Static task
static1
Behavioral task
behavioral1
Sample
a50a9d97e764010b8e03515ac4d2b2d8c03133f902507f8694cc9a71ad86f832.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a50a9d97e764010b8e03515ac4d2b2d8c03133f902507f8694cc9a71ad86f832.exe
Resource
win10v2004-20221111-en
General
-
Target
a50a9d97e764010b8e03515ac4d2b2d8c03133f902507f8694cc9a71ad86f832
-
Size
780KB
-
MD5
12061d2eecc91b8e4821e45c3bd9c02c
-
SHA1
00e1fbda26674f309e93de285c4877d5cd869199
-
SHA256
a50a9d97e764010b8e03515ac4d2b2d8c03133f902507f8694cc9a71ad86f832
-
SHA512
1bf7a522b866cb77a417f3245b2323b2fbba2b4f30f91a00ee0e8bcc036045d59341c32b1c063b287508c8dc47f218ffdd95e1f61a66f24d7e05fdb68d16c496
-
SSDEEP
12288:ch8PKGiay27XSuQIkffDgE+CxiKQxiKQxiKQxiKQxiKQxiKQxiKQxiKA+eQxiKQH:ch8CGRvCU6ibibibibibibibiVaibi
Malware Config
Signatures
Files
-
a50a9d97e764010b8e03515ac4d2b2d8c03133f902507f8694cc9a71ad86f832.exe windows x86
9eaf1d8104167e5fc5f4537d166364ec
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
oleaut32
SysAllocStringLen
SysAllocString
SysFreeString
kernel32
Sleep
VirtualFree
FindResourceW
UnmapViewOfFile
IsValidCodePage
CreateProcessA
SizeofResource
GetVersion
GetACP
lstrcpynA
CloseHandle
ReadFile
SetFilePointer
TlsFree
MapViewOfFile
RaiseException
GetCurrentThread
InterlockedCompareExchange
GetCommandLineA
HeapSize
GetCPInfo
GetCommandLineW
LockResource
GetCurrentProcessId
GetEnvironmentStrings
lstrlenW
GlobalUnlock
GetEnvironmentStringsW
LCMapStringA
GetConsoleCP
GlobalFree
lstrlenA
GetSystemInfo
HeapCreate
SetStdHandle
LoadLibraryExW
GetLastError
LeaveCriticalSection
ExitProcess
CreateFileA
TlsSetValue
GetFileType
CreateEventA
GetTimeZoneInformation
RemoveDirectoryA
GlobalLock
WaitForMultipleObjects
FindFirstFileW
CreateFileMappingA
ResetEvent
CompareStringA
CompareStringW
WriteFile
GetProcAddress
GetModuleHandleW
CreateDirectoryA
LCMapStringW
GetStartupInfoA
DeleteFileA
LoadLibraryA
GetVersionExA
TlsAlloc
GetTickCount
QueryPerformanceCounter
IsBadReadPtr
LoadLibraryW
SetHandleCount
EnterCriticalSection
HeapFree
WriteConsoleW
InterlockedIncrement
GetCurrentThreadId
SetEndOfFile
VirtualQuery
WriteConsoleA
TerminateProcess
SetEnvironmentVariableA
GetSystemDirectoryA
MulDiv
SetUnhandledExceptionFilter
CreateThread
GetModuleHandleA
GetLocalTime
MultiByteToWideChar
TlsGetValue
UnhandledExceptionFilter
GetModuleFileNameA
FlushFileBuffers
HeapAlloc
IsDebuggerPresent
GetModuleFileNameW
SetLastError
InterlockedDecrement
FindClose
LoadResource
InitializeCriticalSection
LocalFree
SetEvent
SetFileAttributesA
GetStringTypeW
HeapReAlloc
GetSystemTimeAsFileTime
InterlockedExchange
GetStringTypeA
lstrcmpiA
WideCharToMultiByte
FreeEnvironmentStringsW
SetErrorMode
LocalAlloc
GetLocaleInfoA
GetConsoleMode
GetCurrentDirectoryA
GetCurrentProcess
DeleteCriticalSection
FreeEnvironmentStringsA
GetFileAttributesW
HeapDestroy
WaitForSingleObject
FileTimeToSystemTime
GetConsoleOutputCP
GetStdHandle
GetProcessHeap
GetEnvironmentVariableA
RtlUnwind
FindResourceA
VirtualAlloc
GetOEMCP
FreeLibrary
gdi32
SetTextColor
SelectObject
CreateSolidBrush
user32
GetDesktopWindow
LoadIconA
ScreenToClient
GetDlgItem
CreateWindowExA
GetSubMenu
SetWindowTextA
PostMessageA
IsIconic
GetWindowRect
GetSystemMetrics
KillTimer
BeginPaint
PeekMessageA
SetFocus
EndPaint
DispatchMessageA
FillRect
SetTimer
GetWindowLongA
MessageBoxA
EnableMenuItem
LoadStringA
IsWindowEnabled
EnableWindow
ShowWindow
GetMessageA
DestroyWindow
TrackPopupMenu
GetClientRect
ReleaseDC
GetDC
SetWindowPos
PostQuitMessage
SetForegroundWindow
DefWindowProcA
UpdateWindow
TranslateMessage
RegisterClassExA
LoadCursorA
InvalidateRect
SendMessageA
RegisterClassA
SetCursor
advapi32
RegCloseKey
RegOpenKeyExA
RegQueryValueExW
Sections
.text Size: 48KB - Virtual size: 47KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 716KB - Virtual size: 713KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 12KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE