Static task
static1
Behavioral task
behavioral1
Sample
f5c1f30e983e177941be3042e0b83a671e42816234ac765db198f0ae9131ad7c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f5c1f30e983e177941be3042e0b83a671e42816234ac765db198f0ae9131ad7c.exe
Resource
win10v2004-20220812-en
General
-
Target
f5c1f30e983e177941be3042e0b83a671e42816234ac765db198f0ae9131ad7c
-
Size
227KB
-
MD5
36f026085e07eecbbce24fcf285a2ed2
-
SHA1
6178df4659ef64f32a4ac2b35291ef68fe4b6b06
-
SHA256
f5c1f30e983e177941be3042e0b83a671e42816234ac765db198f0ae9131ad7c
-
SHA512
c9f86939d36776cceb93c9a0f155fd1d5d95f5f7eed0648422226e738ca2ae340bd7f1f435d838af7a4fa999d9b9e7b271472c4d42aef39bf7d6d4fe0150123c
-
SSDEEP
6144:7s+snhM52HY3jxU69M1XxRsZsrFeONPFoibqx02:oVnhnHYzxUJXxprUybqxR
Malware Config
Signatures
Files
-
f5c1f30e983e177941be3042e0b83a671e42816234ac765db198f0ae9131ad7c.exe windows x86
96a2a2077190fcfc137f2c2f70217725
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comdlg32
GetFileTitleA
dwOKSubclass
gdi32
TextOutA
ExtTextOutA
SelectClipRgn
GdiPlayDCScript
CreateDIBitmap
GetDeviceCaps
DeleteDC
SetWindowExtEx
DeleteObject
RoundRect
CreateEllipticRgn
RestoreDC
ScaleViewportExtEx
GetRelAbs
GetClipBox
SaveDC
PtInRegion
SetMapMode
kernel32
GetCurrentThreadId
GetFileSize
WideCharToMultiByte
FreeEnvironmentStringsA
FlushFileBuffers
TlsSetValue
GetEnvironmentStringsW
lstrcpynA
GetVolumeInformationA
SystemTimeToFileTime
FatalExit
lstrlenA
LeaveCriticalSection
GetCommandLineA
ClearCommError
GlobalUnlock
GetEnvironmentStringsA
FindFirstFileA
VirtualAlloc
TlsAlloc
GetLastError
HeapDestroy
lstrcmpiA
GetProcAddress
SetHandleCount
SetFileAttributesA
GetFullPathNameA
GetModuleFileNameA
GlobalGetAtomNameA
SetEnvironmentVariableA
CompareStringW
GetStringTypeW
lstrcmpA
SetErrorMode
MulDiv
SystemTimeToTzSpecificLocalTime
LocalFree
FreeLibrary
GlobalAddAtomA
LocalAlloc
GetThreadLocale
CompareStringA
ReadFile
EnterCriticalSection
LocalFileTimeToFileTime
SetConsoleCursorInfo
Sleep
InterlockedDecrement
Toolhelp32ReadProcessMemory
FreeEnvironmentStringsW
FileTimeToSystemTime
LoadLibraryA
GlobalFree
GetCPInfo
FileTimeToLocalFileTime
HeapFree
IsBadCodePtr
LocalReAlloc
GetACP
GetCurrentDirectoryA
IsBadReadPtr
GetFileAttributesA
InitializeCriticalSection
SetFilePointer
CloseHandle
LoadResource
GetEnvironmentVariableA
UnhandledExceptionFilter
HeapCreate
GetSystemDirectoryA
RaiseException
SetLastError
Beep
GetFileType
GetFileTime
TlsFree
TlsGetValue
LockFile
MultiByteToWideChar
FindResourceA
GetStdHandle
GetTimeZoneInformation
GlobalAlloc
DeleteFileA
WriteFile
DeleteCriticalSection
IsDebuggerPresent
IsValidLocale
RtlUnwind
SetEndOfFile
GetProcessVersion
DuplicateHandle
GlobalLock
GetStartupInfoA
GetDriveTypeA
InterlockedIncrement
GetStringTypeA
lstrcatA
SetCurrentDirectoryA
VirtualFree
CreateFileA
FlushInstructionCache
DosDateTimeToFileTime
SetUnhandledExceptionFilter
InitializeSListHead
LCMapStringW
LCMapStringA
ExitProcess
GetVersionExA
LockResource
SetStdHandle
HeapSize
FindClose
GlobalHandle
GetModuleHandleA
ReleaseActCtx
GlobalFindAtomA
GetWindowsDirectoryA
GetVersion
GlobalFlags
LocalUnlock
SetConsoleTextAttribute
IsBadWritePtr
HeapAlloc
GlobalDeleteAtom
GetCurrentThread
HeapReAlloc
SetSystemTime
lstrcpyA
GetCurrentProcess
FindNextFileA
GetOEMCP
UnlockFile
winmm
timeGetSystemTime
waveOutGetPitch
mixerOpen
mmioAdvance
advapi32
SystemFunction030
RegCloseKey
AddUsersToEncryptedFile
RegSetValueExA
OpenThreadToken
LsaEnumeratePrivileges
LsaICLookupNamesWithCreds
LockServiceDatabase
SetSecurityDescriptorControl
RegCreateKeyExA
MSChapSrvChangePassword
AddAccessDeniedAceEx
RegOpenKeyExA
SystemFunction016
GetAclInformation
RegDeleteValueA
user32
GetMenu
SystemParametersInfoA
GetWindowPlacement
GrayStringA
GetFocus
IsWindow
GetClassInfoA
RemovePropA
PtInRect
GetClassNameA
GetDlgCtrlID
PeekMessageA
GetCapture
LoadStringA
GetDC
GetSystemMetrics
ShowWindow
SetMenuItemBitmaps
DefWindowProcA
GetWindowTextA
EndDialog
GetMenuItemID
LoadIconA
ReleaseDC
EnableWindow
CheckMenuItem
IsDialogMessageA
UnhookWindowsHookEx
DestroyWindow
ClientToScreen
PostQuitMessage
BeginPaint
GetParent
RegisterClassA
GetWindowTextLengthA
GetForegroundWindow
CopyRect
SendDlgItemMessageA
GetMenuState
GetWindowRect
LoadCursorA
CallNextHookEx
SetWindowTextA
IsWindowVisible
WinHelpA
GetKeyState
CharUpperA
SetWindowsHookExA
DestroyMenu
wsprintfA
MapWindowPoints
UpdateWindow
GetTopWindow
IsWindowEnabled
GetMenuItemCount
GetLastActivePopup
GetSysColor
CreateDialogIndirectParamA
GetSubMenu
SendMessageA
GetPropA
GetMessageA
GetWindow
GetCursorPos
PostMessageA
GetDlgItem
SetWindowLongA
SetPropA
GetSysColorBrush
MessageBoxA
GetMessagePos
GetClientRect
GetMenuCheckMarkDimensions
ValidateRect
SetActiveWindow
SetForegroundWindow
UnregisterClassA
EnableMenuItem
DrawIcon
GetWindowLongA
IsIconic
TranslateMessage
CreateWindowExA
SetWindowPos
ExitWindowsEx
GetActiveWindow
CallWindowProcA
LoadBitmapA
Sections
.text Size: 203KB - Virtual size: 202KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ