Static task
static1
Behavioral task
behavioral1
Sample
44b1830312b8e5d921e61fc84eac6b9b589253ee8dee4372403ebec8f47a8f02.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
44b1830312b8e5d921e61fc84eac6b9b589253ee8dee4372403ebec8f47a8f02.exe
Resource
win10v2004-20220812-en
General
-
Target
44b1830312b8e5d921e61fc84eac6b9b589253ee8dee4372403ebec8f47a8f02
-
Size
128KB
-
MD5
06c53c363e5f6b949990f398d88f3db0
-
SHA1
8e58b1223cdb19183a4e7dddef6f25469dd90432
-
SHA256
44b1830312b8e5d921e61fc84eac6b9b589253ee8dee4372403ebec8f47a8f02
-
SHA512
33c19404e24f8a5871ffbb028ab344c439950a8874a82458543ff2aa64546b5907821b7ecff7d081feb267fd5e30b9fb7d30d9b41574b7fd8578e42e1cdf605b
-
SSDEEP
1536:Pf1+oJZFA9AfnbsMFqT+ZswU7mJyICCQwDy9zYxdEAOPvXBQIT:H1+cZikKT+ywUSJyIbQp9kE9vB1T
Malware Config
Signatures
Files
-
44b1830312b8e5d921e61fc84eac6b9b589253ee8dee4372403ebec8f47a8f02.exe windows x86
1012fd5f896cd2cfe378850978123ffb
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
IsTextUnicode
RegCloseKey
RegSetValueA
RegOpenKeyA
RegQueryValueA
RegDeleteKeyA
DeregisterEventSource
ReportEventW
LookupAccountNameW
GetUserNameW
RegisterEventSourceW
RegCreateKeyA
ImpersonateLoggedOnUser
RegOpenKeyExA
RegOpenKeyExW
RegCreateKeyExA
RegCreateKeyExW
RegQueryValueExA
RegQueryValueExW
RegSetValueExA
RegSetValueExW
kernel32
InterlockedIncrement
InterlockedDecrement
EnterCriticalSection
DeleteCriticalSection
LeaveCriticalSection
GetLastError
ExitProcess
GetModuleHandleA
GetStartupInfoA
MultiByteToWideChar
GetCommandLineA
lstrlenW
GetCommandLineW
WideCharToMultiByte
GetModuleFileNameA
GetCPInfo
GetACP
FindClose
FindFirstFileA
DeleteFileA
FindFirstFileW
GetFileAttributesW
CloseHandle
SetEvent
CreateThread
CreateEventA
GetVersionExA
ReadFile
GetStdHandle
FreeLibrary
GetCurrentThreadId
GetProcAddress
LoadLibraryA
WriteFile
CreateFileA
GetModuleFileNameW
GetTickCount
GetFileType
GetUserDefaultLCID
FormatMessageA
LocalFree
LocalAlloc
FormatMessageW
HeapAlloc
GetProcessHeap
HeapFree
HeapReAlloc
UnmapViewOfFile
CreateFileW
MapViewOfFile
CreateFileMappingA
GetFileSize
lstrlenA
GetLocaleInfoA
lstrcpyA
GetPrivateProfileStringA
GetPrivateProfileStringW
GetPrivateProfileIntA
GetPrivateProfileIntW
GetFullPathNameA
GetFullPathNameW
InitializeCriticalSection
GetFileAttributesA
user32
PostMessageA
TranslateMessage
SendMessageA
IsWindowVisible
EnumThreadWindows
KillTimer
MsgWaitForMultipleObjects
PeekMessageA
CharNextA
DispatchMessageA
GetMessageA
LoadStringW
wsprintfA
LoadStringA
wsprintfW
CreateWindowExA
GetClassInfoA
RegisterClassA
PostQuitMessage
GetWindowLongA
SetWindowLongA
GetParent
SetTimer
DefWindowProcA
GetActiveWindow
PostThreadMessageA
MessageBoxW
ole32
CreateBindCtx
CoGetMalloc
CoGetClassObject
CreateFileMoniker
CLSIDFromProgID
CLSIDFromString
CoInitializeSecurity
MkParseDisplayName
StringFromCLSID
CoRegisterClassObject
CoRevokeClassObject
CoCreateInstance
CoMarshalInterThreadInterfaceInStream
CoInitialize
CoUninitialize
CoGetInterfaceAndReleaseStream
CoRegisterMessageFilter
oleaut32
SetErrorInfo
SafeArrayGetLBound
VariantInit
SafeArrayGetElement
SafeArrayGetUBound
SafeArrayPutElement
VariantClear
SafeArrayCreate
UnRegisterTypeLi
LoadTypeLibEx
SafeArrayDestroy
SysAllocStringLen
SysAllocString
SysStringLen
SysAllocStringByteLen
LoadTypeLi
VariantCopy
SysFreeString
LoadRegTypeLi
VariantChangeType
CreateErrorInfo
SafeArrayCopy
imm32
ImmGetDefaultIMEWnd
version
GetFileVersionInfoSizeA
GetFileVersionInfoW
VerQueryValueA
GetFileVersionInfoA
VerQueryValueW
GetFileVersionInfoSizeW
msvcrt
_ftol
_itow
_endthread
_beginthread
sprintf
free
malloc
wcsrchr
tmpnam
Sections
.text Size: 60KB - Virtual size: 57KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 52KB - Virtual size: 72KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE