdaaa25e29d106
-
SHA1
6fd85eb43fe2018f14aa4ee0ed5e9e858b704cef
-
SHA256
5fa1c413d07f3b1b01b9b1d624398816b7a9eb7aa98e087102b7650d79ea7fcd
-
SHA512
af4244cce17db87f25fc3f73c4c50b481c4742eccf8a45cf8c864c9da501ab5f4b0460019e5d01f6135d612b67542c7c0c3b35e5058f69b69e92b913f84101bb
-
SSDEEP
3072:Yo9AZDnvJ0XIScJAylaW+MxQtIudqhDkQKky5ixgEfZd3b47GbrDHgr9smr:S6B07lrVuCwQJyLEfZdWGTAJs
Malware Config
Signatures
Files
-
5fa1c413d07f3b1b01b9b1d624398816b7a9eb7aa98e087102b7650d79ea7fcd.exe windows x86
edd163cb8dbfa1910fb0da96cb92a22f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
hccutils
LoadIMAGE
LoadBITMAP
FindResources
LoadSTRING
kernel32
MultiByteToWideChar
WideCharToMultiByte
lstrlenW
RaiseException
InitializeCriticalSection
DeleteCriticalSection
InterlockedIncrement
lstrlenA
lstrcmpiA
GetModuleFileNameA
IsDBCSLeadByte
SizeofResource
LoadResource
FindResourceA
LoadLibraryExA
CreateMutexA
GetCurrentThreadId
GetCommandLineA
Sleep
WriteConsoleA
SetStdHandle
GetConsoleMode
GetConsoleCP
SetFilePointer
InterlockedDecrement
GetStringTypeW
GetStringTypeA
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
HeapSize
GetSystemInfo
WriteFile
HeapCreate
HeapDestroy
VirtualFree
ExitProcess
LCMapStringW
LCMapStringA
CreateEventA
GetLastError
CloseHandle
GetVersionExA
LoadLibraryA
FreeLibrary
GetProcAddress
GetModuleHandleA
GetConsoleOutputCP
WriteConsoleW
CreateFileA
FlushFileBuffers
RtlUnwind
HeapAlloc
HeapFree
VirtualProtect
VirtualAlloc
GetStdHandle
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
SetLastError
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetOEMCP
GetCPInfo
GetStartupInfoA
GetProcessHeap
HeapReAlloc
VirtualQuery
GetCurrentProcess
TerminateProcess
LocalFree
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
LeaveCriticalSection
EnterCriticalSection
user32
SendMessageA
SetWindowLongA
FindWindowA
DestroyMenu
UnregisterClassA
wsprintfA
GetWindowLongA
GetCursorPos
CharNextA
RegisterWindowMessageA
IsWindow
CreateDialogParamA
ShowWindow
PostQuitMessage
GetDC
GetSystemMetrics
ReleaseDC
SetTimer
DestroyIcon
KillTimer
CreatePopupMenu
AppendMenuA
SetForegroundWindow
TrackPopupMenu
DestroyWindow
GetDlgItem
DefWindowProcA
GetDesktopWindow
GetWindowRect
SetWindowTextA
RegisterClassA
CreateWindowExA
PostMessageA
GetMessageA
DispatchMessageA
PostThreadMessageA
gdi32
CreateCompatibleBitmap
SelectObject
SetBkColor
BitBlt
SetTextColor
DeleteDC
DeleteObject
GetDIBits
CreateCompatibleDC
advapi32
RegQueryInfoKeyA
RegSetValueExA
RegCreateKeyExA
RegDeleteValueA
RegDeleteKeyA
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
RegEnumKeyExA
shell32
Shell_NotifyIconA
ole32
CoCreateInstance
CoTaskMemFree
CoRegisterClassObject
CoTaskMemAlloc
CoRevokeClassObject
StringFromGUID2
CoTaskMemRealloc
CoSuspendClassObjects
CoUninitialize
CoInitialize
CLSIDFromProgID
oleaut32
VarUI4FromStr
RegisterTypeLi
UnRegisterTypeLi
LoadTypeLi
SysAllocString
SysStringLen
SysFreeString
SysStringByteLen
SysAllocStringByteLen
VariantClear
Sections
.text Size: 96KB - Virtual size: 93KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 20KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 16KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.yrdata Size: 72KB - Virtual size: 72KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE