Static task
static1
Behavioral task
behavioral1
Sample
554c6dfb5d25630a6b60ce84e170d66866ea5c798f6bad2634cfb774589b7b31.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
554c6dfb5d25630a6b60ce84e170d66866ea5c798f6bad2634cfb774589b7b31.exe
Resource
win10v2004-20221111-en
General
-
Target
554c6dfb5d25630a6b60ce84e170d66866ea5c798f6bad2634cfb774589b7b31
-
Size
192KB
-
MD5
771f2feec49f6d8815fd7cd005d880bd
-
SHA1
7d5c8f144f2a3feb45fea178ac864525d21e293f
-
SHA256
554c6dfb5d25630a6b60ce84e170d66866ea5c798f6bad2634cfb774589b7b31
-
SHA512
3b54ddacb1f7e2d26db3bd9112b9cd0208a3b8ec124c90b1fd455540ce384c9f1550a23a685b9597190ea65af32880589e5fbd8abf7c2d79fd87da05aaafd59f
-
SSDEEP
3072:S/gplVCnZbPsNrGsYN+81JOXByVHxa0FllH4a7T8pHwWpI:SwVM5rF6ExLlZx7T8Pa
Malware Config
Signatures
Files
-
554c6dfb5d25630a6b60ce84e170d66866ea5c798f6bad2634cfb774589b7b31.exe windows x86
c4d17b5fba8536a5d607d40398f8b1c3
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualLock
GetConsoleInputExeNameA
GetTimeFormatA
GetFileAttributesA
TerminateJobObject
CreateDirectoryExA
GetTempPathA
WaitForSingleObject
LockFile
BeginUpdateResourceA
VirtualAllocEx
CopyFileExW
GetProcessHeap
GetProcessId
GetConsoleAliasA
VirtualAlloc
GetProcessVersion
ReadConsoleInputA
ReleaseSemaphore
GlobalFlags
GetThreadLocale
OpenProcess
QueryDosDeviceA
PeekConsoleInputA
DeleteAtom
GetConsoleAliasExesLengthA
GetTapeStatus
GetThreadContext
GetAtomNameA
GetConsoleOutputCP
IsProcessorFeaturePresent
SetStdHandle
CopyFileExA
GetFileAttributesExA
HeapQueryInformation
GetFileType
ReadConsoleInputA
EnumSystemLocalesA
SetConsoleHardwareState
OpenWaitableTimerA
TransmitCommChar
GetComputerNameA
VirtualFreeEx
GlobalDeleteAtom
HeapDestroy
GetPrivateProfileSectionNamesA
SleepEx
GetDefaultCommConfigA
SetCurrentDirectoryA
GetProcessTimes
WriteConsoleOutputAttribute
GetStringTypeExA
GetWindowsDirectoryA
Module32First
DisconnectNamedPipe
UnlockFile
GetComputerNameExA
SetFirmwareEnvironmentVariableA
GetSystemDefaultLCID
GetDllDirectoryA
GetCommTimeouts
VirtualQueryEx
GetShortPathNameA
WriteConsoleOutputCharacterA
GetDevicePowerState
GetDiskFreeSpaceA
GlobalGetAtomNameA
OpenThread
GetProcessIoCounters
GetConsoleAliasesLengthA
WriteProcessMemory
GetNamedPipeInfo
GetSystemWindowsDirectoryA
GetCurrentThreadId
secur32
TranslateNameW
user32
GetListBoxInfo
SetSysColorsTemp
CallMsgFilter
CheckMenuRadioItem
SetWindowsHookA
MonitorFromRect
GrayStringA
EnableScrollBar
CharLowerA
MessageBoxExA
FrameRect
ToAsciiEx
SetInternalWindowPos
GetLayeredWindowAttributes
DefWindowProcA
MapVirtualKeyExW
DrawCaptionTempA
CharLowerBuffA
EndDialog
CopyAcceleratorTableA
ChangeDisplaySettingsA
PrivateExtractIconExA
RegisterUserApiHook
SetWinEventHook
CharLowerBuffW
GetMenuCheckMarkDimensions
CreateDialogIndirectParamA
UnregisterClassA
SendMessageCallbackA
DrawMenuBarTemp
ClientToScreen
GetDlgItemTextA
SetShellWindow
SetDoubleClickTime
SetRect
RegisterTasklist
CalcMenuBar
GetDlgCtrlID
DlgDirListA
CloseWindowStation
GetClassInfoExA
LockWorkStation
GetInputState
GetClassNameA
SetMessageQueue
SetShellWindowEx
RegisterRawInputDevices
LoadKeyboardLayoutA
CharLowerA
IntersectRect
LoadIconA
GetDlgCtrlID
ScrollWindow
DlgDirListA
SetScrollInfo
SendMessageCallbackA
DisableProcessWindowsGhosting
GetClientRect
SetWindowsHookExW
SetCursorPos
RegisterClassExA
GetRawInputData
CreateMDIWindowA
DialogBoxIndirectParamA
RegisterHotKey
SetDoubleClickTime
GetClipboardSequenceNumber
SendIMEMessageExA
LoadAcceleratorsA
SetCursorPos
LoadKeyboardLayoutEx
GetMenuItemInfoA
DestroyAcceleratorTable
RegisterRawInputDevices
SendMessageCallbackA
MenuItemFromPoint
GetWindowTextLengthA
RegisterWindowMessageA
SendMessageTimeoutA
GetUserObjectInformationA
SendMessageTimeoutW
GetMouseMovePointsEx
GetMenuStringA
MonitorFromRect
RegisterHotKey
SetPropA
UpdateWindow
SetSysColorsTemp
EnumDisplaySettingsExW
DialogBoxIndirectParamA
GetRegisteredRawInputDevices
GetCursorPos
RegisterClassA
GetSystemMetrics
SetProcessWindowStation
GetThreadDesktop
EnumPropsExA
TranslateMessage
AnimateWindow
CreateIconFromResource
IsDialogMessageA
SetWindowsHookA
GetWindowDC
EnumDisplayDevicesA
GetQueueStatus
DefWindowProcA
EnableScrollBar
SetThreadDesktop
GetCursor
GetCursorFrameInfo
SendInput
GetLastInputInfo
SetMessageExtraInfo
GetLastInputInfo
InSendMessage
MessageBoxIndirectA
AdjustWindowRectEx
DefWindowProcA
CalcMenuBar
MessageBoxTimeoutW
InvalidateRect
GetRawInputDeviceList
CopyImage
MapDialogRect
SetPropA
GetPropA
CreateAcceleratorTableA
CascadeWindows
OffsetRect
FindWindowA
SendMessageTimeoutA
EditWndProc
GetRawInputDeviceInfoA
EditWndProc
GetLastInputInfo
LoadRemoteFonts
MapVirtualKeyExA
EnumDesktopsA
SendMessageTimeoutA
ChangeDisplaySettingsA
CharUpperA
CharLowerBuffA
ScrollWindowEx
advapi32
CredGetTargetInfoA
opengl32
glGetFloatv
Sections
.text Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.idata Size: 183KB - Virtual size: 183KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 860B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 1024B - Virtual size: 584B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ