Static task
static1
Behavioral task
behavioral1
Sample
5bea853c94b021f1f5a2fe48fb7a8272853209e92c972f0a079ca8f4919b583c.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
5bea853c94b021f1f5a2fe48fb7a8272853209e92c972f0a079ca8f4919b583c.exe
Resource
win10v2004-20220812-en
General
-
Target
5bea853c94b021f1f5a2fe48fb7a8272853209e92c972f0a079ca8f4919b583c
-
Size
173KB
-
MD5
60e48396a16d940f503416f9d95ebca0
-
SHA1
e5edc99c3e7d90ca1406681fc01f593598ad819a
-
SHA256
5bea853c94b021f1f5a2fe48fb7a8272853209e92c972f0a079ca8f4919b583c
-
SHA512
0a8b2fdc4a951596aa64ceb8947da95c478d58c98b3a6d69875c6bb96c2fdacafe6df9eb8d05eb85f2773ba5161197267e558ea6dd71354d7004f89474b96211
-
SSDEEP
3072:0GOZJOEP6XxJFGobZnm1AN3JADqT3/fIj1eVCn+1d9bnKVmPvJQFf3nHSXlJEnnD:0hDOG6XxJswkeTkqr4pr+TxneavJkf3n
Malware Config
Signatures
Files
-
5bea853c94b021f1f5a2fe48fb7a8272853209e92c972f0a079ca8f4919b583c.exe windows x86
ffb30e5d073d41c7343775a1a511b053
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegCloseKey
RegDeleteKeyA
LookupPrivilegeValueA
AdjustTokenPrivileges
RegDeleteValueA
RegOpenKeyA
RegOpenKeyExA
OpenProcessToken
RegQueryValueExA
gdi32
SelectObject
SetWindowOrgEx
StretchBlt
CopyEnhMetaFileA
LineTo
GetEnhMetaFileHeader
GetWinMetaFileBits
GetPixel
CreateDIBSection
GetTextExtentPoint32A
CreateHalftonePalette
CreateSolidBrush
GetDeviceCaps
GetRgnBox
CreatePalette
SetBkMode
GetSystemPaletteEntries
CreateCompatibleDC
RealizePalette
GetCurrentPositionEx
GetTextMetricsA
CreateRectRgn
SelectPalette
GetPaletteEntries
SetStretchBltMode
RectVisible
UnrealizeObject
GetStockObject
SetPixel
CreateDIBitmap
SetViewportOrgEx
GetEnhMetaFilePaletteEntries
GetClipBox
MaskBlt
CreatePenIndirect
GetDIBits
SaveDC
CombineRgn
RestoreDC
SetWinMetaFileBits
SetBrushOrgEx
DeleteEnhMetaFile
CreateCompatibleBitmap
DeleteDC
DeleteObject
SetEnhMetaFileBits
PlayEnhMetaFile
SetTextColor
PatBlt
GetBrushOrgEx
GetObjectA
BitBlt
SetDIBColorTable
Polyline
GetDIBColorTable
GetBitmapBits
MoveToEx
GetEnhMetaFileBits
SetROP2
CreateFontIndirectA
IntersectClipRect
CreateBitmap
ExcludeClipRect
GetDCOrgEx
CreateBrushIndirect
GetWindowOrgEx
SetBkColor
Rectangle
user32
ShowWindow
UnregisterClassA
GetDC
GetSubMenu
SetWindowPos
CreateWindowExA
InflateRect
IsChild
SetWindowPlacement
DrawTextA
SetTimer
PeekMessageA
IntersectRect
IsRectEmpty
BeginPaint
FillRect
SetScrollInfo
GetCursor
SetClassLongA
IsDialogMessageA
EndPaint
CharNextA
KillTimer
wsprintfA
RemoveMenu
DispatchMessageA
GetTopWindow
GetScrollPos
ClientToScreen
GetWindowPlacement
GetWindowRect
GetActiveWindow
GetWindow
EnableScrollBar
GetWindowTextA
IsWindowVisible
GetKeyboardLayoutList
DrawEdge
GetFocus
SetForegroundWindow
CharLowerA
CreateMenu
DrawFrameControl
SetWindowsHookExA
RemovePropA
GetClipboardData
EnableWindow
SetRect
PostMessageA
GetSysColor
DefMDIChildProcA
RegisterClipboardFormatA
GetMenu
DeleteMenu
RegisterClassA
SetMenuItemInfoA
SetPropA
GetWindowDC
ShowOwnedPopups
MapWindowPoints
GetMenuItemID
GetMenuItemCount
CallNextHookEx
GetClientRect
InsertMenuA
SetScrollPos
GetIconInfo
EqualRect
MapVirtualKeyA
SendMessageA
IsZoomed
GetKeyboardType
LoadKeyboardLayoutA
WaitMessage
SetCapture
GetMenuItemInfoA
GetDesktopWindow
LoadBitmapA
ActivateKeyboardLayout
OemToCharA
WinHelpA
CallWindowProcA
DestroyCursor
IsWindow
GetKeyboardState
TranslateMessage
TrackPopupMenu
GetLastActivePopup
DrawIconEx
CreatePopupMenu
SetWindowLongA
InvalidateRect
GetCursorPos
DestroyIcon
GetMenuStringA
DestroyWindow
DestroyMenu
FrameRect
GetForegroundWindow
WindowFromPoint
ScreenToClient
IsWindowEnabled
FindWindowA
ShowCursor
UnhookWindowsHookEx
GetKeyState
LoadCursorA
GetScrollRange
ReleaseDC
SetScrollRange
SetCursor
ScrollWindow
CharLowerBuffA
EnumWindows
GetWindowThreadProcessId
LoadStringA
GetCapture
ShowScrollBar
CheckMenuItem
GetMenuState
DefWindowProcA
ExitWindowsEx
GetDCEx
EnumThreadWindows
DrawMenuBar
GetScrollInfo
GetKeyboardLayout
ReleaseCapture
InsertMenuItemA
PostQuitMessage
DrawFocusRect
CreateIcon
RedrawWindow
DrawIcon
MessageBoxA
IsIconic
SetFocus
SetActiveWindow
RegisterWindowMessageA
GetClassInfoA
DefFrameProcA
GetParent
SetMenu
GetWindowLongA
EnableMenuItem
GetKeyNameTextA
UpdateWindow
AdjustWindowRectEx
SystemParametersInfoA
LoadIconA
GetPropA
OffsetRect
GetSystemMenu
TranslateMDISysAccel
PtInRect
GetSystemMetrics
comctl32
ImageList_EndDrag
ImageList_GetIconSize
ImageList_SetBkColor
ImageList_DragMove
ImageList_BeginDrag
ImageList_Add
ImageList_Create
ImageList_Replace
ImageList_DrawEx
ImageList_Read
ImageList_DragEnter
ImageList_SetIconSize
ImageList_SetDragCursorImage
ImageList_DragLeave
ImageList_DragShowNolock
ImageList_GetImageCount
ImageList_GetBkColor
ImageList_Draw
ImageList_Remove
ImageList_Write
ImageList_GetDragImage
ord17
ImageList_ReplaceIcon
ImageList_Destroy
oleaut32
SysStringLen
SysReAllocStringLen
VariantChangeTypeEx
VariantCopyInd
SysAllocStringLen
VariantClear
SysFreeString
ole32
IsEqualGUID
kernel32
LeaveCriticalSection
RtlUnwind
LoadLibraryExA
GlobalUnlock
GetSystemInfo
GetOEMCP
GetCPInfo
lstrlenA
LocalFree
DeleteFileA
HeapFree
SetEvent
GetThreadLocale
GetModuleFileNameA
GetDiskFreeSpaceA
GetPrivateProfileStringA
CreateFileA
LoadLibraryA
GetEnvironmentStringsA
GetCommandLineA
Sleep
GlobalFree
FreeResource
CreateThread
GlobalLock
GetLocaleInfoA
SetLastError
SizeofResource
FreeLibrary
InterlockedIncrement
CloseHandle
GetStartupInfoA
GetStdHandle
FindFirstFileA
lstrcpyA
EnumCalendarInfoA
LockResource
TlsAlloc
GetCurrentProcess
SetThreadLocale
UnhandledExceptionFilter
GetCurrentProcessId
VirtualQuery
GetCurrentThreadId
SetEndOfFile
WideCharToMultiByte
HeapAlloc
lstrcpynA
GlobalHandle
WinExec
ExitProcess
LocalAlloc
MulDiv
TlsFree
GetSystemDirectoryA
SetFilePointer
GetFileSize
GetStringTypeW
GetVersionExA
GetModuleHandleA
VirtualFree
InterlockedDecrement
SetConsoleCtrlHandler
GlobalAddAtomA
SetErrorMode
FormatMessageA
RaiseException
SetHandleCount
lstrcmpA
GlobalReAlloc
LoadResource
EnterCriticalSection
FindResourceA
ReadFile
GetFileType
InitializeCriticalSection
GetTickCount
GetVersion
TlsSetValue
GetLastError
GetWindowsDirectoryA
CompareStringA
WaitForSingleObject
FindClose
GetProcessHeap
VirtualAlloc
TlsGetValue
WriteFile
GlobalAlloc
CreateEventA
GlobalDeleteAtom
GetProcAddress
GetACP
GetLocalTime
DeleteCriticalSection
MultiByteToWideChar
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
Sections
.text Size: 140KB - Virtual size: 140KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 13KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ