Static task
static1
Behavioral task
behavioral1
Sample
57b7bc3c452ed0f8f8ef3d4b5b1eb140461b07f7579a1a3c41b1a12eff6d254c.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
57b7bc3c452ed0f8f8ef3d4b5b1eb140461b07f7579a1a3c41b1a12eff6d254c.exe
Resource
win10v2004-20221111-en
General
-
Target
57b7bc3c452ed0f8f8ef3d4b5b1eb140461b07f7579a1a3c41b1a12eff6d254c
-
Size
351KB
-
MD5
00372e9cc5dd9d3024cb75c810c18e5d
-
SHA1
19283a67614e0e4237eca91d813947819ba78016
-
SHA256
57b7bc3c452ed0f8f8ef3d4b5b1eb140461b07f7579a1a3c41b1a12eff6d254c
-
SHA512
87150a721b9b3e34a30b18cb3464cafc1f986073b583ebfd93a08929ca2569d5095c083932eff68b994e0a880db06c0bc29eb2c285fa265d2ec70241001c6919
-
SSDEEP
6144:ATRgi+oG4jLx5AgkvzrU0ElcpZ6+lFk33vx4+V1PZuGFmWm8X8M2uF9Pw:oRgIMU01DlFk6i9QGFkBuF9P
Malware Config
Signatures
Files
-
57b7bc3c452ed0f8f8ef3d4b5b1eb140461b07f7579a1a3c41b1a12eff6d254c.exe windows x86
4674f04b25b54204d6d75b6972e0e278
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetStdHandle
GetStdHandle
HeapSize
GetStartupInfoA
VirtualFree
LCMapStringA
CreateFileMappingW
InitializeCriticalSection
GetFileType
GetSystemTime
EnumDateFormatsExA
GetTickCount
OpenMutexA
TlsSetValue
GetLocaleInfoW
SetHandleCount
QueryPerformanceCounter
GetModuleFileNameA
HeapFree
LCMapStringW
EnumSystemLocalesA
DeleteCriticalSection
GetTimeFormatA
LoadLibraryA
VirtualAlloc
GetLocaleInfoA
GetDateFormatA
ExitProcess
GetACP
GetCurrentThread
FreeEnvironmentStringsW
VirtualProtect
GetUserDefaultLCID
SetFilePointer
SetLastError
IsValidLocale
CompareStringA
IsBadWritePtr
TlsAlloc
GetModuleFileNameW
LeaveCriticalSection
HeapDestroy
GetSystemInfo
GetSystemTimeAdjustment
HeapCreate
InterlockedExchange
UnhandledExceptionFilter
TerminateProcess
GetCurrentThreadId
GetEnvironmentStringsW
FindFirstFileExW
WriteFile
lstrcat
TlsFree
GetCommandLineA
WideCharToMultiByte
HeapReAlloc
GetLastError
CompareStringW
FlushFileBuffers
GetStringTypeA
GetOEMCP
GetModuleHandleA
GetCPInfo
GetCurrentProcessId
ReadFile
EnterCriticalSection
GetStringTypeW
GetSystemTimeAsFileTime
CloseHandle
VirtualQuery
GetStartupInfoW
TransactNamedPipe
GetTimeZoneInformation
FreeEnvironmentStringsA
IsValidCodePage
MultiByteToWideChar
GetCommandLineW
GetCurrentProcess
RtlUnwind
CreateMutexA
TlsGetValue
GetVersionExA
HeapAlloc
GetEnvironmentStrings
GetProcAddress
SetEnvironmentVariableA
comctl32
CreatePropertySheetPageA
ImageList_AddMasked
ImageList_GetIconSize
ImageList_GetImageRect
ImageList_EndDrag
ImageList_LoadImageA
InitMUILanguage
ImageList_DrawIndirect
CreateToolbarEx
ImageList_SetFilter
DestroyPropertySheetPage
ImageList_DragEnter
InitCommonControlsEx
ImageList_GetBkColor
CreatePropertySheetPage
ImageList_Write
user32
TranslateAcceleratorA
CreateWindowExA
GrayStringW
SetSysColors
MessageBoxA
DefWindowProcW
IsChild
RegisterClassExA
BroadcastSystemMessage
SetMenuDefaultItem
RegisterClassA
RegisterClipboardFormatA
DestroyWindow
CreateMenu
SetWindowsHookW
IntersectRect
MessageBoxExW
ShowWindow
DdeQueryStringW
ChangeDisplaySettingsExA
DragDetect
DefDlgProcW
Sections
.text Size: 212KB - Virtual size: 212KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 87KB - Virtual size: 87KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 34KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ