Static task
static1
Behavioral task
behavioral1
Sample
f0f5f2d0ec3c034f7d7fbe5338500836227f82a895f76b33ad798cd8d84a6aff.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
f0f5f2d0ec3c034f7d7fbe5338500836227f82a895f76b33ad798cd8d84a6aff.exe
Resource
win10v2004-20220812-en
General
-
Target
f0f5f2d0ec3c034f7d7fbe5338500836227f82a895f76b33ad798cd8d84a6aff
-
Size
319KB
-
MD5
050eced3fc31dfbc4ae6749f6660643d
-
SHA1
81eca0bce581e9a133d4dae80d0354add6382a38
-
SHA256
f0f5f2d0ec3c034f7d7fbe5338500836227f82a895f76b33ad798cd8d84a6aff
-
SHA512
a5859365502ec0d4f167b15348d52afa62b75ce78fa1fad32fbf0b59a09fa486dc6a1d0a4d6ecfbcaa129756a251b9e123121aac506402c6f033523bd7fc2c38
-
SSDEEP
6144:OxfZzbPz1sSSi7z7FZqfUf07xOPKw0wcloPFGy1aCzNn:OxfZPPJ3S4b7AOyw2wF5z
Malware Config
Signatures
Files
-
f0f5f2d0ec3c034f7d7fbe5338500836227f82a895f76b33ad798cd8d84a6aff.exe windows x86
2260ea9b937885a1b11d49606f0252ce
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
GetBrushOrgEx
SetBitmapDimensionEx
CreateFontIndirectW
Pie
CreateDiscardableBitmap
DescribePixelFormat
GetTextFaceW
InvertRgn
GetTextAlign
GetEnhMetaFileBits
ChoosePixelFormat
GetBitmapBits
RealizePalette
SetWindowExtEx
GetStockObject
GetCurrentPositionEx
ExtCreatePen
FrameRgn
CreateDCA
kernel32
CreateMutexA
SetLocaleInfoA
GetConsoleTitleA
GetCurrentThread
SetFilePointer
GetModuleFileNameA
QueryPerformanceCounter
ExitProcess
LCMapStringW
ReadFile
DebugBreak
WideCharToMultiByte
GetModuleHandleA
CompareStringW
GetProcAddress
VirtualQuery
GetStringTypeA
GetTickCount
WritePrivateProfileStringA
GetOEMCP
OpenMutexA
GetStartupInfoA
SetHandleCount
GetTimeZoneInformation
IsBadWritePtr
GetStringTypeW
SetLastError
FreeEnvironmentStringsW
InitializeCriticalSection
SetEnvironmentVariableA
GetUserDefaultLCID
HeapFree
GetVersion
CloseHandle
GetSystemTime
CompareStringA
SetFileTime
UnhandledExceptionFilter
TerminateProcess
GetEnvironmentStringsW
TlsGetValue
DeleteCriticalSection
VirtualAlloc
GetCurrentProcessId
MultiByteToWideChar
GetShortPathNameA
LoadLibraryA
InterlockedDecrement
GetStdHandle
EnterCriticalSection
TlsSetValue
GetPrivateProfileStructW
TlsAlloc
RtlUnwind
SetConsoleCtrlHandler
SetStdHandle
LCMapStringA
GetCPInfo
TlsFree
GetCurrentThreadId
IsBadReadPtr
CreateMailslotW
GetFileType
FreeEnvironmentStringsA
InterlockedIncrement
LeaveCriticalSection
GetLastError
HeapReAlloc
VirtualFree
InterlockedExchange
FlushFileBuffers
HeapDestroy
LocalReAlloc
HeapAlloc
GetSystemTimeAsFileTime
WriteFile
HeapValidate
WaitForSingleObjectEx
GetCurrentProcess
GetACP
OutputDebugStringA
GetCommandLineA
GetEnvironmentStrings
WritePrivateProfileSectionA
HeapCreate
GetLocalTime
user32
DdeNameService
ChangeMenuA
TabbedTextOutW
DestroyIcon
GetKeyNameTextA
ValidateRgn
EnableScrollBar
GetShellWindow
GetScrollPos
DefDlgProcW
CascadeWindows
MessageBoxIndirectW
ClientToScreen
SetWindowPlacement
DdeFreeStringHandle
SetDoubleClickTime
RegisterClassA
PackDDElParam
CharLowerBuffA
RegisterClassExA
comdlg32
PageSetupDlgW
PrintDlgW
ReplaceTextW
comctl32
InitCommonControlsEx
advapi32
RegRestoreKeyA
CryptDuplicateKey
CryptDestroyKey
RegQueryValueW
RegQueryValueExW
RegCreateKeyW
CryptDecrypt
CryptExportKey
CryptSetKeyParam
InitializeSecurityDescriptor
CryptHashData
RegOpenKeyA
RegOpenKeyExW
RegSetValueA
Sections
.text Size: 129KB - Virtual size: 128KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 172KB - Virtual size: 172KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ