Static task
static1
Behavioral task
behavioral1
Sample
5583d5aa298148bd4248721c9b8153bf51be3ec2cd68563758b453293a1697cf.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
5583d5aa298148bd4248721c9b8153bf51be3ec2cd68563758b453293a1697cf.exe
Resource
win10v2004-20220901-en
General
-
Target
5583d5aa298148bd4248721c9b8153bf51be3ec2cd68563758b453293a1697cf
-
Size
248KB
-
MD5
888eb1b87c3bd13568000f3a70bc95b8
-
SHA1
b07c42b428ee59c4bfe1ba7f3cc2124ffffcf43f
-
SHA256
5583d5aa298148bd4248721c9b8153bf51be3ec2cd68563758b453293a1697cf
-
SHA512
0aa5f24dab2a17d0d16602c9196f20d7b0f371211f4740025790815cdcbc3d4f00460ddf11def793fa485e1b009f150611023a3dcbcb8cb7bdf82d95698f118d
-
SSDEEP
6144:+TngaCeBkakusVsHldfrXo/DP9gopHuSFtzflwasWuFZF:RaOusVsFdDo/D6ofPKaQ
Malware Config
Signatures
Files
-
5583d5aa298148bd4248721c9b8153bf51be3ec2cd68563758b453293a1697cf.exe windows x86
a1785d820f18ae69e41179384a896fda
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
ValidateRect
GetSysColorBrush
TabbedTextOutA
GetClassLongA
MessageBoxA
GetTopWindow
IsIconic
DrawIcon
SetActiveWindow
EnableWindow
MapWindowPoints
SendDlgItemMessageA
UnhookWindowsHookEx
SetPropA
ModifyMenuA
DestroyMenu
GetPropA
SetWindowTextA
LoadCursorA
GetWindowLongA
DrawTextA
WinHelpA
DispatchMessageA
LoadBitmapA
GetMenuItemCount
SendMessageA
EndDialog
CreateDialogIndirectParamA
GetForegroundWindow
SetFocus
IsDialogMessageA
SetForegroundWindow
GetSysColor
GetActiveWindow
GetMenu
IsWindowVisible
UnregisterClassA
DefWindowProcA
GetClassNameA
PostQuitMessage
GetMessageA
EnableMenuItem
PostMessageA
DdeEnableCallback
GetNextDlgTabItem
BeginPaint
AdjustWindowRectEx
CallWindowProcA
GetWindowPlacement
GetLastActivePopup
GetSystemMetrics
ShowWindow
RegisterWindowMessageA
CallNextHookEx
SetCursor
GetCursorPos
TranslateMessage
DestroyWindow
GetDC
ReleaseDC
GetMenuItemID
GetKeyState
GetMessagePos
CopyRect
RemovePropA
SetWindowPos
GetParent
GetWindowTextLengthA
UpdateWindow
IsWindow
CheckMenuItem
GetMenuState
GetClientRect
PtInRect
ExitWindowsEx
GetClassInfoA
GetWindow
EndPaint
GetCapture
GetMenuCheckMarkDimensions
GrayStringA
ClientToScreen
GetWindowTextA
LoadStringA
GetFocus
LoadIconA
RegisterClassA
GetWindowRect
GetMessageTime
CreateWindowExA
IsWindowEnabled
SetWindowLongA
GetDlgItem
GetSubMenu
SetMenuItemBitmaps
PeekMessageA
GetDlgCtrlID
SystemParametersInfoA
CharUpperA
wsprintfA
SetWindowsHookExA
winspool.drv
DocumentPropertiesA
OpenPrinterA
ClosePrinter
gdi32
GetObjectA
RectVisible
GdiPlayDCScript
SelectObject
DeleteObject
CreateDIBitmap
GetDeviceCaps
CreateEllipticRgn
PtVisible
EnumEnhMetaFile
GetRelAbs
ScaleWindowExtEx
ScaleViewportExtEx
SetMapMode
OffsetViewportOrgEx
TextOutA
SetViewportOrgEx
CreateBitmap
Escape
RestoreDC
SetWindowExtEx
SetViewportExtEx
ExtTextOutA
PtInRegion
SaveDC
RoundRect
SetTextColor
gdiPlaySpoolStream
GetClipBox
DeleteDC
GetStockObject
SetBkColor
GetDCPenColor
kernel32
GetVersionExA
SetEnvironmentVariableA
FindNextFileA
EnterCriticalSection
GlobalLock
ReleaseActCtx
GetLastError
SetConsoleScreenBufferSize
GlobalGetAtomNameA
SetConsoleTextAttribute
InitializeSListHead
GetCommandLineA
SetTimeZoneInformation
lstrcmpiA
SetUnhandledExceptionFilter
CompareStringA
DuplicateHandle
SetErrorMode
SetCurrentDirectoryA
IsBadWritePtr
HeapDestroy
VirtualAlloc
MultiByteToWideChar
LCMapStringW
SetConsoleCursorPosition
ReadProcessMemory
lstrcatA
LockFile
GetFullPathNameA
GlobalAddAtomA
lstrcpyA
GetCurrentDirectoryA
GlobalFree
SystemTimeToFileTime
DeleteFileA
SetSystemTime
FlushFileBuffers
GetWindowsDirectoryA
LocalUnlock
CreateFileA
GetTimeZoneInformation
MulDiv
GlobalDeleteAtom
LocalFileTimeToFileTime
FreeLibrary
WritePrivateProfileStringA
GetEnvironmentStringsW
GetVersion
HeapSize
GetCPInfo
GetOEMCP
HeapFree
IsBadReadPtr
GetCurrentThreadId
WriteFile
SetConsoleCursorInfo
GetProcessVersion
GetStartupInfoA
SetFileAttributesA
GetProcAddress
FindFirstFileA
MapUserPhysicalPages
GlobalHandle
LocalAlloc
FindClose
FileTimeToLocalFileTime
GetModuleHandleA
SetHandleCount
InterlockedDecrement
ClearCommError
TlsFree
UnlockFile
InterlockedIncrement
RaiseException
GetCurrentThread
GetCurrentProcess
lstrlenA
SetFilePointer
InitializeCriticalSection
SetStdHandle
HeapReAlloc
SetFileTime
GetVolumeInformationA
GlobalReAlloc
LoadLibraryA
GetStdHandle
GetStringTypeW
FatalExit
TlsAlloc
Beep
SetLastError
RtlUnwind
ReadFile
GetFileTime
GetDriveTypeA
HeapCreate
CompareStringW
FindResourceA
GlobalFlags
Toolhelp32ReadProcessMemory
GetFileSize
TlsGetValue
LocalFree
TerminateProcess
CloseHandle
FreeEnvironmentStringsW
UnhandledExceptionFilter
LoadResource
DeleteCriticalSection
LockResource
SetEndOfFile
IsBadCodePtr
SystemTimeToTzSpecificLocalTime
IsValidLocale
lstrcmpA
GetStringTypeA
GetFileType
Sleep
VirtualFree
FlushInstructionCache
LeaveCriticalSection
GlobalUnlock
IsDebuggerPresent
GetEnvironmentVariableA
GetFileAttributesA
GlobalAlloc
FileTimeToSystemTime
GetSystemDirectoryA
GetACP
FreeEnvironmentStringsA
LCMapStringA
LocalReAlloc
lstrcpynA
GetThreadLocale
DosDateTimeToFileTime
ExitProcess
GlobalFindAtomA
TlsSetValue
HeapAlloc
WideCharToMultiByte
GetEnvironmentStringsA
GetModuleFileNameA
comdlg32
GetFileTitleA
advapi32
RegOpenKeyExA
AddAccessDeniedAceEx
SystemFunction016
ElfOldestRecord
MSChapSrvChangePassword
RegCreateKeyExA
LsaEnumeratePrivileges
RegDeleteValueA
RegCloseKey
LockServiceDatabase
SystemFunction030
GetAclInformation
LsaICLookupNamesWithCreds
RegSetValueExA
AddUsersToEncryptedFile
ElfCloseEventLog
Sections
.text Size: 172KB - Virtual size: 171KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 33KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 27KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ