Static task
static1
Behavioral task
behavioral1
Sample
749005276de2e036a93d51e30b302dd266d2e4cadcc6006437cb9601af0ee39b.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
749005276de2e036a93d51e30b302dd266d2e4cadcc6006437cb9601af0ee39b.exe
Resource
win10v2004-20220812-en
General
-
Target
749005276de2e036a93d51e30b302dd266d2e4cadcc6006437cb9601af0ee39b
-
Size
712KB
-
MD5
157f07eafe582cc23fc5835e86d971a0
-
SHA1
f9ef6040c38dcb9e198e98f9b6771580eeee3d6f
-
SHA256
749005276de2e036a93d51e30b302dd266d2e4cadcc6006437cb9601af0ee39b
-
SHA512
1c8d22a6fb56846a4f9f79f4356a19eada2064a01dd550dd2eb13aa7c540c13b703de23707bac80949f06f7069dd48fa18e6c82b89e855ecee6ea6c48d872479
-
SSDEEP
12288:0RjzGvwFmvqL5Db0XDZIJB29dcbbXcLeFM4puqfK936ku:0RWvVsMXFIJ00meM
Malware Config
Signatures
Files
-
749005276de2e036a93d51e30b302dd266d2e4cadcc6006437cb9601af0ee39b.exe windows x86
11379060a4a2c5a60b0a5b32b6a5081b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetWindowTextW
SetCursor
SetFocus
GetActiveWindow
SetWindowLongW
EnableWindow
MessageBoxW
DestroyWindow
GetSysColorBrush
GetMenuState
SetMenuDefaultItem
DrawFocusRect
IsWindowVisible
EndDialog
CallNextHookEx
CreatePopupMenu
ShowWindow
GetWindowRect
DestroyIcon
DispatchMessageA
DefWindowProcW
SendMessageA
GetFocus
GetDlgItem
EndPaint
IsClipboardFormatAvailable
PostMessageW
UpdateWindow
SetWindowTextA
GetSubMenu
SetClipboardData
TrackPopupMenuEx
InvalidateRect
RegisterClassW
GetSysColor
RegisterWindowMessageA
GetDesktopWindow
DrawIconEx
SetWindowRgn
SetRectEmpty
SystemParametersInfoA
ScrollWindowEx
IsChild
KillTimer
DrawEdge
TrackPopupMenu
SetActiveWindow
DrawFrameControl
UnregisterClassA
EndDeferWindowPos
WindowFromPoint
GetMenuItemCount
ClientToScreen
BeginDeferWindowPos
SetMenuItemInfoW
InflateRect
SetWindowPos
SetCapture
WaitMessage
ReleaseDC
RedrawWindow
CreateWindowExW
PeekMessageW
MoveWindow
GetWindowLongA
AttachThreadInput
ScreenToClient
SetMenu
MapVirtualKeyW
GetKeyState
GetClientRect
GetWindowPlacement
BeginPaint
GetMenuItemID
GetCapture
RegisterClassExW
GetWindowLongW
GetWindow
gdi32
RectVisible
SetStretchBltMode
GetPixel
GdiFlush
CreateEllipticRgn
CreateSolidBrush
GetTextColor
SetViewportOrgEx
EndPage
PtVisible
SetPixel
SetTextColor
GetClipBox
Escape
CreateFontIndirectW
GetTextCharsetInfo
SetTextAlign
GetDIBits
CombineRgn
Polyline
GetRegionData
GetTextExtentPoint32W
LineTo
GetRgnBox
SetROP2
IntersectClipRect
Polygon
BeginPath
ExtTextOutW
EnumFontFamiliesExW
GetDeviceCaps
EndPath
Rectangle
SelectClipRgn
DeleteObject
OffsetRgn
CreateDIBSection
SetWindowOrgEx
GetStockObject
SetBkColor
StartPage
PolyBezier
SetMapMode
SelectObject
RoundRect
CreateDCW
PtInRegion
GetBkMode
EndDoc
DeleteDC
BitBlt
SaveDC
GetObjectW
RestoreDC
ExcludeClipRect
MoveToEx
ExtSelectClipRgn
kernel32
Sleep
IsValidLocale
FindNextFileW
WideCharToMultiByte
GetStartupInfoW
IsValidCodePage
GetSystemTimeAsFileTime
DeleteCriticalSection
GetStringTypeW
SetThreadPriority
GetTempPathA
SizeofResource
RaiseException
CreateFileW
VirtualFree
TlsFree
CreateProcessA
FatalAppExitA
LocalReAlloc
SetEnvironmentVariableA
FileTimeToSystemTime
lstrcpyW
GetModuleHandleW
GetLastError
SetFileTime
WriteFile
WriteConsoleA
TerminateProcess
GetModuleFileNameW
GetCPInfo
HeapReAlloc
MultiByteToWideChar
FreeEnvironmentStringsW
GetFullPathNameW
EnterCriticalSection
ExitThread
FindClose
SetEvent
GlobalUnlock
MapViewOfFile
ExitProcess
HeapSize
GetSystemTime
SetUnhandledExceptionFilter
SetStdHandle
GetStringTypeA
SetFilePointer
GetUserDefaultLCID
RtlUnwind
UnhandledExceptionFilter
lstrcpyA
VirtualQuery
InterlockedIncrement
CopyFileA
DeleteFileA
GetLocaleInfoA
FreeEnvironmentStringsA
GetModuleHandleA
GetTickCount
DuplicateHandle
LCMapStringW
CreateMutexW
GetTimeFormatA
InitializeCriticalSection
GetLocalTime
SetEndOfFile
FreeResource
LoadLibraryA
GetStartupInfoA
LocalFileTimeToFileTime
GetCommandLineW
GetModuleFileNameA
IsBadWritePtr
UnmapViewOfFile
InterlockedExchange
CompareStringA
VirtualProtect
CompareStringW
GetEnvironmentStringsW
SetLastError
GetCurrentProcessId
HeapAlloc
GetProcAddress
CloseHandle
TlsAlloc
GetOEMCP
ResumeThread
GlobalLock
LocalAlloc
GetFileType
GetACP
MulDiv
LeaveCriticalSection
GetEnvironmentStrings
FlushFileBuffers
GetCurrentThread
ReadFile
QueryPerformanceCounter
SetConsoleCtrlHandler
TlsGetValue
GetDriveTypeA
GetCommandLineA
CreateThread
IsBadReadPtr
TlsSetValue
SystemTimeToFileTime
GetTimeZoneInformation
GetFileAttributesA
FindNextFileA
GetCurrentProcess
CreateDirectoryA
GetCurrentThreadId
LockResource
GetStdHandle
IsBadCodePtr
lstrcpynA
VirtualAlloc
GetDateFormatA
GetFileTime
LocalFree
FindFirstFileA
ConvertDefaultLocale
HeapDestroy
LCMapStringA
GlobalHandle
WaitForSingleObject
GlobalAlloc
GetSystemInfo
HeapFree
SetCurrentDirectoryA
SetHandleCount
GetVersionExA
GetCurrentDirectoryA
HeapCreate
GetLocaleInfoW
advapi32
RegCloseKey
RegEnumKeyW
RegQueryValueExW
SetFileSecurityW
InitializeSecurityDescriptor
RegDeleteValueW
Sections
.text Size: 88KB - Virtual size: 87KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 456KB - Virtual size: 453KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 100KB - Virtual size: 98KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 64KB - Virtual size: 63KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ