Static task
static1
Behavioral task
behavioral1
Sample
c2a2fcf04e42cc3aa1d32cbcbbdad1f0c52e421690ffe0db4db35789cd2d3b62.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c2a2fcf04e42cc3aa1d32cbcbbdad1f0c52e421690ffe0db4db35789cd2d3b62.exe
Resource
win10v2004-20220812-en
General
-
Target
c2a2fcf04e42cc3aa1d32cbcbbdad1f0c52e421690ffe0db4db35789cd2d3b62
-
Size
165KB
-
MD5
669110614ddb55c7fe76ed066c2d83c9
-
SHA1
18e03e42063d5a5ba34c5dc099ce48fc21e855b1
-
SHA256
c2a2fcf04e42cc3aa1d32cbcbbdad1f0c52e421690ffe0db4db35789cd2d3b62
-
SHA512
eb219b7d4f3d91c9bd0915aaa4df861411a0d443552339f452fd75189df03dc0b75f4cc13bfa67cbe8ae8ed3bbe224c427fe110ad27793db876c66117367ac98
-
SSDEEP
3072:ReGlO/laYP9Af/iyXYi/lEcZQcis1ejEBid076EHPsmL5LCTm0u974KBrxxzYNv:ReGlWQYPByIiWhNKLBTjt5eK393Brxx6
Malware Config
Signatures
Files
-
c2a2fcf04e42cc3aa1d32cbcbbdad1f0c52e421690ffe0db4db35789cd2d3b62.exe windows x86
25302e592a430bb5c4b4fa27e1f02e4d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_DEBUG_STRIPPED
Imports
ole32
OleUninitialize
OleInitialize
CoCreateInstance
CoTaskMemFree
user32
CloseClipboard
CreateDialogParamW
SetClassLongW
GetDlgItem
FindWindowExW
OpenClipboard
InvalidateRect
DialogBoxParamW
CheckDlgButton
DefWindowProcW
GetSystemMetrics
CallWindowProcW
LoadImageW
CreatePopupMenu
wsprintfW
ShowWindow
SystemParametersInfoW
PeekMessageW
GetWindowModuleFileNameW
SendMessageW
GetDC
AppendMenuW
LoadBitmapW
GetDlgItemTextW
GetSysColor
GetSystemMenu
SetWindowPos
IsWindowVisible
SetTimer
CreateWindowExW
FillRect
GetWindowRect
TrackPopupMenu
GetMessagePos
PostQuitMessage
LoadCursorW
SetClipboardData
EnableWindow
EnableMenuItem
CharPrevW
SetCursor
MessageBoxIndirectW
BeginPaint
CharNextW
EmptyClipboard
EndDialog
DrawTextW
SetForegroundWindow
DispatchMessageW
wsprintfA
GetClientRect
CharNextA
SendMessageTimeoutW
ExitWindowsEx
CharUpperW
GetClassInfoW
IsWindowEnabled
SetWindowLongW
DestroyWindow
SetWindowTextW
SetDlgItemTextW
EndPaint
RegisterClassW
IsWindow
ScreenToClient
kernel32
CreateThread
GetTempFileNameW
MulDiv
GetSystemDirectoryW
LoadLibraryA
ExitProcess
ReadFile
GetVersionExW
GetTickCount
Sleep
lstrcpyA
WriteConsoleInputVDMA
GetExitCodeProcess
GetDiskFreeSpaceW
GetFullPathNameW
LoadLibraryExW
GetProcessHandleCount
lstrcatW
GetProcAddress
SetFilePointer
MultiByteToWideChar
GetVersion
WideCharToMultiByte
GetModuleHandleA
CreateProcessW
lstrcmpW
lstrlenA
GetCommandLineW
FindFirstFileW
GetShortPathNameW
GetPrivateProfileStringW
GetCurrentProcess
DeleteFileW
CreateFileW
EnumResourceNamesA
CloseHandle
GetModuleHandleW
GetFileAttributesW
SetCurrentDirectoryW
GlobalLock
MoveFileW
FindClose
FreeLibrary
GetLastError
OpenProcess
GetModuleFileNameW
lstrcmpiW
GetFileSize
lstrcpynW
CreateDirectoryW
FreeEnvironmentStringsW
GlobalFree
WritePrivateProfileStringW
LoadLibraryW
WriteFile
SetFileAttributesW
GetTempPathW
GlobalAlloc
lstrcmpiA
WaitForSingleObject
CompareFileTime
GlobalUnlock
FindNextFileW
SetErrorMode
SearchPathW
GetWindowsDirectoryW
lstrcpyW
ExpandEnvironmentStringsW
lstrlenW
RemoveDirectoryW
CopyFileW
lstrcpynA
SetFileTime
version
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
oleacc
LresultFromObject
CreateStdAccessibleObject
comctl32
ImageList_Create
ImageList_Destroy
ImageList_AddMasked
advapi32
RegOpenKeyExW
RegEnumValueW
RegDeleteValueW
RegDeleteKeyW
RegSetValueExW
RegCreateKeyExW
RegCloseKey
RegQueryValueExW
RegEnumKeyW
gdi32
CreateFontIndirectW
SelectObject
CreateBrushIndirect
GetDeviceCaps
SetTextColor
SetBkMode
DeleteObject
SetBkColor
shell32
ShellExecuteW
SHGetSpecialFolderLocation
SHGetPathFromIDListW
SHGetFileInfoW
SHFileOperationW
SHBrowseForFolderW
Sections
.text Size: 83KB - Virtual size: 82KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 75KB - Virtual size: 75KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idive Size: 1024B - Virtual size: 380KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ