Static task
static1
Behavioral task
behavioral1
Sample
576f87adba8a51aac2dafa167706b19b3e7b307b49c4a66ae8ceb4db93125eaa.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
576f87adba8a51aac2dafa167706b19b3e7b307b49c4a66ae8ceb4db93125eaa.exe
Resource
win10v2004-20220812-en
General
-
Target
576f87adba8a51aac2dafa167706b19b3e7b307b49c4a66ae8ceb4db93125eaa
-
Size
120KB
-
MD5
c451770e8a1914395669feaab30c0b6c
-
SHA1
a670069c022964c6595bece5a6a63ca8c2e7acf2
-
SHA256
576f87adba8a51aac2dafa167706b19b3e7b307b49c4a66ae8ceb4db93125eaa
-
SHA512
a92d79f8dfc3358759ff0f81a61a4451adcfd293346885ca2d7a3138e962db26c029f15c8066115f8d00f51cd39fceb0dc1da23778a6d091626dcfe21035d617
-
SSDEEP
1536:0pN77O3qIBxfwBg1fIyee/89J7TMW2OiSRv7PChSTiIEqUnUsL2NDBla6KcYi1Lx:0p9Wx9qIUAW2OBasAnUamYzcYib
Malware Config
Signatures
Files
-
576f87adba8a51aac2dafa167706b19b3e7b307b49c4a66ae8ceb4db93125eaa.exe windows x86
8e73899c064a143e35348389d07810e6
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindFirstFileA
FindFirstFileW
FindNextFileA
FindNextFileW
FreeLibrary
GetCommandLineW
GetCurrentDirectoryA
GetCurrentDirectoryW
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetDiskFreeSpaceA
GetDriveTypeA
GetDriveTypeW
GetExitCodeProcess
GetExitCodeThread
GetFileAttributesA
GetFileAttributesW
GetFileSize
GetFileTime
GetLastError
GetLocaleInfoA
GetModuleFileNameA
GetModuleFileNameW
GetModuleHandleA
GetModuleHandleW
GetProcAddress
GetProcessHeap
GetProfileStringA
GetProfileStringW
GetShortPathNameA
GetShortPathNameW
GetStartupInfoA
GetSystemDefaultLangID
GetSystemDirectoryA
GetSystemDirectoryW
GetSystemTimeAsFileTime
GetTickCount
GetUserDefaultLangID
GetVersion
GetVersionExA
GetWindowsDirectoryA
FindClose
GlobalAlloc
GlobalLock
GlobalUnlock
HeapAlloc
HeapFree
InitializeCriticalSection
InterlockedDecrement
InterlockedIncrement
LeaveCriticalSection
MapViewOfFile
MultiByteToWideChar
OpenEventA
OpenEventW
QueryDosDeviceA
QueryDosDeviceW
QueryPerformanceCounter
ReadFile
ReleaseMutex
RemoveDirectoryA
RemoveDirectoryW
ResetEvent
SetCurrentDirectoryA
SetCurrentDirectoryW
SetEndOfFile
SetErrorMode
SetEvent
SetFilePointer
SetLastError
SetUnhandledExceptionFilter
Sleep
TerminateProcess
UnhandledExceptionFilter
UnmapViewOfFile
WaitForMultipleObjects
WaitForSingleObject
WideCharToMultiByte
WriteProfileStringA
WriteProfileStringW
lstrcpynW
lstrlenA
lstrlenW
FileTimeToSystemTime
ExpandEnvironmentStringsW
ExpandEnvironmentStringsA
EnterCriticalSection
DeviceIoControl
DeleteFileW
DeleteFileA
DeleteCriticalSection
CreateThread
CreateProcessW
CreateProcessA
CreateMutexW
CreateMutexA
CreateFileW
CreateFileA
CreateEventW
CreateEventA
CreateDirectoryW
CreateDirectoryA
CopyFileW
CopyFileA
CompareStringW
CompareStringA
CloseHandle
WriteFile
GetWindowsDirectoryW
VirtualAlloc
user32
LoadStringA
LoadStringW
MapWindowPoints
MessageBoxA
MessageBoxW
MoveWindow
MsgWaitForMultipleObjects
PeekMessageA
PeekMessageW
PostMessageA
PostMessageW
PostQuitMessage
PostThreadMessageA
PostThreadMessageW
RegisterClassA
RegisterClassW
RegisterWindowMessageA
ReleaseDC
ScreenToClient
ScrollWindow
SendMessageA
SetCursor
SetFocus
SetScrollInfo
SetWindowLongA
SetWindowLongW
SetWindowPos
SetWindowTextA
ShowWindow
TranslateMessage
UnregisterClassA
UnregisterClassW
UpdateWindow
LoadImageA
IsWindow
InvalidateRect
GetWindowRect
GetSystemMetrics
GetScrollInfo
GetParent
GetDlgItem
GetDesktopWindow
GetDC
GetClientRect
GetActiveWindow
FindWindowExW
FindWindowExA
EndPaint
EnableWindow
DrawFocusRect
DestroyWindow
DestroyCursor
CreateWindowExA
CreateDialogParamW
CreateDialogParamA
CharNextA
CallWindowProcW
CallWindowProcA
BeginPaint
LoadImageW
gdi32
CreateFontIndirectA
CreateFontIndirectW
CreatePen
CreateSolidBrush
DeleteDC
DeleteObject
ExtTextOutW
GetDeviceCaps
GetObjectA
GetObjectType
CreateFontA
GetTextFaceA
GetTextMetricsA
GetTextMetricsW
PatBlt
SelectObject
SetBkColor
SetBkMode
SetMapMode
SetTextColor
CreateCompatibleDC
GetObjectW
GetStockObject
advapi32
RegCloseKey
RegOpenKeyExW
Sections
.text Size: 108KB - Virtual size: 107KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 904B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data2 Size: 1024B - Virtual size: 1000B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ