Static task
static1
Behavioral task
behavioral1
Sample
a925da1c71e85850bee4fcb133e4357c10fd486559d66ac389ad0c7fd6b49608.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a925da1c71e85850bee4fcb133e4357c10fd486559d66ac389ad0c7fd6b49608.exe
Resource
win10v2004-20220812-en
General
-
Target
a925da1c71e85850bee4fcb133e4357c10fd486559d66ac389ad0c7fd6b49608
-
Size
248KB
-
MD5
2c0ee438ede1e10e419d04a9399e4f10
-
SHA1
4945372e11e70445ef3cc6da818a6aba5b06da9e
-
SHA256
a925da1c71e85850bee4fcb133e4357c10fd486559d66ac389ad0c7fd6b49608
-
SHA512
af1258073ea0b32b68a6eb17c3ca6060ad7607114c75be101ba4e9cbced930b525f5c7c03d4884bccfce18dd22b072b612aa0278d8dd41c53bced090d116a22d
-
SSDEEP
6144:CShzLNqbIfiwMVpJ8SzFfLt59jyy5H434KXXT30UWZ6bIBixHw:CShzJqnrFzH59ju34KXX4hZBBi
Malware Config
Signatures
Files
-
a925da1c71e85850bee4fcb133e4357c10fd486559d66ac389ad0c7fd6b49608.exe windows x86
c8b78993d3be11c5e75e3a7ed37fc9da
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
EnumEnhMetaFile
SetWindowExtEx
SetTextColor
GetRelAbs
GetClipBox
CreateBitmap
CreateDIBitmap
SetMapMode
ScaleViewportExtEx
DeleteObject
RoundRect
PtInRegion
GetDeviceCaps
TextOutA
GetDCPenColor
GdiPlayDCScript
GetObjectA
SaveDC
PtVisible
SelectClipRgn
RestoreDC
SelectObject
CreateEllipticRgn
DeleteDC
SetViewportExtEx
winmm
waveOutGetPitch
mixerOpen
timeGetSystemTime
mmioAdvance
winspool.drv
OpenPrinterA
ExtDeviceMode
PlayGdiScriptOnPrinterIC
QuerySpoolMode
QueryRemoteFonts
ClosePrinter
EndDocPrinter
DocumentPropertiesA
DeletePrinterIC
comdlg32
GetFileTitleA
dwOKSubclass
user32
TranslateMessage
TabbedTextOutA
GetMessageA
GetWindowRect
DispatchMessageA
GetParent
LoadStringA
GetTopWindow
IsWindowVisible
DestroyWindow
GetDlgCtrlID
LoadIconA
DefWindowProcA
IsIconic
LoadBitmapA
SendMessageA
GetClassNameA
GetWindowPlacement
PostQuitMessage
SetActiveWindow
GetClientRect
SetWindowPos
UnhookWindowsHookEx
MessageBoxA
EndDialog
GetFocus
wsprintfA
CallWindowProcA
GetWindow
GetWindowTextA
UnregisterClassA
GetMenuItemCount
SystemParametersInfoA
DestroyMenu
GetDC
CopyRect
IsWindowEnabled
GetMenu
PeekMessageA
CheckMenuItem
GetDlgItem
SendDlgItemMessageA
PostMessageA
GetMenuState
IsDialogMessageA
EnableMenuItem
GetCursorPos
ShowWindow
GetLastActivePopup
GetMenuCheckMarkDimensions
BeginPaint
CreateWindowExA
EndPaint
MapWindowPoints
ModifyMenuA
GrayStringA
GetCapture
CreateDialogIndirectParamA
DrawTextA
LoadCursorA
GetKeyState
GetSysColor
EnableWindow
ValidateRect
WinHelpA
RegisterClassA
GetMenuItemID
PtInRect
GetMessagePos
ClientToScreen
GetPropA
IsWindow
SetMenuItemBitmaps
GetActiveWindow
GetClassInfoA
ExitWindowsEx
SetForegroundWindow
SetWindowLongA
DdeEnableCallback
SetPropA
RemovePropA
SetWindowTextA
SetWindowsHookExA
CharUpperA
UpdateWindow
CallNextHookEx
DrawIcon
GetSubMenu
ReleaseDC
GetSystemMetrics
GetWindowLongA
kernel32
SetStdHandle
FindFirstFileA
GlobalAddAtomA
ReleaseActCtx
lstrcatA
GetStartupInfoA
GetCurrentThread
GetCommandLineA
ReadFile
IsValidLocale
GlobalLock
GetEnvironmentStringsA
GetProcessVersion
VirtualAlloc
HeapReAlloc
FatalExit
WritePrivateProfileStringA
IsDebuggerPresent
LockResource
LCMapStringW
GetFileTime
MulDiv
HeapAlloc
GetDriveTypeA
IsBadReadPtr
EnterCriticalSection
InitializeCriticalSection
GetACP
SetEnvironmentVariableA
GetProcAddress
GetSystemDirectoryA
CompareStringW
GetFullPathNameA
LoadLibraryA
LocalReAlloc
SetConsoleTextAttribute
UnhandledExceptionFilter
CompareStringA
RtlUnwind
GetFileType
TlsSetValue
TerminateProcess
SetConsoleCursorInfo
HeapDestroy
GlobalUnlock
GetStringTypeA
HeapCreate
FindClose
FindNextFileA
Beep
GetVersion
DeleteFileA
TlsAlloc
DuplicateHandle
FlushInstructionCache
GetEnvironmentStringsW
SetFileAttributesA
GlobalFindAtomA
UnlockFile
IsBadCodePtr
FreeEnvironmentStringsW
GetStringTypeW
InterlockedDecrement
TlsFree
LocalAlloc
lstrcmpiA
GlobalHandle
GetEnvironmentVariableA
SetHandleCount
SetUnhandledExceptionFilter
GetModuleFileNameA
GetStdHandle
GetVolumeInformationA
SetEndOfFile
Toolhelp32ReadProcessMemory
Sleep
GetLastError
LeaveCriticalSection
InterlockedIncrement
MultiByteToWideChar
FreeEnvironmentStringsA
SetFilePointer
GetFileSize
DosDateTimeToFileTime
lstrlenA
GlobalFlags
CloseHandle
TlsGetValue
LockFile
HeapFree
GlobalGetAtomNameA
FileTimeToSystemTime
GetCPInfo
IsBadWritePtr
lstrcpynA
LocalFileTimeToFileTime
SetCurrentDirectoryA
InitializeSListHead
SetTimeZoneInformation
ClearCommError
GetOEMCP
GetFileAttributesA
GlobalAlloc
SetErrorMode
GetVersionExA
lstrcmpA
lstrcpyA
ExitProcess
FindResourceA
GetCurrentProcess
FileTimeToLocalFileTime
LoadResource
GetCurrentThreadId
SetConsoleCursorPosition
VirtualFree
LocalUnlock
GlobalFree
LCMapStringA
WideCharToMultiByte
SetSystemTime
GetTimeZoneInformation
DeleteCriticalSection
FlushFileBuffers
LocalFree
SetLastError
GetCurrentDirectoryA
GetWindowsDirectoryA
SystemTimeToTzSpecificLocalTime
GlobalDeleteAtom
CreateFileA
GetThreadLocale
FreeLibrary
HeapSize
SystemTimeToFileTime
GetModuleHandleA
RaiseException
SetConsoleScreenBufferSize
WriteFile
advapi32
MSChapSrvChangePassword
RegSetValueExA
RegDeleteValueA
GetAclInformation
SystemFunction030
OpenThreadToken
AddUsersToEncryptedFile
LsaICLookupNamesWithCreds
LockServiceDatabase
SystemFunction016
AddAccessDeniedAceEx
SetSecurityDescriptorControl
LsaEnumeratePrivileges
RegOpenKeyExA
RegCloseKey
RegCreateKeyExA
Sections
.text Size: 191KB - Virtual size: 190KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 34KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ