Static task
static1
Behavioral task
behavioral1
Sample
ed940f539cbec7e0b520fc66f638acc1d955ab1f3a9b00dee878c01bf2cbb40b.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
ed940f539cbec7e0b520fc66f638acc1d955ab1f3a9b00dee878c01bf2cbb40b.exe
Resource
win10v2004-20221111-en
General
-
Target
ed940f539cbec7e0b520fc66f638acc1d955ab1f3a9b00dee878c01bf2cbb40b
-
Size
4.5MB
-
MD5
8544861529495b71381a21bdd2c89d37
-
SHA1
feb0a041fa3d9d6697d750bcd2875e52a085a74d
-
SHA256
ed940f539cbec7e0b520fc66f638acc1d955ab1f3a9b00dee878c01bf2cbb40b
-
SHA512
520a5d587bb6e64453beb986c092f4c67f90e1c75aa9b110f7c893d4a68720c43c3805ead952693f08d8fe8b882d1f6234e05f59f5743bf78eaa5a96f7563a1c
-
SSDEEP
98304:XzLu0NAhy+AiA0/gJf6PD3Nmn7AJEgLYXMKUCCCNYzQEr0WO0Yk84VD3uv5gaU0e:2Hy+ADJiPD3Nm7AJEgLYX8CNYzQEr0W/
Malware Config
Signatures
Files
-
ed940f539cbec7e0b520fc66f638acc1d955ab1f3a9b00dee878c01bf2cbb40b.exe windows x86
af5f1b83119524b42e868a751fa14a5b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcatA
lstrlenA
Sleep
GetFileSize
ReadFile
SetFilePointer
DuplicateHandle
GetModuleHandleA
MultiByteToWideChar
TerminateThread
OpenProcess
IsBadReadPtr
SetLastError
GetVersionExA
FreeLibrary
WaitForSingleObject
ResumeThread
SetThreadContext
GetThreadContext
CreateEventA
SuspendThread
CopyFileA
GetSystemTime
FindClose
FindNextFileA
FindFirstFileA
EndUpdateResourceA
UpdateResourceA
BeginUpdateResourceA
GetSystemDefaultLangID
lstrcpyW
lstrlenW
CreateProcessA
MoveFileA
ExpandEnvironmentStringsA
GetWindowsDirectoryW
InitializeCriticalSection
GetLastError
SetEnvironmentVariableA
CompareStringW
CompareStringA
FlushFileBuffers
LCMapStringW
LCMapStringA
GetStringTypeW
GetStringTypeA
SetStdHandle
GetOEMCP
GetACP
GetCPInfo
IsBadCodePtr
InterlockedIncrement
InterlockedDecrement
SetUnhandledExceptionFilter
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
WideCharToMultiByte
FreeEnvironmentStringsW
FreeEnvironmentStringsA
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
IsBadWritePtr
HeapCreate
HeapDestroy
GetEnvironmentVariableA
HeapSize
HeapReAlloc
UnhandledExceptionFilter
HeapAlloc
TlsAlloc
GetCurrentThreadId
RaiseException
ExitProcess
LoadLibraryA
UnmapViewOfFile
GetProcAddress
CreateFileA
WriteFile
GetCurrentDirectoryA
GetCurrentProcessId
GetSystemDirectoryA
SetFileAttributesA
GetModuleFileNameA
VirtualProtect
VirtualAlloc
WinExec
CreateToolhelp32Snapshot
Process32First
Process32Next
Module32First
Module32Next
CloseHandle
GetCurrentProcess
TerminateProcess
DeleteFileA
GetVersion
GetCommandLineA
GetStartupInfoA
HeapFree
RtlUnwind
GetLocalTime
GetTimeZoneInformation
ExitThread
TlsGetValue
TlsSetValue
CreateThread
VirtualFree
lstrcpyA
CreateFileMappingA
MapViewOfFile
user32
EndDialog
MessageBoxA
GetWindowThreadProcessId
SystemParametersInfoA
GetWindow
GetClassNameA
IsWindow
GetTopWindow
IsWindowVisible
FindWindowA
wsprintfA
LoadIconA
GetDlgItem
CheckDlgButton
EnableWindow
SetDlgItemTextA
GetDlgItemTextA
GetClassNameW
IsDlgButtonChecked
GetKeyboardLayoutNameA
GetKeyboardLayoutList
UnloadKeyboardLayout
ReleaseCapture
ClientToScreen
SetCursor
SetCapture
LoadBitmapA
LoadCursorA
WindowFromPoint
GetParent
PtInRect
GetWindowDC
GetWindowRect
OffsetRect
IsRectEmpty
ReleaseDC
DialogBoxParamA
GetClassInfoExA
RegisterClassExA
WaitForInputIdle
SendMessageA
PeekMessageA
TranslateMessage
DispatchMessageA
PostMessageA
gdi32
PatBlt
advapi32
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegCloseKey
RegEnumKeyExA
RegCreateKeyA
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
RegDeleteKeyA
RegOpenKeyA
RegEnumValueA
shell32
ShellExecuteExA
ShellExecuteA
ws2_32
inet_addr
send
socket
htons
connect
closesocket
inet_ntoa
gethostbyname
WSAStartup
recv
__WSAFDIsSet
select
imm32
ImmGetDescriptionA
ImmIsIME
shlwapi
PathFileExistsA
PathFindExtensionA
PathFindFileNameA
StrCatW
PathRenameExtensionA
PathRemoveFileSpecA
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
Sections
.text Size: 168KB - Virtual size: 164KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3.2MB - Virtual size: 3.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 57KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text0 Size: 68KB - Virtual size: 67KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text1 Size: 976KB - Virtual size: 975KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 68KB - Virtual size: 67KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ