Static task
static1
Behavioral task
behavioral1
Sample
0c465d258fd6b6e8fb4a5755021b26b3a4730f98f25c9b56020bd5a8ff3b2a61.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
0c465d258fd6b6e8fb4a5755021b26b3a4730f98f25c9b56020bd5a8ff3b2a61.exe
Resource
win10v2004-20221111-en
General
-
Target
0c465d258fd6b6e8fb4a5755021b26b3a4730f98f25c9b56020bd5a8ff3b2a61
-
Size
587KB
-
MD5
f7d8b06e385483f7424f68138c591afb
-
SHA1
9eea5100c042db8b5dd1dd95c435c3f5b57a4ba0
-
SHA256
0c465d258fd6b6e8fb4a5755021b26b3a4730f98f25c9b56020bd5a8ff3b2a61
-
SHA512
91edaa7b66b2f446783fff9c8b67ae323b1a0d226def7bcca68dfd16cae8e7a73e1c08a648de1a6074b588b99e415738a6064be59603acf237b5df2f0546b130
-
SSDEEP
12288:jiws7b4DQdbTA0bVccE68quLwZXla3hQaZNGYLxGbsWU0/C6b:ews7bxdbThVrE6hzZXlahzNGbY0/C6b
Malware Config
Signatures
Files
-
0c465d258fd6b6e8fb4a5755021b26b3a4730f98f25c9b56020bd5a8ff3b2a61.exe windows x86
0d34a71ec1f0613102d5eb1bdc6d6223
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
DestroyWindow
SetMenuItemInfoW
SetMenuInfo
ExcludeUpdateRgn
SetCursorPos
UnregisterHotKey
DispatchMessageA
SetSysColors
CreateWindowExA
UnhookWinEvent
DefWindowProcW
RegisterClassExA
MessageBoxW
EndTask
GetClipboardOwner
CallNextHookEx
GetClipboardData
GetPriorityClipboardFormat
CreateCaret
DestroyAcceleratorTable
LoadCursorW
MapVirtualKeyExW
RegisterClassA
ShowWindow
EnumPropsExA
CreateWindowStationW
comdlg32
LoadAlterBitmap
GetFileTitleA
wininet
InternetErrorDlg
GetUrlCacheEntryInfoA
InternetDial
IsHostInProxyBypassList
ReadUrlCacheEntryStream
FtpOpenFileW
comctl32
DrawStatusTextA
InitMUILanguage
ImageList_SetIconSize
InitCommonControlsEx
ImageList_GetIconSize
ImageList_GetImageInfo
ImageList_GetImageRect
ImageList_DragEnter
ImageList_SetOverlayImage
ImageList_Read
CreateToolbarEx
ImageList_AddMasked
ImageList_GetBkColor
MakeDragList
ImageList_Write
DrawStatusTextW
kernel32
GetStdHandle
TerminateProcess
GetEnvironmentStrings
GetConsoleCP
HeapReAlloc
GetModuleFileNameW
ExitProcess
GetLastError
GetUserDefaultLCID
RaiseException
WriteConsoleA
RtlUnwind
GetCurrentProcess
WideCharToMultiByte
SetConsoleCtrlHandler
VirtualAlloc
SetLastError
TlsAlloc
GetProcessHeap
IsValidLocale
DeleteCriticalSection
FreeEnvironmentStringsW
MultiByteToWideChar
GetProcAddress
InterlockedIncrement
FreeLibrary
LCMapStringA
IsDebuggerPresent
GetEnvironmentStringsW
GetTimeZoneInformation
GetLocaleInfoA
EnterCriticalSection
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetACP
GetTickCount
InterlockedExchange
GetSystemTimeAsFileTime
GetOEMCP
GetStartupInfoW
GetConsoleOutputCP
TlsGetValue
GetFileType
GetStartupInfoA
GetCurrentProcessId
VirtualQuery
WritePrivateProfileStructA
GetModuleHandleA
CreateMutexA
GetCommandLineA
GetCurrentThread
LeaveCriticalSection
OpenMutexA
GetTimeFormatA
LCMapStringW
GetStringTypeA
IsValidCodePage
GetDateFormatA
FlushFileBuffers
CompareStringA
Sleep
TlsFree
SetFilePointer
CompareStringW
ReadFile
GetLocaleInfoW
GetCurrentThreadId
HeapDestroy
GetModuleFileNameA
GetStringTypeW
VirtualFree
QueryPerformanceCounter
FreeEnvironmentStringsA
HeapSize
GetVersionExA
CloseHandle
SetEnvironmentVariableA
LoadLibraryA
HeapCreate
TlsSetValue
WriteFile
GetConsoleMode
WriteConsoleW
HeapAlloc
SetHandleCount
EnumSystemLocalesA
GetCommandLineW
CreateFileA
HeapFree
InterlockedDecrement
SetStdHandle
GetCPInfo
InitializeCriticalSection
advapi32
InitiateSystemShutdownA
RegEnumValueW
RegOpenKeyExA
shell32
SHAppBarMessage
ExtractIconA
CheckEscapesW
SHGetMalloc
SHFileOperationA
Sections
.text Size: 199KB - Virtual size: 199KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 245KB - Virtual size: 274KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 129KB - Virtual size: 129KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ