Static task
static1
Behavioral task
behavioral1
Sample
f56f935c59bf8f3923cc647ff9c201f428ad0b4d78fc6c008f2839242252b066.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
f56f935c59bf8f3923cc647ff9c201f428ad0b4d78fc6c008f2839242252b066.exe
Resource
win10v2004-20220901-en
General
-
Target
f56f935c59bf8f3923cc647ff9c201f428ad0b4d78fc6c008f2839242252b066
-
Size
116KB
-
MD5
efc0f5dec6f708cd11b876d5f6ae6240
-
SHA1
169c4142a4421b88ce58cc4838f467fbec4d25a6
-
SHA256
f56f935c59bf8f3923cc647ff9c201f428ad0b4d78fc6c008f2839242252b066
-
SHA512
a8313d3e8580fac01c7c17f84fe60203128eef0ddb6bada11e6deb6d9ec85d2e2ab3faac3bf1a901998464c8fe7f55b98d6592f5b6b90f40952ac45059785de5
-
SSDEEP
1536:LM1rTrb0ZanRg/XdcUkUTKXSSeqJFaoVLGX1Gw4AfZksczp2038:LMd3gcnStcZU2RnJozdpu3zpM
Malware Config
Signatures
Files
-
f56f935c59bf8f3923cc647ff9c201f428ad0b4d78fc6c008f2839242252b066.exe windows x86
b8bd07638c8f508d13211136e4077abd
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
SetClassLongA
DispatchMessageA
GetClientRect
SetWindowLongW
SetTimer
DispatchMessageW
ClientToScreen
IsDialogMessageW
GetIconInfo
CharLowerA
GetMessagePos
GetKeyNameTextA
SetFocus
GetMenuItemID
SetMenu
DefFrameProcA
GetSystemMenu
GetForegroundWindow
SendMessageW
FrameRect
KillTimer
SetCapture
DestroyIcon
PtInRect
RegisterWindowMessageA
SetWindowPlacement
SetActiveWindow
GetSystemMetrics
SetWindowPos
SetMenuItemInfoA
GetClassLongA
DeleteMenu
DefMDIChildProcA
GetMenuItemCount
GetWindow
CharToOemA
SetClipboardData
SetPropA
ScreenToClient
LoadCursorA
SetCursor
IsZoomed
LoadStringA
GetDlgItem
InvalidateRect
CharUpperBuffA
GetSubMenu
DrawEdge
GetWindowLongA
GetDC
GetMenu
MessageBeep
GetPropA
DrawAnimatedRects
EnableWindow
CreateMenu
EnableMenuItem
GetCapture
GetDesktopWindow
RemovePropA
InsertMenuItemA
MessageBoxA
IntersectRect
LoadKeyboardLayoutA
ReleaseCapture
EndPaint
IsRectEmpty
GetKeyboardLayout
GetWindowTextA
MsgWaitForMultipleObjects
GetWindowDC
WaitMessage
IsDialogMessageA
MapWindowPoints
GetParent
DrawTextA
SetParent
DestroyWindow
SystemParametersInfoA
GetKeyboardType
CheckMenuItem
CharNextW
TranslateMessage
SetWindowLongA
GetSysColor
FindWindowA
GetScrollPos
DefWindowProcA
GetClassNameA
GetWindowPlacement
GetScrollInfo
DrawIcon
IsWindowEnabled
MapVirtualKeyA
RegisterClassA
ScrollWindow
CreatePopupMenu
ActivateKeyboardLayout
GetMenuItemInfoA
IsWindowUnicode
WindowFromPoint
SetScrollInfo
BeginPaint
ShowScrollBar
CallNextHookEx
LoadIconA
PeekMessageA
AdjustWindowRectEx
EnumWindows
UpdateWindow
EnumChildWindows
DestroyCursor
CloseClipboard
GetMenuStringA
DestroyMenu
GetCursor
TrackPopupMenu
GetClipboardData
GetScrollRange
SetRect
EmptyClipboard
PeekMessageW
SendMessageA
ChildWindowFromPoint
FillRect
GetMenuState
GetSysColorBrush
SetScrollRange
MoveWindow
GetWindowRect
OpenClipboard
OemToCharA
IsWindowVisible
RedrawWindow
LoadBitmapA
GetFocus
DrawIconEx
CreateIcon
GetWindowLongW
SetWindowsHookExA
RemoveMenu
RegisterClipboardFormatA
UnregisterClassA
EnableScrollBar
GetKeyboardLayoutList
ShowWindow
DrawFrameControl
GetWindowThreadProcessId
CharNextA
GetClassInfoA
CreateWindowExA
GetLastActivePopup
SetWindowTextA
GetKeyboardLayoutNameA
IsIconic
GetKeyboardState
GetKeyState
TranslateMDISysAccel
SetScrollPos
UnhookWindowsHookEx
ReleaseDC
ShowOwnedPopups
GetActiveWindow
EqualRect
OffsetRect
PostQuitMessage
PostMessageA
GetCursorPos
IsChild
CharLowerBuffA
InsertMenuA
InflateRect
SetForegroundWindow
DrawMenuBar
CallWindowProcA
GetDCEx
IsWindow
wsprintfA
GetTopWindow
shell32
SHGetDesktopFolder
SHGetSpecialFolderLocation
SHFileOperationA
kernel32
GetThreadLocale
HeapAlloc
GetProcAddress
GetSystemDefaultLangID
ExitThread
GetCPInfo
SizeofResource
GlobalAddAtomA
ExitProcess
SetEndOfFile
Sleep
GetStringTypeW
GetUserDefaultLCID
FindResourceA
ResetEvent
GetCurrentProcess
LoadLibraryExA
GetStartupInfoA
WriteFile
GetCurrentProcessId
GetTickCount
CreateThread
GetOEMCP
FormatMessageA
LocalReAlloc
DeleteCriticalSection
GlobalFindAtomA
GetLastError
HeapFree
DeleteFileA
CloseHandle
HeapDestroy
GetCommandLineA
CreateEventA
EnterCriticalSection
SetFilePointer
GetModuleFileNameA
lstrlenA
FindFirstFileA
lstrcpynA
RaiseException
GetVersionExA
GlobalDeleteAtom
GetFileSize
GetCurrentThreadId
LoadLibraryA
GetStringTypeA
CreateFileA
SetErrorMode
GetFileType
GetEnvironmentStrings
VirtualAlloc
MoveFileA
GetModuleHandleA
MoveFileExA
EnumCalendarInfoA
InitializeCriticalSection
WideCharToMultiByte
GetCurrentThread
VirtualFree
GetFileAttributesA
GetFullPathNameA
lstrcatA
FindClose
LockResource
VirtualQuery
FreeResource
CompareStringA
SetEvent
WaitForSingleObject
FreeLibrary
LoadResource
LocalFree
GetDateFormatA
lstrcpyA
LocalAlloc
GetVersion
GetStdHandle
GetDiskFreeSpaceA
SetLastError
ReadFile
VirtualAllocEx
GetACP
GetLocalTime
GlobalAlloc
lstrcmpA
SetThreadLocale
lstrcmpiA
GetProcessHeap
comdlg32
GetFileTitleA
msvcrt
malloc
log
calloc
memcpy
memmove
Sections
.text Size: 103KB - Virtual size: 103KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.bss Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ