Static task
static1
Behavioral task
behavioral1
Sample
537f65913127cc9f3184210585a9b945172b07785615700dd93e5db0c59a7423.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
537f65913127cc9f3184210585a9b945172b07785615700dd93e5db0c59a7423.exe
Resource
win10v2004-20220812-en
General
-
Target
537f65913127cc9f3184210585a9b945172b07785615700dd93e5db0c59a7423
-
Size
210KB
-
MD5
960e7688cb8373e128c401c1824a43ab
-
SHA1
954e2cdb70bc9e401247c61d0aaea666705e8979
-
SHA256
537f65913127cc9f3184210585a9b945172b07785615700dd93e5db0c59a7423
-
SHA512
8c701c1d0893038b8bd2c9ca495059f837d0ff01f1b793200210bea0e617bc5ac777b8532ba5dcc142aa8f4df1cb1fea8b51067081cbae0059a64a34ab3dcedf
-
SSDEEP
3072:HZI+O5HNkDxtVagroHSCpNce3oPOM7TC7BbCk+dZpp5bdAXPVaefq4Nxi/3:W5YRjBh3C7dULPiPVBg
Malware Config
Signatures
Files
-
537f65913127cc9f3184210585a9b945172b07785615700dd93e5db0c59a7423.exe windows x86
291e66575f7eab098d6da15fc612df8e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLogicalDrives
ExitProcess
SetCurrentDirectoryW
GetModuleFileNameA
SetUnhandledExceptionFilter
GetFileAttributesW
SleepEx
GlobalDeleteAtom
GetExpandedNameW
lstrcpyW
GetProcAddress
CreateSemaphoreW
FileTimeToSystemTime
GetCurrentThread
GetProcessHeap
SearchPathA
GetNamedPipeInfo
CreatePipe
CreateEventW
GetModuleHandleA
MoveFileW
GetEnvironmentStringsW
GetNumberFormatA
GetLocaleInfoA
GetLocaleInfoW
GetTempPathA
GetLogicalDriveStringsW
ExpandEnvironmentStringsW
user32
SetDlgItemTextA
DefDlgProcA
GetClassLongA
PostQuitMessage
SetWindowLongW
LoadBitmapW
MessageBeep
CharUpperW
LoadMenuW
GetMessageA
CallWindowProcW
GetCursorPos
PostMessageW
GetCaretPos
CreateDesktopW
gdi32
CreateDCW
ColorCorrectPalette
GetRgnBox
SetTextAlign
GetTextColor
GetEnhMetaFileDescriptionA
UnrealizeObject
SetRectRgn
GetFontData
GetCharacterPlacementW
WidenPath
GetTextMetricsA
GetCharacterPlacementA
RemoveFontResourceExA
PaintRgn
PtVisible
LPtoDP
EndDoc
advapi32
RegOpenKeyExW
RegOpenKeyA
RegEnumValueA
RegEnumValueW
RegSaveKeyA
RegOpenKeyA
shell32
SHGetFileInfoA
SHGetFolderPathA
ole32
CoUninitialize
CoGetDefaultContext
CLSIDFromProgID
CoGetCurrentProcess
inetcomm
MimeOleGetFileInfo
EssContentHintEncodeEx
MimeOleGenerateCID
HrAthGetFileName
Sections
.ic Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.UNw Size: 2KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.NDmj Size: 3KB - Virtual size: 378KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.xvpfQY Size: 512B - Virtual size: 90KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.cEMrQ Size: 4KB - Virtual size: 271KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.AxGj Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.FiaGd Size: 5KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.Nfre Size: 2KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ctr Size: 3KB - Virtual size: 438KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.HBzd Size: 1KB - Virtual size: 466KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 168KB - Virtual size: 168KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ