Static task
static1
Behavioral task
behavioral1
Sample
413475d2ac5c76da0695e1e20a416900e2efc0390002eda4ae520ca6e2054bb4.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
413475d2ac5c76da0695e1e20a416900e2efc0390002eda4ae520ca6e2054bb4.exe
Resource
win10v2004-20220812-en
General
-
Target
413475d2ac5c76da0695e1e20a416900e2efc0390002eda4ae520ca6e2054bb4
-
Size
188KB
-
MD5
ea918a08b3752d78a00e037458e64270
-
SHA1
ab3d92fb813f394400ea759f3b831aa5e8aad204
-
SHA256
413475d2ac5c76da0695e1e20a416900e2efc0390002eda4ae520ca6e2054bb4
-
SHA512
6fd85db2e25ac2dbe7ba6f23298f38832c59d2b5de7e44e0205b369cad98257b85c3d96413ab57fa3574a77c0625d48bda7a661c67718ab85b54993e3ae97274
-
SSDEEP
3072:Yc5nHs6QoK9wWdfERBn5GtjYOTA0IUHaZHuk/5rS8:YclHs6QZwQKv8YOTA0IUHYdF
Malware Config
Signatures
Files
-
413475d2ac5c76da0695e1e20a416900e2efc0390002eda4ae520ca6e2054bb4.exe windows x86
3cdae31bc2c34ec8bb504be5760df1fa
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetCursorPos
LoadMenuA
GetWindowLongA
GetDlgItem
GetDlgItemTextA
SetDlgItemInt
GetDlgItemInt
PostMessageA
SetWindowPos
GetClientRect
SystemParametersInfoA
UnhookWindowsHookEx
SetWindowsHookExA
DialogBoxParamA
CreateWindowExA
RegisterClassA
GetClassInfoA
CloseClipboard
GetParent
EmptyClipboard
OpenClipboard
GetFocus
GetSubMenu
GetWindowRect
GetDialogBaseUnits
ShowWindow
SetWindowTextA
DestroyWindow
AppendMenuA
GetSystemMenu
IsWindowVisible
GetTopWindow
CreateDialogParamA
ReleaseDC
GetDC
EnableWindow
SendDlgItemMessageA
DefWindowProcA
SetWindowLongA
TrackPopupMenu
DestroyMenu
SendMessageA
wsprintfA
EndDialog
SetClipboardData
MessageBeep
SetDlgItemTextA
CallWindowProcA
wvsprintfA
GetWindowTextA
MapDialogRect
MoveWindow
InvalidateRect
UnregisterClassA
FindWindowA
IsWindow
MessageBoxA
LoadCursorA
SetCursor
GetWindow
DestroyIcon
KillTimer
CheckMenuItem
SetTimer
GetSystemMetrics
SetForegroundWindow
LoadIconA
SetClassLongA
shell32
SHGetPathFromIDListA
ShellExecuteA
DragFinish
DragQueryFileA
DragAcceptFiles
Shell_NotifyIconA
SHBrowseForFolderA
gdi32
LPtoDP
GetTextExtentPoint32A
comdlg32
GetOpenFileNameA
advapi32
RegQueryValueExA
RegCloseKey
RegSetValueExA
DeregisterEventSource
ReportEventA
RegisterEventSourceA
RegDeleteKeyA
RegOpenKeyExA
RegCreateKeyExA
ws2_32
inet_ntoa
inet_addr
htonl
ntohl
htons
recvfrom
closesocket
sendto
socket
getservbyname
gethostname
listen
WSASetLastError
setsockopt
send
WSAAsyncSelect
ntohs
gethostbyname
WSACleanup
WSAStartup
bind
WSAGetLastError
connect
recv
WSACloseEvent
WSAEventSelect
WSACreateEvent
select
getsockname
accept
comctl32
InitCommonControlsEx
iphlpapi
SendARP
kernel32
InitializeCriticalSectionAndSpinCount
GetConsoleMode
GetConsoleCP
GetCurrentProcessId
QueryPerformanceCounter
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
LCMapStringW
MultiByteToWideChar
LCMapStringA
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
RtlUnwind
LoadLibraryW
GetTimeZoneInformation
WideCharToMultiByte
InterlockedDecrement
InterlockedIncrement
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
ExitProcess
GetProcAddress
GetModuleHandleW
HeapCreate
VirtualAlloc
VirtualFree
LeaveCriticalSection
DeleteCriticalSection
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetStartupInfoA
LoadLibraryA
SetStdHandle
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
WriteConsoleA
GetConsoleOutputCP
GetCommandLineA
GetDriveTypeA
GetModuleFileNameW
GetStdHandle
GetFileType
WriteConsoleW
HeapReAlloc
ResumeThread
ExitThread
HeapFree
HeapAlloc
HeapSize
SetEndOfFile
GetSystemTimeAsFileTime
GlobalAlloc
GlobalLock
GlobalUnlock
FindFirstFileA
FileTimeToLocalFileTime
FileTimeToSystemTime
GetDateFormatA
FindNextFileA
FindClose
OutputDebugStringA
FormatMessageA
LocalFree
WritePrivateProfileStringA
GetPrivateProfileStringA
SetThreadPriority
SetLastError
GetProcessHeap
CompareStringA
EnterCriticalSection
ReleaseMutex
CloseHandle
FlushFileBuffers
WriteFile
SetFilePointer
Sleep
CreateFileA
GetLocalTime
lstrlenA
GetFileSize
GetTickCount
GetCurrentThreadId
lstrcmpA
lstrcpyA
GetLastError
lstrcatA
lstrcpynA
SetEnvironmentVariableA
GetEnvironmentVariableA
SetProcessWorkingSetSize
GetCurrentProcess
CompareStringW
CreateMutexA
GetFullPathNameA
CreateProcessA
WaitForSingleObject
lstrcmpiA
ResetEvent
GetModuleFileNameA
GetCurrentDirectoryA
GetSystemTime
SetEvent
CreateEventA
WaitForMultipleObjects
DeleteFileA
ReleaseSemaphore
SetCurrentDirectoryA
GetFileAttributesA
CreateSemaphoreA
ReadFile
CreateThread
Sections
.text Size: 130KB - Virtual size: 129KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 26KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 99KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.NewSec Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE