Static task
static1
Behavioral task
behavioral1
Sample
f533be842a4df0481866213ee5b0e56071db9b62bd224a3f10c77a76b2a02bcd.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
f533be842a4df0481866213ee5b0e56071db9b62bd224a3f10c77a76b2a02bcd.exe
Resource
win10v2004-20220812-en
General
-
Target
f533be842a4df0481866213ee5b0e56071db9b62bd224a3f10c77a76b2a02bcd
-
Size
38KB
-
MD5
df24ed7e17300cbb88893f9133639af4
-
SHA1
51483d1ea28a7a26b8e893641358f006cd711bad
-
SHA256
f533be842a4df0481866213ee5b0e56071db9b62bd224a3f10c77a76b2a02bcd
-
SHA512
4c0de20dd95f00e1faff1fd88073b948bbec87c84867bc32c6ac92badf34f89890657b5ac60d1d20167517dbf4c1d965d64ecf2e46dc4cd728b604e6522c904c
-
SSDEEP
768:3aqvbJ6/Afwb2+8YERD2WIfLFyhuc3kw3k0l0lgL6:3rKAwKNYERyXj0N3kw3k35
Malware Config
Signatures
Files
-
f533be842a4df0481866213ee5b0e56071db9b62bd224a3f10c77a76b2a02bcd.exe windows x86
aa0b7be92b041a30585aa8a514c6ec55
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Imports
crtdll
_iob
realloc
kernel32
AddAtomA
CloseHandle
CompareFileTime
CreateFileMappingA
CreateDirectoryA
CreateDirectoryW
CreateFileMappingW
CopyFileA
CreateEventA
ExitProcess
CreateProcessA
DeleteFileA
CreateThread
CopyFileW
CreateFileW
DeviceIoControl
FindFirstChangeNotificationA
FindNextChangeNotification
FreeEnvironmentStringsA
EnumSystemLocalesA
FatalAppExitA
DuplicateHandle
ExpandEnvironmentStringsA
GetACP
FindNextFileW
GetCurrentDirectoryW
FindFirstFileA
GetDateFormatA
GetLogicalDrives
FindClose
GetConsoleCP
GetCurrentDirectoryA
GetEnvironmentStrings
GetCommandLineW
GetCurrentProcessId
GetModuleHandleW
GetComputerNameA
GetCPInfo
FindFirstFileW
GetEnvironmentStringsW
GetCurrentProcess
GetCurrentThread
GetEnvironmentVariableA
GetStartupInfoW
GetStartupInfoA
GetFileTime
GetFileType
GetFullPathNameA
GetPrivateProfileSectionW
GetLogicalDriveStringsW
GetSystemInfo
GetExitCodeThread
GetLocalTime
GlobalAddAtomA
GetProfileStringA
GetLastError
GlobalHandle
GetLocaleInfoA
GetThreadLocale
GetSystemTime
GetTempPathA
GetVersionExA
GetPriorityClass
GetVersionExW
GlobalReAlloc
GetSystemTimeAsFileTime
GetShortPathNameW
HeapFree
GlobalSize
GetProcessHeap
GetTickCount
InterlockedExchange
lstrcmpA
GlobalAlloc
GetProcessTimes
GetThreadContext
GetWindowsDirectoryA
HeapAlloc
GetTimeZoneInformation
lstrcatA
GetTempPathW
GetWindowsDirectoryW
IsValidLocale
MapViewOfFile
HeapSize
MulDiv
MoveFileA
SetFilePointer
GetVolumeInformationA
InterlockedIncrement
MultiByteToWideChar
IsDBCSLeadByte
LCMapStringW
GlobalFindAtomA
InitializeCriticalSectionAndSpinCount
IsBadStringPtrA
HeapDestroy
lstrlenA
OpenMutexW
HeapReAlloc
QueryPerformanceFrequency
LockResource
ReleaseMutex
GlobalMemoryStatus
SetFileTime
PulseEvent
Sleep
MoveFileExW
IsBadReadPtr
TlsFree
OutputDebugStringA
UnhandledExceptionFilter
OpenEventA
LocalFree
QueryDosDeviceW
LeaveCriticalSection
lstrcmpiA
SetFileAttributesW
RaiseException
TerminateProcess
SetCurrentDirectoryW
SetStdHandle
WriteFile
SetEnvironmentVariableA
RemoveDirectoryA
OpenFileMappingW
SetCurrentDirectoryA
TlsAlloc
SetPriorityClass
ResumeThread
ReadProcessMemory
WritePrivateProfileStringW
TerminateThread
WriteConsoleA
VirtualQueryEx
UnmapViewOfFile
WaitForSingleObject
WinExec
TlsGetValue
VirtualQuery
comdlg32
GetOpenFileNameA
FindTextA
user32
AppendMenuA
BeginDeferWindowPos
CharPrevW
CallNextHookEx
CreateDialogIndirectParamA
CharLowerA
AdjustWindowRectEx
CallWindowProcA
DdeInitializeA
CharNextA
CharNextW
CheckDlgButton
ChildWindowFromPoint
CheckMenuRadioItem
CreateIconIndirect
DefMDIChildProcA
CreateMenu
CharToOemA
DestroyCaret
CreateDialogParamA
DdeUninitialize
CreateWindowExA
DdeCreateStringHandleA
DdeFreeStringHandle
DestroyWindow
DeferWindowPos
DefDlgProcA
DrawMenuBar
CreatePopupMenu
DefWindowProcA
DialogBoxIndirectParamA
CopyRect
DispatchMessageW
DrawTextW
EnableMenuItem
GetClassNameA
DdeDisconnect
EmptyClipboard
DrawFocusRect
DrawIconEx
DestroyCursor
DialogBoxParamA
DrawTextA
EnumClipboardFormats
GetDC
DialogBoxIndirectParamW
EnableScrollBar
EqualRect
DrawIcon
EndDeferWindowPos
GetAsyncKeyState
EnumWindows
GetClipboardFormatNameA
GetMenuItemInfoA
EnumChildWindows
GetClientRect
GetQueueStatus
GetActiveWindow
GetMenuCheckMarkDimensions
GetDesktopWindow
FillRect
GetIconInfo
GetClassNameW
GetClassInfoA
GetDCEx
GetKeyboardLayoutList
ExitWindowsEx
GetMenuState
GetKeyboardLayoutNameA
GetDoubleClickTime
GetDlgItemInt
GetDlgItem
GetMenu
GetForegroundWindow
GetParent
GetDlgItemTextW
GetMenuStringA
GetUpdateRgn
GetMenuItemID
GetSysColor
GetPropA
GetCursor
GetCursorPos
GetLastActivePopup
GetKeyboardState
GetWindowLongA
IsIconic
GetWindowPlacement
LoadMenuW
GetTopWindow
IsCharAlphaNumericA
MessageBoxW
GetSystemMenu
LoadStringA
GetSystemMetrics
ModifyMenuA
GetKeyNameTextA
GetScrollPos
LoadIconA
GetWindowDC
GetWindowRect
IsClipboardFormatAvailable
LoadImageW
ScrollWindow
IntersectRect
PostThreadMessageA
InsertMenuItemW
InflateRect
GetWindowThreadProcessId
InvalidateRect
RegisterClassA
IsChild
IsWindowEnabled
IsCharAlphaA
IsDlgButtonChecked
MapWindowPoints
SetClassLongA
RegisterClassExA
SetMenuItemBitmaps
SetClipboardData
OffsetRect
MsgWaitForMultipleObjects
LoadKeyboardLayoutA
SendDlgItemMessageW
MessageBeep
IsDialogMessageA
ToAscii
ScreenToClient
ShowScrollBar
IsWindowVisible
RegisterHotKey
HideCaret
UnhookWindowsHookEx
OemToCharA
MoveWindow
LoadImageA
SetKeyboardState
MessageBoxA
SetUserObjectSecurity
SendDlgItemMessageA
LoadIconW
SetMenu
SendMessageTimeoutA
PeekMessageW
mouse_event
SetParent
ShowWindow
SetPropA
UnregisterClassA
TranslateMessage
ShowOwnedPopups
SetForegroundWindow
ShowWindowAsync
RemoveMenu
RedrawWindow
TranslateMDISysAccel
WaitMessage
TranslateAcceleratorA
SetCaretPos
SetWindowLongA
ToUnicode
SetActiveWindow
UnionRect
SetScrollRange
wsprintfA
SetCursorPos
SystemParametersInfoW
SetScrollPos
UnregisterHotKey
TrackPopupMenuEx
SetDlgItemInt
WindowFromPoint
SetTimer
TrackPopupMenu
winspool.drv
OpenPrinterA
EnumPrintersA
Sections
.text Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: - Virtual size: 16KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ