Static task
static1
Behavioral task
behavioral1
Sample
5da67a7664a69f23e86918928a3901c4a43f4abededad9927e5412fd5f706c1f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5da67a7664a69f23e86918928a3901c4a43f4abededad9927e5412fd5f706c1f.exe
Resource
win10v2004-20220901-en
General
-
Target
5da67a7664a69f23e86918928a3901c4a43f4abededad9927e5412fd5f706c1f
-
Size
848KB
-
MD5
0b14cc60e7515ba8b5cb95e3a48a4450
-
SHA1
8f8785c65f024e4f9d26481e2c7d5780ca2c93ad
-
SHA256
5da67a7664a69f23e86918928a3901c4a43f4abededad9927e5412fd5f706c1f
-
SHA512
2bd42bb99cf9314195bf484538d6f275ac87d7247ae8e5d7fb691aa964479b52c589918ed86d596eb179fc29236cf006bbd87934c86aeed06a7e7df843092c7b
-
SSDEEP
12288:q1H8UEnm6q3WqteBvMr4MPDhw0CJY7ZtKsmndGE3M6tzWwRHm2kw3bTPjhwfF2MF:qOnnZqmHvMv7ZtU93ztqwph3bTcFTF
Malware Config
Signatures
Files
-
5da67a7664a69f23e86918928a3901c4a43f4abededad9927e5412fd5f706c1f.exe windows x86
4e014672f585799a8031068f94927ec1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
QueryPerformanceCounter
TlsSetValue
GetACP
VirtualAlloc
SetEndOfFile
LocalReAlloc
GetCommandLineA
SetFileTime
HeapCreate
GlobalDeleteAtom
SizeofResource
LoadResource
GetCurrentThread
GetWindowsDirectoryA
GetSystemInfo
TlsGetValue
GlobalLock
ReadFile
LocalAlloc
SetHandleCount
FreeEnvironmentStringsA
GlobalAlloc
LockFile
InterlockedIncrement
GetVersion
GetStartupInfoA
VirtualFree
UnlockFile
HeapFree
InterlockedDecrement
GetThreadLocale
FileTimeToLocalFileTime
HeapSize
GetLocaleInfoA
GetFileType
GetStdHandle
GetCommandLineW
ConvertDefaultLocale
TerminateProcess
GetStringTypeA
GlobalFree
SetUnhandledExceptionFilter
LockResource
LCMapStringA
SetErrorMode
DuplicateHandle
TlsFree
GetLastError
EnumResourceLanguagesW
HeapDestroy
GetOEMCP
SetLastError
GetSystemTimeAsFileTime
SetFilePointer
SetEnvironmentVariableA
GetProcessHeap
GetTimeZoneInformation
LeaveCriticalSection
MulDiv
GetCurrentProcessId
FreeResource
GlobalFlags
FlushFileBuffers
GetConsoleOutputCP
RtlUnwind
CreateFileA
LocalFree
GetModuleHandleA
VirtualQuery
FileTimeToSystemTime
LocalFileTimeToFileTime
GlobalReAlloc
SetStdHandle
CloseHandle
DeleteCriticalSection
FindClose
HeapAlloc
GetEnvironmentStrings
GetFileSize
GetConsoleCP
IsDebuggerPresent
lstrlenA
SystemTimeToFileTime
GlobalUnlock
InitializeCriticalSection
CompareStringA
GetSystemDirectoryA
TlsAlloc
UnhandledExceptionFilter
WriteConsoleA
EnterCriticalSection
GetFileTime
InterlockedExchange
lstrcmpA
FreeLibrary
RaiseException
HeapReAlloc
WriteFile
Sleep
GetVersionExA
GetModuleFileNameA
GetConsoleMode
lstrcpyA
GetCurrentThreadId
AddAtomA
LoadLibraryA
GetProcAddress
lstrcatA
GlobalHandle
ExitProcess
user32
IntersectRect
DeleteMenu
SetCursor
UnregisterClassA
ValidateRect
DeferWindowPos
PostQuitMessage
MessageBeep
RedrawWindow
GetWindowRect
ScrollWindow
GetScrollRange
GetDesktopWindow
EndDialog
GetMenuState
WindowFromPoint
UnpackDDElParam
GetWindow
SetWindowPos
GetNextDlgGroupItem
CopyRect
SetMenu
DrawIcon
CheckMenuItem
TrackPopupMenu
SetMenuItemBitmaps
EndPaint
SetScrollInfo
ScreenToClient
IsWindowEnabled
SendDlgItemMessageA
GetMenuItemCount
EnableMenuItem
ReleaseDC
GetLastActivePopup
GetMessageTime
SetForegroundWindow
MapDialogRect
ReuseDDElParam
PtInRect
CreatePopupMenu
GetMenuItemID
GetClientRect
SetRectEmpty
GetDlgItem
GetMessagePos
TranslateMessage
AdjustWindowRectEx
IsZoomed
GetSysColor
GetWindowDC
GetDCEx
GetFocus
ShowWindow
CallNextHookEx
KillTimer
GetParent
GetWindowRgn
InvalidateRgn
InvalidateRect
GetSystemMenu
EndDeferWindowPos
GetMenuCheckMarkDimensions
DestroyWindow
MoveWindow
ReleaseCapture
GetWindowPlacement
GetDC
GetSystemMetrics
GetActiveWindow
GetCursorPos
SetActiveWindow
SetWindowRgn
GetForegroundWindow
IsIconic
BeginPaint
GetSysColorBrush
UnhookWindowsHookEx
ShowOwnedPopups
GetDlgCtrlID
IsChild
SetRect
LockWindowUpdate
SystemParametersInfoA
IsWindow
ClientToScreen
SetCapture
SetTimer
SetParent
GetTopWindow
BringWindowToTop
UpdateWindow
DestroyIcon
GetNextDlgTabItem
DestroyMenu
GetSubMenu
ShowScrollBar
GetScrollPos
MapWindowPoints
SetScrollPos
GetCapture
SetScrollRange
OffsetRect
FillRect
SetWindowContextHelpId
GetWindowThreadProcessId
BeginDeferWindowPos
IsWindowVisible
IsRectEmpty
GetKeyState
GetScrollInfo
SetFocus
GetMenu
EqualRect
wsprintfA
CharLowerA
InflateRect
gdi32
GetStockObject
OffsetRgn
SelectObject
SelectClipRgn
SetViewportExtEx
CreateCompatibleDC
SaveDC
ExtSelectClipRgn
GetPixel
GetClipBox
CreateEllipticRgn
PatBlt
SetTextColor
CreatePatternBrush
StretchDIBits
GetDeviceCaps
Escape
SetWindowExtEx
CreateCompatibleBitmap
GetWindowExtEx
IntersectClipRect
Ellipse
ScaleWindowExtEx
BitBlt
CreateBitmap
DPtoLP
GetMapMode
SetBkColor
SetRectRgn
GetBkColor
SetMapMode
ScaleViewportExtEx
GetTextColor
DeleteObject
SetBkMode
CreateRectRgnIndirect
SetViewportOrgEx
OffsetViewportOrgEx
CombineRgn
PtVisible
RestoreDC
RectVisible
CreateRectRgn
DeleteDC
ExcludeClipRect
GetRgnBox
CreateSolidBrush
advapi32
SetFileSecurityW
RegCloseKey
ole32
StgOpenStorageOnILockBytes
CoGetClassObject
CoFreeUnusedLibraries
CoRevokeClassObject
OleIsCurrentClipboard
OleInitialize
CLSIDFromProgID
CreateILockBytesOnHGlobal
CLSIDFromString
OleUninitialize
CoCreateInstance
StgCreateDocfileOnILockBytes
OleFlushClipboard
oleaut32
VariantInit
SysAllocStringLen
VariantChangeType
SysFreeString
SysStringLen
SystemTimeToVariantTime
SafeArrayDestroy
OleLoadPicture
OleCreateFontIndirect
VariantTimeToSystemTime
VariantCopy
VariantClear
SysAllocString
shlwapi
PathIsUNCW
PathFileExistsW
PathRemoveExtensionW
PathFindExtensionW
PathStripToRootW
PathFindFileNameW
msvcrt
malloc
Sections
.text Size: 554KB - Virtual size: 554KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 263KB - Virtual size: 282KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ