Static task
static1
Behavioral task
behavioral1
Sample
f12c751c1d8519b775b9d2ae20ca7a189c9b89144760fca2aabbc6a6536e4add.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f12c751c1d8519b775b9d2ae20ca7a189c9b89144760fca2aabbc6a6536e4add.exe
Resource
win10v2004-20220812-en
General
-
Target
f12c751c1d8519b775b9d2ae20ca7a189c9b89144760fca2aabbc6a6536e4add
-
Size
312KB
-
MD5
431b9ffc11d069a8fa11b1933a41afd6
-
SHA1
65bbcc732ef2da11e3ebe6d4165eaf77ce29390a
-
SHA256
f12c751c1d8519b775b9d2ae20ca7a189c9b89144760fca2aabbc6a6536e4add
-
SHA512
963f4abea1c69ab1689bc20c528cc6c8b80d19a81c11846c181d52a3cb74c24118ff3a6ee18b8f678ce69bf8848433910c496d14aabfb7b72137521af183d82f
-
SSDEEP
6144:+oHGiJike+bO6LmotR0RdB+GWHqLPBzzqxnSPV:V3Oom/RWHABzkw
Malware Config
Signatures
Files
-
f12c751c1d8519b775b9d2ae20ca7a189c9b89144760fca2aabbc6a6536e4add.exe windows x86
96f09fbcd96da1d9e733229a0e1bef16
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
PathIsUNCA
PathStripToRootA
PathFindFileNameA
PathFindExtensionA
PathIsDirectoryA
PathFileExistsA
iphlpapi
GetAdaptersInfo
kernel32
UnlockFile
SetEndOfFile
GetFileSize
GetThreadLocale
DuplicateHandle
GetFullPathNameA
GlobalGetAtomNameA
GetModuleFileNameW
InterlockedDecrement
WritePrivateProfileStringA
GetCurrentDirectoryA
GlobalFlags
LocalAlloc
LeaveCriticalSection
TlsGetValue
EnterCriticalSection
GlobalReAlloc
GlobalHandle
InitializeCriticalSection
TlsAlloc
TlsSetValue
LocalReAlloc
DeleteCriticalSection
TlsFree
InterlockedIncrement
lstrcmpW
GlobalFindAtomA
SetErrorMode
GetFileTime
GetCPInfo
GetOEMCP
HeapFree
HeapAlloc
LockFile
HeapReAlloc
GetFileInformationByHandle
PeekNamedPipe
GetFileType
GetCommandLineA
GetProcessHeap
GetStartupInfoA
RtlUnwind
RaiseException
HeapSize
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetStdHandle
GetACP
HeapDestroy
HeapCreate
VirtualFree
SetStdHandle
SetHandleCount
GetConsoleCP
GetConsoleMode
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetTimeZoneInformation
GetDriveTypeA
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEnvironmentVariableA
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
FindFirstFileA
FileTimeToLocalFileTime
FileTimeToSystemTime
FindNextFileA
FindClose
GetCurrentProcessId
GlobalAddAtomA
GlobalFree
GlobalUnlock
FormatMessageA
LocalFree
GetCurrentThread
GetCurrentThreadId
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
GlobalLock
lstrcmpA
GlobalAlloc
GlobalDeleteAtom
GetModuleHandleA
OutputDebugStringA
RemoveDirectoryA
CreateMutexA
Sleep
SetLastError
GetVolumeInformationA
GetFileAttributesA
DeleteFileA
GetVersionExA
GetShortPathNameA
GetModuleFileNameA
GetCurrentProcess
SetPriorityClass
DeviceIoControl
CreateFileA
OpenProcess
TerminateProcess
WaitForSingleObject
FreeLibrary
GetVersion
CompareStringA
lstrcmpiA
InterlockedExchange
MultiByteToWideChar
CompareStringW
lstrlenA
GetLastError
GetProcAddress
LoadLibraryA
CloseHandle
SetCurrentDirectoryA
GetTempPathA
GetComputerNameA
FindResourceA
LoadResource
LockResource
SizeofResource
WideCharToMultiByte
ExitProcess
SystemTimeToFileTime
GetSystemTimeAsFileTime
VirtualAlloc
user32
ShowWindow
UnregisterClassA
DestroyMenu
LoadIconA
WinHelpA
GetCapture
GetClassLongA
SetPropA
GetPropA
RemovePropA
IsWindow
GetForegroundWindow
GetDlgItem
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetForegroundWindow
GetClientRect
GetMenu
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
CopyRect
DefWindowProcA
CallWindowProcA
SetWindowLongA
SetWindowPos
SystemParametersInfoA
IsIconic
GetWindowPlacement
LoadCursorA
GetSysColorBrush
GetSysColor
ReleaseDC
GetDC
GrayStringA
DrawTextExA
TabbedTextOutA
ClientToScreen
GetDlgCtrlID
GetWindowRect
GetClassNameA
PtInRect
SetWindowTextA
UnhookWindowsHookEx
GetSystemMetrics
GetWindowLongA
CharUpperA
EnumWindows
GetWindowThreadProcessId
GetLastActivePopup
IsWindowEnabled
EnableWindow
SetCursor
SetWindowsHookExA
CallNextHookEx
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
IsWindowVisible
GetKeyState
FindWindowExA
PostMessageA
RegisterWindowMessageA
SendMessageTimeoutA
MessageBoxA
FindWindowA
GetDesktopWindow
GetWindow
GetWindowTextA
PostQuitMessage
GetSubMenu
GetMenuItemCount
GetMenuItemID
PeekMessageA
GetCursorPos
ValidateRect
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
GetFocus
GetParent
SendMessageA
ModifyMenuA
EnableMenuItem
CheckMenuItem
GetMenuState
DrawTextA
gdi32
ScaleWindowExtEx
DeleteDC
GetStockObject
SetTextColor
SetBkColor
RestoreDC
SaveDC
DeleteObject
CreateBitmap
GetDeviceCaps
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetClipBox
SetMapMode
SetWindowExtEx
comdlg32
GetFileTitleA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
RegCreateKeyExA
RegQueryValueA
RegEnumKeyA
RegOpenKeyA
RegSetValueExA
RegDeleteKeyA
RegDeleteValueA
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
oleaut32
VariantClear
VariantChangeType
VariantInit
Sections
.text Size: 212KB - Virtual size: 208KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 56KB - Virtual size: 55KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ