Static task
static1
Behavioral task
behavioral1
Sample
f19d759d7057dc9fbadf3b1d98aed69716061b10354b25c5dad1a93ebdf6dddd.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
f19d759d7057dc9fbadf3b1d98aed69716061b10354b25c5dad1a93ebdf6dddd.exe
Resource
win10v2004-20220901-en
General
-
Target
f19d759d7057dc9fbadf3b1d98aed69716061b10354b25c5dad1a93ebdf6dddd
-
Size
491KB
-
MD5
3c357dc5993f5f464ad0e9fa5f5a0576
-
SHA1
f2ada7f5a0589dd9b96ea7a840d5ba55d6aca36b
-
SHA256
f19d759d7057dc9fbadf3b1d98aed69716061b10354b25c5dad1a93ebdf6dddd
-
SHA512
fecce0763305b864107db10e6dde5d577856be1de588d0fc42880b4c20a1d340435781ef57b9ae6a0742634dbabbcb679ed4915c91e2bf71899cffe8a581690e
-
SSDEEP
12288:aDkZdzvMaqfrxsdEiCnpFwxMnC4W7s60I0ZfP:aDkjoaqfr1pqxM4s9Zn
Malware Config
Signatures
Files
-
f19d759d7057dc9fbadf3b1d98aed69716061b10354b25c5dad1a93ebdf6dddd.exe windows x86
03557481bc3b99c7677b9a5bc55cb9e1
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
DosDateTimeToFileTime
GetPrivateProfileStringA
GetCurrentProcess
LocalFileTimeToFileTime
SetFileTime
MoveFileExA
SetFilePointer
WriteFile
MoveFileA
GetFileAttributesA
lstrcmpA
SetEndOfFile
lstrcpynA
GetLocalTime
SetCurrentDirectoryA
GetDriveTypeA
GetDiskFreeSpaceA
CreateDirectoryA
GetLastError
GetCurrentThread
GetCurrentDirectoryA
GlobalReAlloc
FileTimeToLocalFileTime
GetFileTime
FileTimeToDosDateTime
GetPrivateProfileSectionA
SetFileAttributesA
DeleteFileA
FindNextFileA
FindClose
WinExec
Sleep
GetModuleFileNameA
GetSystemDefaultLCID
MulDiv
GetWindowsDirectoryA
GetTickCount
lstrcatA
lstrcmpiA
lstrlenA
lstrcpyA
CreateFileA
GetFileSize
GlobalAlloc
CloseHandle
GlobalLock
ReadFile
GlobalUnlock
GetModuleHandleA
GetSystemInfo
FindResourceA
LoadResource
SizeofResource
FreeResource
LockResource
OpenFile
_hwrite
_lclose
GetVersion
IsDBCSLeadByte
GetSystemDirectoryA
WriteProfileSectionA
WritePrivateProfileSectionA
WritePrivateProfileStringA
GlobalCompact
WriteProfileStringA
GetFileType
LCMapStringA
GetProfileSectionA
GlobalHandle
SetErrorMode
GlobalFree
LoadLibraryA
GetProcAddress
FreeLibrary
FindFirstFileA
RemoveDirectoryA
RtlUnwind
GetStdHandle
SetHandleCount
GetOEMCP
GetACP
GetCPInfo
WideCharToMultiByte
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
MultiByteToWideChar
FreeEnvironmentStringsA
UnhandledExceptionFilter
TerminateProcess
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
GetSystemTime
GetTimeZoneInformation
ExitProcess
GetCommandLineA
GetStartupInfoA
HeapFree
HeapAlloc
LCMapStringW
GetStringTypeA
GetStringTypeW
CompareStringA
CompareStringW
SetEnvironmentVariableA
HeapReAlloc
user32
SetDlgItemTextA
LoadStringA
MessageBoxA
EndDialog
DialogBoxParamA
wsprintfA
PeekMessageA
SendDlgItemMessageA
BeginPaint
EndPaint
DefWindowProcA
LoadCursorA
GetClassInfoA
OemToCharA
KillTimer
PostQuitMessage
RegisterClassA
GetSysColor
IsDialogMessageA
CharLowerA
CreateWindowExA
EnableWindow
GetWindow
GetClassNameA
CharUpperA
GetWindowTextA
GetDlgItem
SendMessageA
PostMessageA
SetWindowTextA
GetSystemMetrics
SetWindowPos
ShowWindow
UpdateWindow
SetFocus
IsWindow
RegisterWindowMessageA
GetDC
ReleaseDC
ScreenToClient
SetTimer
LoadIconA
DestroyWindow
LoadBitmapA
CreateDialogParamA
InvalidateRect
IsWindowVisible
CharNextA
InflateRect
CharPrevA
CharToOemA
DdeGetData
DdeFreeDataHandle
DdeConnect
DdeClientTransaction
DdeGetLastError
DdeDisconnect
DdeFreeStringHandle
DdeUninitialize
DdeInitializeA
DdeCreateStringHandleA
ExitWindowsEx
FindWindowA
GetClientRect
FillRect
SetRect
SetRectEmpty
GetWindowLongA
GetWindowRect
DispatchMessageA
TranslateMessage
MessageBeep
gdi32
CreateDIBitmap
SelectPalette
GetDeviceCaps
CreatePalette
GetSystemPaletteEntries
LineTo
MoveToEx
DeleteObject
CreatePen
CreateFontIndirectA
GetObjectA
DeleteDC
BitBlt
CreateCompatibleDC
RestoreDC
Rectangle
GetStockObject
CreateSolidBrush
IntersectClipRect
SaveDC
CreateCompatibleBitmap
SetBkColor
CreateBitmap
SetPixel
GetTextExtentPointA
SelectObject
RealizePalette
comdlg32
GetOpenFileNameA
GetSaveFileNameA
advapi32
AllocateAndInitializeSid
RegCloseKey
RegConnectRegistryA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
CloseServiceHandle
OpenSCManagerA
FreeSid
RegCreateKeyExA
SetSecurityDescriptorOwner
InitializeSecurityDescriptor
RegOpenKeyA
RegDeleteKeyA
RegEnumKeyA
RegSetValueExA
RegQueryValueExA
RegDeleteValueA
RegEnumValueA
EqualSid
GetTokenInformation
OpenThreadToken
shell32
SHGetSpecialFolderLocation
SHGetPathFromIDListA
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
Sections
.text Size: 125KB - Virtual size: 124KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 14KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 152KB - Virtual size: 151KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vmp0 Size: 192KB - Virtual size: 496KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE