Static task
static1
Behavioral task
behavioral1
Sample
931fc91aa09f3719381e974d2aeac55511d6329e743fec94c4fdf8193d22bc31.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
931fc91aa09f3719381e974d2aeac55511d6329e743fec94c4fdf8193d22bc31.exe
Resource
win10v2004-20220812-en
General
-
Target
931fc91aa09f3719381e974d2aeac55511d6329e743fec94c4fdf8193d22bc31
-
Size
204KB
-
MD5
92cfdd05fce64e493c64eff4ff0fa322
-
SHA1
7e71fe0a3425024c2b399e04df8c9844e55478a6
-
SHA256
931fc91aa09f3719381e974d2aeac55511d6329e743fec94c4fdf8193d22bc31
-
SHA512
f4d768f1b0baddf0b028c187ca4e7e866d9378c0f49293577666ddff73419b8d726fed8be703723241d5d9d3ff21f6ad19e54f44676371fdc2b84a8f97bd84eb
-
SSDEEP
3072:gxwI8QjhoVP5MiWNJ87mhz+bNsqpZa7GZsJvNwqzvBtKGK2:Cro4is8oz+bN7va7OshNwEeu
Malware Config
Signatures
Files
-
931fc91aa09f3719381e974d2aeac55511d6329e743fec94c4fdf8193d22bc31.exe windows x86
28e11ea637f1a3d6ff930a264cc403ee
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
SHGetSpecialFolderPathA
shlwapi
PathRemoveExtensionA
SHGetValueA
PathFindExtensionA
PathFileExistsA
PathFindFileNameA
iphlpapi
GetAdaptersInfo
kernel32
CreateSemaphoreA
ReleaseSemaphore
WriteFile
SetFilePointer
FlushFileBuffers
GetThreadLocale
GetFullPathNameA
GetCurrentThreadId
GlobalGetAtomNameA
GetModuleHandleA
InterlockedDecrement
GetCurrentProcessId
TlsGetValue
GlobalReAlloc
GlobalHandle
TlsAlloc
TlsSetValue
LocalReAlloc
TlsFree
InterlockedIncrement
lstrcmpW
GlobalDeleteAtom
LocalAlloc
GlobalAddAtomA
GlobalFlags
GetLocaleInfoA
GetCPInfo
GetOEMCP
GetCurrentDirectoryA
HeapFree
HeapAlloc
VirtualAlloc
HeapReAlloc
ExitProcess
GetFileType
GetSystemTimeAsFileTime
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetProcessHeap
GetStartupInfoA
RaiseException
RtlUnwind
SetStdHandle
HeapSize
HeapDestroy
HeapCreate
VirtualFree
GetStdHandle
GetACP
SetHandleCount
LCMapStringA
LCMapStringW
GetConsoleCP
GetConsoleMode
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetTimeZoneInformation
GetDriveTypeA
GetStringTypeA
GetStringTypeW
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEnvironmentVariableA
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
FindFirstFileA
FileTimeToLocalFileTime
FileTimeToSystemTime
FindNextFileA
FindClose
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageA
LocalFree
lstrcmpA
lstrcatA
GetVolumeInformationA
GetComputerNameA
GetCommandLineA
GetVersionExA
DeviceIoControl
GetShortPathNameA
GetCurrentProcess
SetPriorityClass
TerminateProcess
OpenProcess
WaitForSingleObject
FreeLibrary
DeleteFileA
CloseHandle
CreateMutexA
GetModuleFileNameA
LockResource
LoadLibraryA
RemoveDirectoryA
GetProcAddress
SetLastError
ReadFile
SizeofResource
Sleep
LoadResource
FindResourceA
GetFileSize
CreateFileA
GetVersion
CompareStringA
lstrcmpiA
GetLastError
InterlockedExchange
MultiByteToWideChar
CompareStringW
WideCharToMultiByte
lstrlenA
GlobalFindAtomA
user32
SetWindowTextA
UnregisterClassA
DestroyMenu
PostQuitMessage
LoadIconA
WinHelpA
GetCapture
GetClassLongA
GetClassNameA
SetPropA
GetPropA
RemovePropA
IsWindow
GetForegroundWindow
GetDlgItem
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetForegroundWindow
GetClientRect
GetMenu
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
CopyRect
PtInRect
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
SetWindowLongA
SetWindowPos
IsIconic
GetWindowPlacement
GetWindowRect
GetWindow
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
GetFocus
ModifyMenuA
EnableMenuItem
CheckMenuItem
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
GetWindowTextA
LoadCursorA
GetDC
FindWindowA
PostMessageA
ReleaseDC
GetSysColor
GetSysColorBrush
GetParent
GetWindowLongA
GetLastActivePopup
IsWindowEnabled
EnableWindow
UnhookWindowsHookEx
SetWindowsHookExA
CallNextHookEx
DispatchMessageA
SendMessageA
MessageBoxA
RegisterWindowMessageA
GetWindowThreadProcessId
EnumWindows
FindWindowExA
GetSubMenu
GetMenuItemCount
GetMenuItemID
GetMenuState
GetSystemMetrics
ValidateRect
GetKeyState
PeekMessageA
SystemParametersInfoA
gdi32
DeleteObject
DeleteDC
CreateBitmap
GetStockObject
GetClipBox
SetMapMode
SetTextColor
SetBkColor
RestoreDC
SaveDC
GetDeviceCaps
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
RegQueryValueExA
RegCloseKey
RegDeleteValueA
RegOpenKeyExA
oleaut32
VariantClear
VariantChangeType
VariantInit
Sections
.text Size: 144KB - Virtual size: 143KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 44KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 176B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ