Static task
static1
Behavioral task
behavioral1
Sample
5f05a8292911a3d585526413b9e32944f603d37668bf7ef806cb14220cf5c5a8.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5f05a8292911a3d585526413b9e32944f603d37668bf7ef806cb14220cf5c5a8.exe
Resource
win10v2004-20220901-en
General
-
Target
5f05a8292911a3d585526413b9e32944f603d37668bf7ef806cb14220cf5c5a8
-
Size
192KB
-
MD5
6a93e957af26a5a481ed0efa32a0e2bc
-
SHA1
cba9838a3156d18d8f702ca3f29389a0ef44bc14
-
SHA256
5f05a8292911a3d585526413b9e32944f603d37668bf7ef806cb14220cf5c5a8
-
SHA512
4c2aabdaeb280830188846a80be504e87895e59ba7a5ee9f5b24e1b243e49f4691b1deefbb4f70cc51b2ef95e02ca5702d7f4011dd3c2afb46a5384e38174cc1
-
SSDEEP
3072:S/gpl6rrbYQ7SijgMRJx78EDUIVqs4DngLgcAE8LOJZwaI:Sw6rYQGijdRf8EDy/cAEQOnq
Malware Config
Signatures
Files
-
5f05a8292911a3d585526413b9e32944f603d37668bf7ef806cb14220cf5c5a8.exe windows x86
c4d17b5fba8536a5d607d40398f8b1c3
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualLock
GetConsoleInputExeNameA
GetTimeFormatA
GetFileAttributesA
TerminateJobObject
CreateDirectoryExA
GetTempPathA
WaitForSingleObject
LockFile
BeginUpdateResourceA
VirtualAllocEx
CopyFileExW
GetProcessHeap
GetProcessId
GetConsoleAliasA
VirtualAlloc
GetProcessVersion
ReadConsoleInputA
ReleaseSemaphore
GlobalFlags
GetThreadLocale
OpenProcess
QueryDosDeviceA
PeekConsoleInputA
DeleteAtom
GetConsoleAliasExesLengthA
GetTapeStatus
GetThreadContext
GetAtomNameA
GetConsoleOutputCP
IsProcessorFeaturePresent
SetStdHandle
CopyFileExA
GetFileAttributesExA
HeapQueryInformation
GetFileType
ReadConsoleInputA
EnumSystemLocalesA
SetConsoleHardwareState
OpenWaitableTimerA
TransmitCommChar
GetComputerNameA
VirtualFreeEx
GlobalDeleteAtom
HeapDestroy
GetPrivateProfileSectionNamesA
SleepEx
GetDefaultCommConfigA
SetCurrentDirectoryA
GetProcessTimes
WriteConsoleOutputAttribute
GetStringTypeExA
GetWindowsDirectoryA
Module32First
DisconnectNamedPipe
UnlockFile
GetComputerNameExA
SetFirmwareEnvironmentVariableA
GetSystemDefaultLCID
GetDllDirectoryA
GetCommTimeouts
VirtualQueryEx
GetShortPathNameA
WriteConsoleOutputCharacterA
GetDevicePowerState
GetDiskFreeSpaceA
GlobalGetAtomNameA
OpenThread
GetProcessIoCounters
GetConsoleAliasesLengthA
WriteProcessMemory
GetNamedPipeInfo
GetSystemWindowsDirectoryA
GetCurrentThreadId
secur32
TranslateNameW
user32
GetListBoxInfo
SetSysColorsTemp
CallMsgFilter
CheckMenuRadioItem
SetWindowsHookA
MonitorFromRect
GrayStringA
EnableScrollBar
CharLowerA
MessageBoxExA
FrameRect
ToAsciiEx
SetInternalWindowPos
GetLayeredWindowAttributes
DefWindowProcA
MapVirtualKeyExW
DrawCaptionTempA
CharLowerBuffA
EndDialog
CopyAcceleratorTableA
ChangeDisplaySettingsA
PrivateExtractIconExA
RegisterUserApiHook
SetWinEventHook
CharLowerBuffW
GetMenuCheckMarkDimensions
CreateDialogIndirectParamA
UnregisterClassA
SendMessageCallbackA
DrawMenuBarTemp
ClientToScreen
GetDlgItemTextA
SetShellWindow
SetDoubleClickTime
SetRect
RegisterTasklist
CalcMenuBar
GetDlgCtrlID
DlgDirListA
CloseWindowStation
GetClassInfoExA
LockWorkStation
GetInputState
GetClassNameA
SetMessageQueue
SetShellWindowEx
RegisterRawInputDevices
LoadKeyboardLayoutA
CharLowerA
IntersectRect
LoadIconA
GetDlgCtrlID
ScrollWindow
DlgDirListA
SetScrollInfo
SendMessageCallbackA
DisableProcessWindowsGhosting
GetClientRect
SetWindowsHookExW
SetCursorPos
RegisterClassExA
GetRawInputData
CreateMDIWindowA
DialogBoxIndirectParamA
RegisterHotKey
SetDoubleClickTime
GetClipboardSequenceNumber
SendIMEMessageExA
LoadAcceleratorsA
SetCursorPos
LoadKeyboardLayoutEx
GetMenuItemInfoA
DestroyAcceleratorTable
RegisterRawInputDevices
SendMessageCallbackA
MenuItemFromPoint
GetWindowTextLengthA
RegisterWindowMessageA
SendMessageTimeoutA
GetUserObjectInformationA
SendMessageTimeoutW
GetMouseMovePointsEx
GetMenuStringA
MonitorFromRect
RegisterHotKey
SetPropA
UpdateWindow
SetSysColorsTemp
EnumDisplaySettingsExW
DialogBoxIndirectParamA
GetRegisteredRawInputDevices
GetCursorPos
RegisterClassA
GetSystemMetrics
SetProcessWindowStation
GetThreadDesktop
EnumPropsExA
TranslateMessage
AnimateWindow
CreateIconFromResource
IsDialogMessageA
SetWindowsHookA
GetWindowDC
EnumDisplayDevicesA
GetQueueStatus
DefWindowProcA
EnableScrollBar
SetThreadDesktop
GetCursor
GetCursorFrameInfo
SendInput
GetLastInputInfo
SetMessageExtraInfo
GetLastInputInfo
InSendMessage
MessageBoxIndirectA
AdjustWindowRectEx
DefWindowProcA
CalcMenuBar
MessageBoxTimeoutW
InvalidateRect
GetRawInputDeviceList
CopyImage
MapDialogRect
SetPropA
GetPropA
CreateAcceleratorTableA
CascadeWindows
OffsetRect
FindWindowA
SendMessageTimeoutA
EditWndProc
GetRawInputDeviceInfoA
EditWndProc
GetLastInputInfo
LoadRemoteFonts
MapVirtualKeyExA
EnumDesktopsA
SendMessageTimeoutA
ChangeDisplaySettingsA
CharUpperA
CharLowerBuffA
ScrollWindowEx
advapi32
CredGetTargetInfoA
opengl32
glGetFloatv
Sections
.text Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.idata Size: 183KB - Virtual size: 183KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 860B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 1024B - Virtual size: 584B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ