Static task
static1
Behavioral task
behavioral1
Sample
bef1d03c1514e1b53b924f77f99c6f3042c383202d1654d01a9caacdc3ce4392.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bef1d03c1514e1b53b924f77f99c6f3042c383202d1654d01a9caacdc3ce4392.exe
Resource
win10v2004-20220812-en
General
-
Target
bef1d03c1514e1b53b924f77f99c6f3042c383202d1654d01a9caacdc3ce4392
-
Size
80KB
-
MD5
1790627ab7397a8718015dcd32247d10
-
SHA1
83127ef0dc97d055b333beb015909ee92154b545
-
SHA256
bef1d03c1514e1b53b924f77f99c6f3042c383202d1654d01a9caacdc3ce4392
-
SHA512
39394121c3be77775b7dd46b76036d2047c7c729622aa4d3527683ff49d2a020a6ad5e97d29e92d343e614fae207535e44fefb05c3d6cab2a159ef437410ce10
-
SSDEEP
1536:BqLsm78YaSCxAbNVmWgWyCGyrGESY+A37feaCMJDmYsLIb4PvYqHB/AdG9:Msw8pSCxSCWyZ6SDADeak7dJHB/AdG9
Malware Config
Signatures
Files
-
bef1d03c1514e1b53b924f77f99c6f3042c383202d1654d01a9caacdc3ce4392.exe windows x86
24ed97743bf3948889d94797530493ba
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateProcessA
GetCurrentThreadId
lstrcmpiA
GetVersionExA
LoadLibraryA
CloseHandle
OpenProcess
HeapAlloc
GetProcessHeap
HeapFree
DeleteFileA
GetWindowsDirectoryA
FreeLibrary
GetProcAddress
GetModuleFileNameA
GlobalDeleteAtom
GlobalAddAtomA
GetModuleHandleA
CreateThread
GetCurrentDirectoryA
GetCommandLineA
MapViewOfFile
CreateFileMappingA
UnmapViewOfFile
GetStartupInfoA
lstrcpyA
MultiByteToWideChar
GetFileAttributesA
WideCharToMultiByte
FindNextChangeNotification
WaitForMultipleObjects
FindCloseChangeNotification
FindFirstChangeNotificationA
Sleep
GetPrivateProfileIntA
GetPrivateProfileStringA
WritePrivateProfileStringA
SetEvent
GetFullPathNameA
lstrlenA
CreateEventA
GetLastError
CreateDirectoryA
user32
SendMessageA
CallNextHookEx
GetCursorPos
AppendMenuA
LoadStringA
DrawEdge
GetMenuItemInfoA
SetWindowsHookExA
MenuItemFromPoint
SetForegroundWindow
CreatePopupMenu
GetKeyState
ClientToScreen
SetWindowLongA
TrackPopupMenuEx
DestroyMenu
FindWindowA
RegisterClassA
CreateWindowExA
GetMessageA
TranslateMessage
DispatchMessageA
SetPropA
RemovePropA
GetPropA
CallWindowProcA
GetWindowRect
GetWindowDC
GetMenuItemCount
ScreenToClient
InsertMenuA
GetDC
DrawTextA
ReleaseDC
UnhookWindowsHookEx
FillRect
GetForegroundWindow
ShowWindow
DrawStateA
DefWindowProcA
PostMessageA
GetMenuState
GetDesktopWindow
GetSystemMetrics
RegisterHotKey
UnregisterHotKey
GetWindowTextA
MessageBoxA
EnumWindows
GetClassLongA
GetWindowThreadProcessId
SendMessageTimeoutA
IsWindowVisible
LoadIconA
GetClassNameA
GetParent
IsWindow
GetWindowLongA
IsRectEmpty
GetWindow
GetClientRect
LoadImageA
IsIconic
DestroyIcon
SetRect
DrawIconEx
GetSysColor
gdi32
DeleteObject
PolylineTo
MoveToEx
SelectObject
SetBkMode
SetTextColor
CreateSolidBrush
GetStockObject
CreatePen
SetPixel
GetPixel
DeleteDC
CreateCompatibleBitmap
CreateCompatibleDC
BitBlt
advapi32
IsTextUnicode
shell32
SHGetSpecialFolderPathA
SHGetPathFromIDListA
ShellExecuteExA
SHGetSpecialFolderLocation
ExtractIconExA
SHGetFileInfoA
ExtractAssociatedIconA
SHGetDesktopFolder
SHGetMalloc
ole32
CoCreateInstance
CoInitialize
CoUninitialize
msvcrt
__p__fmode
__setusermatherr
_initterm
_adjust_fdiv
_acmdln
exit
__getmainargs
_exit
??1type_info@@UAE@XZ
_XcptFilter
__dllonexit
_fullpath
_onexit
tmpnam
_strupr
isspace
isdigit
_stat
strstr
atoi
strncpy
_strnicmp
strchr
toupper
_splitpath
_stricmp
strrchr
__p__commode
__set_app_type
memmove
sprintf
__CxxFrameHandler
_strcmpi
??3@YAXPAX@Z
??2@YAPAXI@Z
_ftol
__RTDynamicCast
tolower
_except_handler3
_controlfp
Sections
.rdata Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 34KB - Virtual size: 35KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 38KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ