Static task
static1
Behavioral task
behavioral1
Sample
819113653d86a58387fb307372e8479aba203bec9e50ee248093ab141f2fcad8.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
819113653d86a58387fb307372e8479aba203bec9e50ee248093ab141f2fcad8.exe
Resource
win10v2004-20220812-en
General
-
Target
819113653d86a58387fb307372e8479aba203bec9e50ee248093ab141f2fcad8
-
Size
163KB
-
MD5
7190f8f43d8790fae5ca842346e35dd6
-
SHA1
4919083d400411cdf8c9b858342916bbe95eaea8
-
SHA256
819113653d86a58387fb307372e8479aba203bec9e50ee248093ab141f2fcad8
-
SHA512
9f64128006eab2cb5424194ea21d0f9c2957304e65368324525de0b56f74989db44fe42b28d3e48500663773e8d0074ebf032528519a9819ce789b3ef78d0322
-
SSDEEP
1536:NDy0TZ31fgUWwGTHafmmt4rEEALb4yph/OGHdYtA2EMDg0zH6/NZ7/WrCdReP8e/:Zy0T7fg9TalwEEMph//gA2hgZ/Wr140
Malware Config
Signatures
Files
-
819113653d86a58387fb307372e8479aba203bec9e50ee248093ab141f2fcad8.exe windows x86
e21ab42387e3d8ef71181c5ca85bc472
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LCMapStringW
ExpandEnvironmentStringsA
GetDateFormatA
PulseEvent
IsDebuggerPresent
VirtualFree
VirtualQueryEx
GetProcessHeap
SetEndOfFile
OpenProcess
GetTimeFormatA
GetModuleHandleW
HeapSize
SetPriorityClass
GetModuleHandleA
GetCurrentDirectoryA
InterlockedIncrement
GetStringTypeA
TlsAlloc
GetSystemTimeAsFileTime
GlobalUnlock
FindResourceA
GlobalAlloc
IsValidCodePage
TlsFree
SearchPathA
GetDriveTypeA
GlobalAddAtomA
CreateThread
ExitThread
ReadFile
LocalAlloc
SizeofResource
QueryPerformanceFrequency
LoadResource
RaiseException
TerminateThread
GetExitCodeThread
GetFileType
CreateEventA
FormatMessageA
GetCurrentThreadId
VirtualAlloc
CreateFileA
ResumeThread
GetCurrentProcess
GetConsoleCP
GetThreadContext
GetStringTypeW
InterlockedDecrement
DeleteFileA
FileTimeToSystemTime
SetThreadAffinityMask
lstrlenA
HeapAlloc
Module32First
LeaveCriticalSection
WaitForSingleObject
WriteFile
InitializeCriticalSection
UnmapViewOfFile
GetACP
GetCommandLineA
SetUnhandledExceptionFilter
IsBadStringPtrA
lstrcpynA
GetStartupInfoA
GetFileTime
LoadLibraryW
GetEnvironmentStringsW
GetStdHandle
lstrcmpA
WriteConsoleW
DeleteCriticalSection
DuplicateHandle
GetCurrentThread
GetProcAddress
lstrcatA
GetNumberFormatA
UnhandledExceptionFilter
gdi32
SetBkMode
CreateCompatibleBitmap
GetBkMode
GetTextMetricsA
Polyline
CreateDIBSection
GetObjectA
StartDocA
RectInRegion
BitBlt
SetTextColor
SetROP2
CreateCompatibleDC
CreateRectRgn
RestoreDC
GetTextExtentPoint32A
SetBkColor
SelectObject
SelectClipRgn
CreateRectRgnIndirect
GetDeviceCaps
GetStockObject
SaveDC
CreateSolidBrush
ExtTextOutA
Rectangle
SetMapMode
LineTo
CreateFontIndirectA
GetBkColor
CreatePen
SetTextAlign
user32
AppendMenuA
CopyRect
MoveWindow
DialogBoxIndirectParamA
DefFrameProcA
GetDC
ClientToScreen
IsIconic
GetSysColor
DestroyWindow
RemoveMenu
DrawEdge
GetSysColorBrush
ModifyMenuA
OffsetRect
CheckMenuItem
TranslateMessage
SetMenuItemInfoA
LoadIconA
FillRect
EndDialog
IsWindowVisible
DialogBoxParamA
CreatePopupMenu
IntersectRect
GetUserObjectSecurity
KillTimer
PtInRect
ReleaseDC
GetFocus
DrawMenuBar
LoadStringA
PostQuitMessage
GetWindowThreadProcessId
BeginPaint
InsertMenuA
InvalidateRect
ScreenToClient
CreateIconIndirect
SetClipboardData
SetWindowPos
GetWindowDC
GetUpdateRgn
SetWindowPlacement
GetWindowRect
ShowWindowAsync
GetDlgCtrlID
EnableWindow
GetWindowLongA
SetFocus
GetMenuItemID
DefWindowProcA
CreateMenu
LoadMenuA
MessageBoxA
GetClientRect
BeginDeferWindowPos
SetWindowTextA
SetScrollInfo
DefDlgProcA
ChildWindowFromPoint
DispatchMessageA
FindWindowExA
RegisterClassA
EmptyClipboard
GetDlgItemTextA
ReleaseCapture
ScrollWindowEx
InflateRect
EnableMenuItem
EndPaint
msvcrt
strncpy
_chmod
exit
__getmainargs
isgraph
_XcptFilter
tmpfile
rewind
_fdopen
labs
_wtol
towlower
_sys_errlist
fread
wcscspn
_wpopen
_spawnv
_memicmp
__set_app_type
_initterm
_ismbcdigit
_adjust_fdiv
__setusermatherr
_wunlink
srand
_aligned_malloc
_putws
memcpy
_adj_fprem1
_hypot
modf
islower
_time64
_controlfp
ungetwc
_ultoa
_get_osfhandle
fwprintf
_mbctoupper
_wcsnset
_vsnwprintf
_set_error_mode
_wfreopen
getwc
_exit
_setmaxstdio
_locking
_acmdln
_wexeclp
_lock
_strtoi64
_ismbclower
vfwprintf
_mbbtombc
_except_handler3
_searchenv
_clearfp
_filbuf
_strset
_wspawnve
_mbschr
_commode
ctime
_wcstoui64
wcsxfrm
_beginthreadex
_wcsdup
_cgets
ldiv
_lseek
_fputchar
_inpw
_mbsupr
_mbsdup
_dup2
tmpnam
_putenv
_wstrdate
_tempnam
_heapchk
_ecvt
_wstrtime
ferror
_spawnvp
abort
_aligned_realloc
putwc
_adj_fdivr_m32i
_mbsnbcat
__p__fmode
_vscwprintf
atexit
wcscat
_mbctombb
_adj_fdiv_m64
_msize
_close
__p__commode
_flsbuf
_ismbcl0
_c_exit
Sections
.text Size: 23KB - Virtual size: 23KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 137KB - Virtual size: 137KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 144B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ