Static task
static1
Behavioral task
behavioral1
Sample
f30fe456ae14e712d1b6310b8b55bf509dd5591e22dbaf95c5702c9be1e7c948.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
f30fe456ae14e712d1b6310b8b55bf509dd5591e22dbaf95c5702c9be1e7c948.exe
Resource
win10v2004-20220812-en
General
-
Target
f30fe456ae14e712d1b6310b8b55bf509dd5591e22dbaf95c5702c9be1e7c948
-
Size
124KB
-
MD5
a5fc0c8c8ee636dbcc6f88d8042c124a
-
SHA1
4d1803b6eadba65d85eb5c5c5192619971113687
-
SHA256
f30fe456ae14e712d1b6310b8b55bf509dd5591e22dbaf95c5702c9be1e7c948
-
SHA512
5887f14cd1fc7d2675ae360bcdf70e0f59362b95e7e3769f0a5d00b0592f3ba15a23b36c3af8f4db6b3eb79c22a2d9bfb97509f23c7c7cf748dcb5a43f1b9446
-
SSDEEP
1536:xYZx4GYeu4vJPto45SNSpZmhauCMZLlGniHiG29m7S9jeMYqL0ramJUp1/KRFqov:xCjvQT0oaulCNA7SJ3L0ramJg/sUo5
Malware Config
Signatures
Files
-
f30fe456ae14e712d1b6310b8b55bf509dd5591e22dbaf95c5702c9be1e7c948.exe windows x86
67cacce98064a4dc5a9553da0aca60a2
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
wsprintfA
UpdateWindow
TranslateMessage
ShowWindow
SetRect
SetClipboardData
ScreenToClient
ReleaseDC
RegisterClassA
PostThreadMessageA
PeekMessageA
OpenClipboard
MsgWaitForMultipleObjects
LoadCursorA
GetSystemMetrics
GetQueueStatus
GetForegroundWindow
GetDC
EmptyClipboard
DispatchMessageA
DestroyWindow
DefWindowProcA
DefDlgProcW
CreateWindowExA
CloseClipboard
ClientToScreen
CharToOemA
AdjustWindowRect
advapi32
SetSecurityDescriptorDacl
RegQueryValueExA
RegOpenKeyExA
RegOpenKeyA
OpenProcessToken
InitializeSecurityDescriptor
InitializeAcl
GetSecurityDescriptorDacl
GetLengthSid
GetAce
EqualSid
ElfRegisterEventSourceA
CryptExportKey
CryptEnumProvidersW
AllocateAndInitializeSid
AddAce
AddAccessAllowedAce
StartServiceCtrlDispatcherA
version
GetFileVersionInfoA
VerQueryValueA
GetFileVersionInfoSizeA
winmm
waveInReset
waveInOpen
waveInGetNumDevs
waveInStart
sndPlaySoundA
joyGetPosEx
WOW32ResolveMultiMediaHandle
waveOutPrepareHeader
waveOutUnprepareHeader
waveInGetDevCapsW
timeKillEvent
shell32
ShellExecuteA
SHFileOperationW
SHGetSpecialFolderPathW
ws2_32
socket
send
select
inet_addr
getservbyname
connect
WSAGetLastError
WSAAsyncGetHostByName
WSAAccept
kernel32
WritePrivateProfileSectionW
TlsGetValue
WideCharToMultiByte
WaitForSingleObject
UpdateResourceA
GetFileInformationByHandle
GetModuleHandleA
TlsFree
AddConsoleAliasW
BackupRead
BackupSeek
CloseHandle
CompareStringA
CreateDirectoryExA
CreateFileA
CreateSemaphoreA
DeleteCriticalSection
EnumLanguageGroupLocalesA
ExitProcess
GetCommandLineA
GetCompressedFileSizeW
GetConsoleMode
GetConsoleOutputCP
GetCurrentProcessId
WritePrivateProfileStructW
SetEnvironmentVariableA
RemoveDirectoryW
MulDiv
LeaveCriticalSection
IsBadHugeWritePtr
HeapFree
HeapCreate
HeapAlloc
GetSystemInfo
GlobalMemoryStatus
GlobalAlloc
GetWindowsDirectoryA
GetVersionExA
GetTempPathW
GetExitCodeProcess
dinput
DirectInputCreateW
ole32
IsEqualGUID
PropVariantClear
CoUninitialize
Sections
.text Size: 88KB - Virtual size: 87KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ