Static task
static1
Behavioral task
behavioral1
Sample
816ae003a4734f2f042ad618f43b740d02dcdaf64e8585c2fe1ba911c69f6e91.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
816ae003a4734f2f042ad618f43b740d02dcdaf64e8585c2fe1ba911c69f6e91.exe
Resource
win10v2004-20220812-en
General
-
Target
816ae003a4734f2f042ad618f43b740d02dcdaf64e8585c2fe1ba911c69f6e91
-
Size
145KB
-
MD5
6a58819793a78677ef20fb9cb820ebc6
-
SHA1
00228733291bf43f3864bf4f0755150a01be0369
-
SHA256
816ae003a4734f2f042ad618f43b740d02dcdaf64e8585c2fe1ba911c69f6e91
-
SHA512
55e29282eebf7d42f526fe7e51bd59ef15f0dca9256016e4841e6c34bcb907045018e3e6f7575f1af95c6e568422332f7856e5a960fb7ed4d1720d764dcef995
-
SSDEEP
3072:EFawlPsjc3DQ0/l+tvmCg/jxLK3EELt2zax9AVx2ckl:EF1sCDQ6Mhg5ELt2OxW0ca
Malware Config
Signatures
Files
-
816ae003a4734f2f042ad618f43b740d02dcdaf64e8585c2fe1ba911c69f6e91.exe windows x86
b50fda600ea5899f2731c4c0245fd59a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateThread
GetCurrentThreadId
GetCurrentThread
ResumeThread
ExitThread
GetStartupInfoA
TlsAlloc
TlsGetValue
TlsFree
CreateMutexA
ReleaseMutex
OpenMutexA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
HeapAlloc
HeapCreate
HeapDestroy
GetProcessHeap
HeapReAlloc
HeapSize
HeapFree
lstrcmpiA
GetFileAttributesA
lstrcpyA
FindFirstFileW
FindNextFileW
FindClose
FindFirstFileA
FindNextFileA
GetTempFileNameA
GetFileTime
GetStartupInfoW
CreateEventA
SetEvent
ResetEvent
GetVersionExA
IsDebuggerPresent
CreateFileW
ReadFile
CloseHandle
GetUserDefaultLangID
FindResourceA
FindResourceW
LoadResource
SizeofResource
FreeResource
SetFileTime
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
GetModuleHandleW
MulDiv
IsDBCSLeadByte
Sleep
GetCurrentDirectoryA
VirtualProtect
InterlockedExchange
RaiseException
GlobalAlloc
LockResource
SetUnhandledExceptionFilter
CreateFileA
WriteFile
GetFileSize
VirtualQuery
LoadLibraryA
GetProcAddress
GetWindowsDirectoryA
DeviceIoControl
SetThreadPriority
GetExitCodeThread
GetLocaleInfoW
GetTickCount
LCMapStringA
TerminateThread
TlsSetValue
CreateEventW
SetEndOfFile
GetStringTypeExA
lstrcatA
ExpandEnvironmentStringsA
lstrcmpA
SetFileAttributesA
SetThreadLocale
DeleteFileA
GlobalReAlloc
SetStdHandle
TerminateProcess
GetSystemDefaultLCID
FileTimeToDosDateTime
GetModuleHandleA
lstrcpynA
GetModuleFileNameW
lstrlenA
EnumCalendarInfoA
FreeEnvironmentStringsA
GetStdHandle
GetSystemDirectoryA
ExitProcess
FileTimeToLocalFileTime
VirtualAlloc
msvcrt
_osver
rewind
memset
_flsbuf
_getpid
isleadbyte
_kbhit
_beginthreadex
fgetc
fopen
ftell
strrchr
malloc
strlen
_pipe
_wtol
free
_isctype
_mbsicmp
_CIsqrt
_snwprintf
_write
sscanf
atof
iswctype
toupper
_mbsrchr
log
__CxxFrameHandler
isspace
_putenv
putchar
__p___initenv
rename
__initenv
ceil
strcspn
_assert
_setjmp3
abort
_wcsicmp
strtok
strcat
localtime
_strcmpi
strtoul
_umask
pow
_setmode
_amsg_exit
iswspace
_stricmp
atexit
_wtoi
__mb_cur_max
__pioinfo
strtol
time
_exit
_c_exit
_mktemp
iswdigit
fgetpos
signal
fread
_chmod
_mkdir
_wcsnicmp
tolower
_strnicmp
_getch
puts
perror
_controlfp
_strlwr
strchr
gmtime
fsetpos
_XcptFilter
_mbscmp
_close
_ultoa
_lock
_filelengthi64
_wfopen
vsprintf
wcscat
fwrite
sprintf
wcschr
wcsstr
strncmp
_stat
fclose
_utime
__dllonexit
wcstol
_fstat
fputs
ungetc
strcpy
sin
setlocale
wcsncmp
_open
_iob
clearerr
_ismbblead
_fdopen
qsort
_CIpow
printf
ctime
strspn
_filbuf
isxdigit
_strdup
_unlink
realloc
__setusermatherr
strcmp
strstr
memcpy
_isatty
rand
_get_osfhandle
_snprintf
__set_app_type
bsearch
floor
clock
wcsrchr
__p__fmode
strerror
_cexit
_vsnprintf
_errno
_itoa
cos
wcsncpy
__p__commode
strncpy
_itow
fgets
fputc
_unlock
_except_handler3
_acmdln
towlower
_ftol
__badioinfo
_dup
atoi
longjmp
strpbrk
wcscspn
_lseeki64
_pctype
_read
localeconv
_dup2
isdigit
_fileno
exit
swscanf
memchr
_adjust_fdiv
wcscmp
fflush
remove
memmove
wcstoul
wcstombs
_open_osfhandle
_purecall
getenv
calloc
fseek
__getmainargs
fprintf
_wcslwr
_initterm
sqrt
_lseek
swprintf
memcmp
_vsnwprintf
wctomb
_onexit
_getcwd
wcslen
srand
__p__environ
strncat
_fullpath
_wcsupr
_setjmp
user32
KillTimer
GetMenuState
DestroyCursor
IsIconic
SetScrollRange
SetWindowPos
LoadStringA
DeleteMenu
InflateRect
AdjustWindowRectEx
RemoveMenu
EmptyClipboard
DestroyMenu
IsZoomed
SendDlgItemMessageA
GetCapture
SetScrollInfo
GetScrollInfo
GetClassNameA
GetSysColorBrush
DrawFrameControl
GetSystemMenu
SetCursor
GetSubMenu
SetScrollPos
CallWindowProcA
EqualRect
CallNextHookEx
GetCursorPos
OffsetRect
BeginPaint
GetDC
EnumThreadWindows
CharLowerA
FindWindowA
SetWindowLongA
MessageBoxA
GetParent
SetPropA
ShowCursor
RegisterClassA
GetWindowThreadProcessId
WinHelpA
SetCapture
SetWindowTextA
ShowWindow
DrawMenuBar
PostQuitMessage
CreateMenu
InsertMenuA
GetMessageA
DefWindowProcA
DrawEdge
FillRect
DrawIconEx
EnumWindows
GetKeyState
IsWindow
GetDlgItem
GetSystemMetrics
ShowOwnedPopups
OpenClipboard
DispatchMessageA
RegisterWindowMessageA
GetMenu
SetActiveWindow
UpdateWindow
CreatePopupMenu
InvalidateRect
IsDialogMessageA
CharNextA
GetMenuStringA
SetClipboardData
GetScrollPos
SetWindowsHookExA
SetClassLongA
GetWindowRect
IntersectRect
SetForegroundWindow
GetSysColor
GetWindowTextA
SendMessageA
EnableMenuItem
GetIconInfo
RemovePropA
DrawTextA
EnableWindow
GetKeyboardType
DrawIcon
GetDCEx
DestroyWindow
SetTimer
IsRectEmpty
ReleaseCapture
LoadBitmapA
UnhookWindowsHookEx
SetWindowPlacement
PostMessageA
GetMenuItemID
LoadCursorA
CheckMenuItem
GetClientRect
GetPropA
wsprintfA
LoadIconA
PeekMessageA
TrackPopupMenu
GetClassInfoA
SystemParametersInfoA
GetTopWindow
TranslateMessage
GetWindow
ReleaseDC
GetLastActivePopup
GetMenuItemCount
SetMenu
DestroyIcon
GetWindowPlacement
DialogBoxParamA
WindowFromPoint
InsertMenuItemA
GetMessagePos
GetDesktopWindow
IsWindowEnabled
MessageBeep
SetRect
GetFocus
ScreenToClient
PtInRect
RegisterClipboardFormatA
ClientToScreen
MapWindowPoints
CreateWindowExA
OemToCharA
EndPaint
GetWindowLongA
GetScrollRange
IsChild
GetWindowDC
UnregisterClassA
Sections
.text Size: 54KB - Virtual size: 54KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 79KB - Virtual size: 78KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ