Static task
static1
Behavioral task
behavioral1
Sample
504e205b1a61dd73cb8a2f4c6b66a8013a6b38fdd24405cd3f60e03fc48ce247.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
504e205b1a61dd73cb8a2f4c6b66a8013a6b38fdd24405cd3f60e03fc48ce247.exe
Resource
win10v2004-20220812-en
General
-
Target
504e205b1a61dd73cb8a2f4c6b66a8013a6b38fdd24405cd3f60e03fc48ce247
-
Size
171KB
-
MD5
7abdf3555080d3053c6625c9032b0974
-
SHA1
e90c2c4022e82ea3b215548fbb82f6e0f82e1636
-
SHA256
504e205b1a61dd73cb8a2f4c6b66a8013a6b38fdd24405cd3f60e03fc48ce247
-
SHA512
f36304f15c88321cd6ae482d338b124afbcae3fc6b1f4c67070f30057f3575d06b810f0bc21321e457bca8dcb5d206cf9c061e07ceb45fadfe509228e7dcba87
-
SSDEEP
3072:WfOw2zVKUTD+8SJ0BWSArMESFYhwaVPpk5Oo70veTZqY6zp2HBdqu:W2w2xKi+mBW9reLaVPpk53+Fwq
Malware Config
Signatures
Files
-
504e205b1a61dd73cb8a2f4c6b66a8013a6b38fdd24405cd3f60e03fc48ce247.exe windows x86
9d97f339a16096b2a4d1c1fff20f9258
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
oleaut32
SysFreeString
VariantCopyInd
VariantChangeTypeEx
SysStringLen
SysReAllocStringLen
VariantClear
SysAllocStringLen
ole32
IsEqualGUID
user32
EnableScrollBar
wsprintfA
IntersectRect
GetIconInfo
CheckMenuItem
GetScrollInfo
SetScrollInfo
WindowFromPoint
ReleaseCapture
FillRect
GetClassInfoA
CharLowerBuffA
DrawFrameControl
SetForegroundWindow
MapVirtualKeyA
SetWindowPlacement
GetClipboardData
GetSystemMenu
SetMenu
GetForegroundWindow
UnregisterClassA
DeleteMenu
KillTimer
ScreenToClient
GetSysColor
OffsetRect
GetCapture
GetMenuItemID
GetMenuState
EqualRect
SetPropA
ScrollWindow
EnumThreadWindows
GetCursor
UpdateWindow
SetTimer
InvalidateRect
SetWindowPos
LoadCursorA
SetScrollPos
CreatePopupMenu
SetFocus
GetWindowRect
CreateIcon
FindWindowA
IsZoomed
EnumWindows
GetSubMenu
ShowWindow
CallNextHookEx
PtInRect
SendMessageA
CharNextA
DefWindowProcA
GetMenuStringA
FrameRect
IsWindowVisible
GetFocus
IsWindow
CreateWindowExA
GetScrollRange
TrackPopupMenu
GetTopWindow
GetDesktopWindow
ClientToScreen
GetActiveWindow
LoadBitmapA
GetWindow
GetCursorPos
IsDialogMessageA
SystemParametersInfoA
PostMessageA
CharLowerA
LoadStringA
GetWindowDC
PeekMessageA
ActivateKeyboardLayout
SetRect
GetWindowPlacement
SetWindowsHookExA
SetWindowLongA
GetScrollPos
IsIconic
EnableWindow
ShowOwnedPopups
GetKeyState
TranslateMDISysAccel
GetDCEx
DefFrameProcA
DestroyIcon
EndPaint
DestroyWindow
DrawTextA
CallWindowProcA
WinHelpA
RegisterClipboardFormatA
DispatchMessageA
GetKeyNameTextA
MapWindowPoints
GetPropA
GetKeyboardLayout
DestroyCursor
PostQuitMessage
DefMDIChildProcA
SetCursor
IsChild
InsertMenuItemA
TranslateMessage
SetScrollRange
GetDC
DrawMenuBar
RegisterWindowMessageA
GetWindowLongA
GetMenuItemInfoA
RemovePropA
DrawIcon
MessageBoxA
WaitMessage
AdjustWindowRectEx
SetCapture
RegisterClassA
RedrawWindow
LoadIconA
OemToCharA
SetClassLongA
SetActiveWindow
GetKeyboardLayoutList
ExitWindowsEx
EnableMenuItem
GetLastActivePopup
DestroyMenu
RemoveMenu
GetSystemMetrics
ShowScrollBar
InflateRect
DrawEdge
DrawIconEx
GetWindowTextA
GetKeyboardState
GetMenu
IsWindowEnabled
GetMenuItemCount
GetClientRect
CreateMenu
ReleaseDC
LoadKeyboardLayoutA
InsertMenuA
SetMenuItemInfoA
ShowCursor
GetKeyboardType
BeginPaint
GetWindowThreadProcessId
UnhookWindowsHookEx
IsRectEmpty
advapi32
RegCloseKey
AdjustTokenPrivileges
RegDeleteKeyA
LookupPrivilegeValueA
RegDeleteValueA
RegQueryValueExA
RegOpenKeyA
OpenProcessToken
RegOpenKeyExA
kernel32
GetEnvironmentStringsA
TlsFree
GetLastError
GetCurrentThreadId
GlobalDeleteAtom
HeapFree
GetCommandLineA
UnhandledExceptionFilter
GlobalAddAtomA
SetLastError
ReadFile
LocalFree
GetProcAddress
FreeResource
Sleep
GetLocaleInfoA
LoadResource
LocalAlloc
LockResource
GetStartupInfoA
SetEvent
MultiByteToWideChar
GetTickCount
LoadLibraryA
VirtualAlloc
lstrlenA
WriteFile
InterlockedIncrement
GetWindowsDirectoryA
FormatMessageA
lstrcpynA
WinExec
GetSystemInfo
CompareStringA
HeapAlloc
CreateThread
ExitProcess
LeaveCriticalSection
lstrcpyA
GlobalUnlock
GetProcessHeap
GetThreadLocale
GlobalHandle
SetHandleCount
GlobalFree
GetCurrentProcessId
VirtualQuery
GetFileSize
SetThreadLocale
VirtualFree
FindFirstFileA
GetSystemDirectoryA
GetDiskFreeSpaceA
FindResourceA
WideCharToMultiByte
GetCurrentProcess
GetCPInfo
GlobalAlloc
InterlockedDecrement
RtlUnwind
TlsAlloc
SetEndOfFile
GlobalReAlloc
FindClose
GetACP
FreeLibrary
WaitForSingleObject
SetErrorMode
GetFileType
TlsSetValue
GetVersion
CloseHandle
GetLocalTime
EnterCriticalSection
SetConsoleCtrlHandler
MulDiv
lstrcmpA
GetOEMCP
SetFilePointer
GlobalLock
GetStdHandle
InitializeCriticalSection
DeleteFileA
LoadLibraryExA
CreateFileA
GetPrivateProfileStringA
RaiseException
TlsGetValue
DeleteCriticalSection
CreateEventA
GetStringTypeW
GetModuleHandleA
GetModuleFileNameA
GetVersionExA
SizeofResource
EnumCalendarInfoA
Sections
.text Size: 139KB - Virtual size: 138KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 760B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ