Static task
static1
Behavioral task
behavioral1
Sample
a990d2f7db992fa18f6745eeb045dcdfdeb76bf100bfd834eb7032c5678495c6.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a990d2f7db992fa18f6745eeb045dcdfdeb76bf100bfd834eb7032c5678495c6.exe
Resource
win10v2004-20220812-en
General
-
Target
a990d2f7db992fa18f6745eeb045dcdfdeb76bf100bfd834eb7032c5678495c6
-
Size
171KB
-
MD5
fdada73d9cecd84ecc22c3fed7619cf1
-
SHA1
6eab9b14abeca51a2fb47e5af2e325f78b2068ac
-
SHA256
a990d2f7db992fa18f6745eeb045dcdfdeb76bf100bfd834eb7032c5678495c6
-
SHA512
233e95d38e5132e753ce93073d4464308dbdff6aaf1ab059c4212d697072610685735cf30548471909fd18f629775d3d94fbef15e10b20477e8bd838a1d29d05
-
SSDEEP
3072:QKzTpPAnIaJ9gTYCyr5TSz9lWpp0ehJnJFZa/H3:9dK9gTjyoz9lW/zjJfa
Malware Config
Signatures
Files
-
a990d2f7db992fa18f6745eeb045dcdfdeb76bf100bfd834eb7032c5678495c6.exe windows x86
68e3d275cc270b5676ef2c855779d788
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegOpenKeyA
RegDeleteValueA
GetUserNameA
RegEnumKeyExA
ole32
CoGetMalloc
StgCreateDocfileOnILockBytes
OleRegGetUserType
MkParseDisplayName
CoRegisterClassObject
StringFromIID
user32
InsertMenuItemA
SetRect
DispatchMessageA
GetDlgItem
ScreenToClient
DispatchMessageW
CreateMenu
DrawMenuBar
GetForegroundWindow
CallWindowProcA
IsRectEmpty
DrawEdge
ActivateKeyboardLayout
RedrawWindow
GetWindowThreadProcessId
RegisterClassA
CheckMenuItem
OpenClipboard
SetClipboardData
KillTimer
GetScrollRange
OffsetRect
RemoveMenu
OemToCharA
GetMenuItemCount
DestroyCursor
IsIconic
FillRect
GetSubMenu
GetIconInfo
UnregisterClassA
EndPaint
SetMenuItemInfoA
InflateRect
SetMenu
SetWindowsHookExA
BeginPaint
SetCapture
GetKeyboardType
ClientToScreen
SetClassLongA
IntersectRect
GetCursorPos
EnumThreadWindows
GetActiveWindow
MapVirtualKeyA
GetSysColorBrush
SetScrollRange
CharToOemA
SetWindowLongA
UnhookWindowsHookEx
DestroyMenu
FindWindowA
GetMenu
InvalidateRect
LoadCursorA
CreatePopupMenu
SetScrollPos
GetKeyNameTextA
GetMenuItemInfoA
GetSystemMenu
GetCursor
AdjustWindowRectEx
PeekMessageA
DeleteMenu
DrawIconEx
SendMessageW
TrackPopupMenu
DestroyWindow
CharNextA
GetLastActivePopup
SetWindowTextA
IsWindow
IsZoomed
GetKeyState
SetFocus
EnumChildWindows
WaitMessage
PtInRect
GetSysColor
GetWindowDC
CharNextW
SetWindowLongW
GetWindowPlacement
GetKeyboardState
GetClassLongA
GetDCEx
ShowOwnedPopups
InsertMenuA
GetWindow
EnableMenuItem
GetCapture
DrawAnimatedRects
MoveWindow
CallNextHookEx
IsWindowVisible
GetKeyboardLayoutNameA
CreateWindowExA
SetPropA
GetMessagePos
DefMDIChildProcA
FrameRect
EmptyClipboard
EnumWindows
GetTopWindow
ChildWindowFromPoint
SetWindowPlacement
LoadIconA
DrawIcon
GetScrollPos
SetWindowPos
IsWindowUnicode
GetKeyboardLayoutList
GetWindowLongW
DefWindowProcA
IsChild
GetWindowTextA
DefFrameProcA
CharUpperBuffA
LoadKeyboardLayoutA
IsWindowEnabled
GetParent
DrawFrameControl
IsDialogMessageA
LoadBitmapA
SetScrollInfo
GetDC
UpdateWindow
SetCursor
CloseClipboard
TranslateMDISysAccel
ShowScrollBar
ScrollWindow
PostQuitMessage
IsDialogMessageW
GetKeyboardLayout
CharLowerA
SetTimer
ReleaseDC
GetPropA
GetWindowRect
LoadStringA
GetMenuState
MessageBeep
GetClipboardData
GetFocus
RegisterClipboardFormatA
MessageBoxA
ShowWindow
GetClassInfoA
SetForegroundWindow
SetParent
GetClientRect
SendMessageA
GetScrollInfo
MsgWaitForMultipleObjects
MapWindowPoints
GetMenuItemID
GetClassNameA
SystemParametersInfoA
SetActiveWindow
RegisterWindowMessageA
RemovePropA
DrawTextA
DestroyIcon
PeekMessageW
EqualRect
CharLowerBuffA
EnableScrollBar
GetDesktopWindow
ReleaseCapture
CreateIcon
TranslateMessage
EnableWindow
WindowFromPoint
kernel32
GetFileAttributesA
InitializeCriticalSection
LocalReAlloc
HeapDestroy
LockResource
lstrcatA
LocalFree
ExitThread
EnumCalendarInfoA
GetCurrentThreadId
GetFileSize
GetSystemDefaultLangID
SetFilePointer
SetThreadLocale
GetThreadLocale
Sleep
MulDiv
GetVersion
ResetEvent
GetStringTypeW
GetProcessHeap
GetModuleFileNameA
SetHandleCount
GetDiskFreeSpaceA
SetEndOfFile
FindClose
GetStdHandle
GetLocalTime
GetLocaleInfoA
GetEnvironmentStrings
lstrcpynA
HeapFree
GlobalDeleteAtom
lstrcmpiA
VirtualFree
LoadResource
GlobalFindAtomA
GetCurrentProcessId
GetUserDefaultLCID
GetFullPathNameA
ReadFile
GetTickCount
CreateFileA
GetVersionExA
lstrlenA
FormatMessageA
GlobalAlloc
GetOEMCP
CreateEventA
WaitForSingleObject
VirtualAlloc
GetDateFormatA
LoadLibraryA
GlobalAddAtomA
WriteFile
CompareStringA
FindResourceA
VirtualQuery
ExitProcess
RaiseException
FreeLibrary
GetProcAddress
lstrcpyA
LocalAlloc
DeleteCriticalSection
LoadLibraryExA
GetACP
VirtualAllocEx
SizeofResource
GetCPInfo
GetStartupInfoA
FindFirstFileA
GetModuleHandleA
FreeResource
lstrcmpA
SetErrorMode
GetCurrentProcess
DeleteFileA
GetCommandLineA
GetStringTypeA
EnterCriticalSection
msvcrt
memcpy
memmove
log
calloc
malloc
Sections
.text Size: 158KB - Virtual size: 157KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.edata Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
BSS Size: 3KB - Virtual size: 90KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
DATA Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ