Static task
static1
Behavioral task
behavioral1
Sample
90a62c2e25734c92908a7da1994227c9bf6e2897b6812c0679de2f4ab0ed17fc.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
90a62c2e25734c92908a7da1994227c9bf6e2897b6812c0679de2f4ab0ed17fc.exe
Resource
win10v2004-20220812-en
General
-
Target
90a62c2e25734c92908a7da1994227c9bf6e2897b6812c0679de2f4ab0ed17fc
-
Size
252KB
-
MD5
523f0ddf7a63883aa081a69649fe2431
-
SHA1
b32e82a883552d42b23931092f040e1a950df4df
-
SHA256
90a62c2e25734c92908a7da1994227c9bf6e2897b6812c0679de2f4ab0ed17fc
-
SHA512
2d08422620fe47998dc22d8afd36ae9c675938577202a1e47d5cda10734015473d83f1394bb5f82f78f6f330f010dc3898dad1cfcd0f131185f6570993bc62f9
-
SSDEEP
6144:WzUNGbcBaz1FXZMbfivRD+NOj0ueBbl8rwlrm:WaG50avZz0NFlnm
Malware Config
Signatures
Files
-
90a62c2e25734c92908a7da1994227c9bf6e2897b6812c0679de2f4ab0ed17fc.exe windows x86
dddc604722988a0069ffd11c72d7dffc
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FlushFileBuffers
DosDateTimeToFileTime
GetStartupInfoA
SetConsoleCursorPosition
ReadConsoleOutputA
SetConsoleOutputCP
CreateFileW
SetConsoleTitleA
PeekNamedPipe
AllocConsole
CopyFileExW
DebugBreak
GetBinaryTypeA
CreateMutexW
CreateDirectoryA
OutputDebugStringW
GetCommandLineW
SetStdHandle
SetErrorMode
EnumResourceLanguagesW
CompareStringW
GetModuleHandleA
VirtualAllocEx
GetCompressedFileSizeW
DuplicateHandle
GlobalFindAtomW
EraseTape
GetFullPathNameA
lstrcmpA
FatalAppExitA
SetTimeZoneInformation
ReleaseMutex
LeaveCriticalSection
GetProcessHeap
GlobalFlags
FreeLibrary
SetCurrentDirectoryA
QueryDosDeviceA
VirtualQuery
ReadFileScatter
GetProfileStringA
SystemTimeToFileTime
GetVersion
WriteConsoleOutputW
GetModuleFileNameW
EnumDateFormatsW
GetShortPathNameA
GetTapeParameters
GetDriveTypeW
GetTempPathW
SuspendThread
GetFileType
SetProcessShutdownParameters
GetTapeStatus
IsValidLocale
IsProcessorFeaturePresent
PeekConsoleInputW
GetDiskFreeSpaceW
ExpandEnvironmentStringsW
DeleteFiber
UnmapViewOfFile
SetFileTime
GetSystemTime
ReadConsoleA
SetEndOfFile
GetStringTypeExW
SizeofResource
GetConsoleMode
GetCurrentProcessId
CreateNamedPipeW
ReadConsoleInputW
CreateDirectoryW
VirtualAlloc
LocalSize
CreateEventA
WritePrivateProfileStringA
CreateProcessA
WriteProcessMemory
FileTimeToLocalFileTime
SetSystemTime
QueryDosDeviceW
GetCommandLineA
GetVersionExA
WritePrivateProfileSectionW
ExitProcess
user32
SwitchDesktop
CharPrevA
WinHelpA
GetForegroundWindow
GetKeyNameTextW
GetDlgItem
ModifyMenuA
DefDlgProcA
ChangeDisplaySettingsExA
IsWindowEnabled
ReleaseDC
OemToCharA
RemoveMenu
CharToOemBuffA
CreateDialogIndirectParamW
IsDialogMessageA
CallNextHookEx
UnregisterHotKey
GetAncestor
GetClassInfoExA
IsCharUpperA
DrawMenuBar
SetCapture
TranslateAcceleratorA
MessageBoxW
DeferWindowPos
SetMenuDefaultItem
UnregisterDeviceNotification
ShowWindow
DrawIcon
CharToOemA
SetMenuInfo
LoadImageA
LoadAcceleratorsA
UpdateWindow
GetWindow
EnumWindowStationsW
DestroyIcon
CopyIcon
LoadMenuW
EndDeferWindowPos
SetWindowRgn
LoadBitmapA
SetTimer
SendMessageTimeoutA
GetKeyNameTextA
IsCharAlphaNumericA
SetScrollPos
FillRect
gdi32
Arc
Chord
SetWinMetaFileBits
GetTextFaceA
TextOutA
PathToRegion
CreateDCA
GdiComment
comdlg32
PrintDlgW
ChooseColorW
FindTextA
GetFileTitleA
advapi32
RegSetValueExA
RegQueryInfoKeyW
ReportEventA
CryptAcquireContextW
RegQueryInfoKeyA
PrivilegeCheck
NotifyChangeEventLog
RegSetValueW
ControlService
GetNamedSecurityInfoW
ImpersonateNamedPipeClient
RegEnumValueA
shell32
ShellExecuteA
FindExecutableW
ole32
OleInitialize
StringFromGUID2
CoFreeUnusedLibraries
oleaut32
SafeArrayRedim
SafeArrayGetElement
VariantChangeType
VariantCopy
LoadTypeLi
SysFreeString
comctl32
ImageList_GetImageCount
_TrackMouseEvent
shlwapi
wvnsprintfW
SHQueryValueExW
StrCpyNW
Sections
.text Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 232KB - Virtual size: 228KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE