Static task
static1
Behavioral task
behavioral1
Sample
04c48de77c23787aa77555484b9ff5a106208d0cbf306357f76e40125fe6a71f.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
04c48de77c23787aa77555484b9ff5a106208d0cbf306357f76e40125fe6a71f.exe
Resource
win10v2004-20221111-en
General
-
Target
04c48de77c23787aa77555484b9ff5a106208d0cbf306357f76e40125fe6a71f
-
Size
1008KB
-
MD5
51baccd096d3ddd46a217a9a13c3e200
-
SHA1
c9e78a0fbf2d11541bd8276b09e83c9ea4972b55
-
SHA256
04c48de77c23787aa77555484b9ff5a106208d0cbf306357f76e40125fe6a71f
-
SHA512
30069c69c911a916b8f162f2659fa7c3e695ec3ba4c81ee3d6038bbfe5561c91a336b3743bacdfc28aea85675a25a71e8ded5a3dcc5cfcb118d3b11193e8b46f
-
SSDEEP
6144:PcRqXqFmcLIe9GpoFpgH8+cj4L61gNpBPVs1cNIxKQswr3eV9z6Tk6kD55JwOVkN:PEq6FR0e9GpoFpI8ypBPO3ku/8SW
Malware Config
Signatures
Files
-
04c48de77c23787aa77555484b9ff5a106208d0cbf306357f76e40125fe6a71f.exe windows x86
4ecb3973993c9a4887919a54a6e8c9bd
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCPInfo
GetOEMCP
SetErrorMode
HeapFree
HeapAlloc
VirtualAlloc
GetSystemInfo
VirtualQuery
GetStartupInfoA
ExitProcess
RtlUnwind
GetSystemTimeAsFileTime
GetTimeFormatA
GetDateFormatA
TerminateProcess
HeapReAlloc
SetStdHandle
GetFileType
HeapSize
HeapDestroy
HeapCreate
GlobalFlags
IsBadWritePtr
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
SetUnhandledExceptionFilter
GetTimeZoneInformation
IsBadCodePtr
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
SetEnvironmentVariableA
GetLocaleInfoW
InterlockedIncrement
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
TlsGetValue
GlobalHandle
GlobalReAlloc
LocalAlloc
GetFileAttributesA
FileTimeToLocalFileTime
FileTimeToSystemTime
GetFullPathNameA
GetVolumeInformationA
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
WritePrivateProfileStringA
VirtualProtect
GlobalGetAtomNameA
GlobalFindAtomA
lstrcmpW
InterlockedDecrement
GlobalAddAtomA
GetCurrentThread
GetCurrentThreadId
GlobalDeleteAtom
lstrcmpA
ConvertDefaultLocale
EnumResourceLanguagesA
GlobalFree
MulDiv
GlobalAlloc
GlobalLock
GlobalUnlock
lstrcpynA
GetModuleHandleA
GetCommandLineA
GetFileTime
CreateFileA
GetCurrentProcess
CloseHandle
WaitForSingleObject
SetFileAttributesA
CreateDirectoryA
SetLastError
FindClose
FindFirstFileA
GetUserDefaultLCID
FreeResource
lstrcatA
WinExec
GetWindowsDirectoryA
lstrcpyA
IsBadReadPtr
GetProcAddress
LoadLibraryA
LeaveCriticalSection
EnterCriticalSection
FormatMessageA
LocalFree
FreeLibrary
GetModuleFileNameA
FindResourceA
LoadResource
LockResource
SizeofResource
GetVersion
GetVersionExA
DeleteCriticalSection
CompareStringA
GetThreadLocale
lstrcmpiA
GetLastError
InterlockedExchange
RaiseException
lstrlenW
MultiByteToWideChar
GetACP
CompareStringW
WideCharToMultiByte
InitializeCriticalSection
GetLocaleInfoA
lstrlenA
VirtualFree
user32
DestroyMenu
wsprintfA
WindowFromPoint
CreateDialogIndirectParamA
GetNextDlgTabItem
EndDialog
MoveWindow
EndPaint
BeginPaint
GetWindowDC
ClientToScreen
GrayStringA
DrawTextExA
TabbedTextOutA
GetCapture
GetClassLongA
SetPropA
GetPropA
RemovePropA
SendDlgItemMessageA
GetForegroundWindow
SetActiveWindow
GetDlgItem
GetMessageTime
GetMessagePos
MapWindowPoints
GetMenu
AdjustWindowRectEx
GetClassInfoA
RegisterClassA
CallWindowProcA
SetWindowPos
IsIconic
GetWindowPlacement
CopyRect
GetLastActivePopup
UnhookWindowsHookEx
SetWindowsHookExA
GetActiveWindow
PeekMessageA
ValidateRect
SetMenuItemBitmaps
ModifyMenuA
EnableMenuItem
CheckMenuItem
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
LoadIconA
DispatchMessageA
TranslateMessage
GetWindowTextLengthA
GetMessageA
UpdateWindow
ShowWindow
DefWindowProcA
PostQuitMessage
SetForegroundWindow
SetFocus
CreateWindowExA
GetClassInfoExA
FindWindowA
GetTopWindow
RegisterWindowMessageA
SetWindowTextA
GetDlgCtrlID
GetWindowLongA
GetClassNameA
GetWindowTextA
IsWindowEnabled
IsDialogMessageA
IsWindowVisible
MapDialogRect
GetWindow
KillTimer
GetCursorPos
SetWindowLongA
SetTimer
MessageBeep
GetDesktopWindow
CopyIcon
DrawTextA
DrawFocusRect
DestroyCursor
SetCursor
RedrawWindow
GetWindowRect
InflateRect
SetRectEmpty
PtInRect
MessageBoxA
GetKeyState
WinHelpA
GetParent
GetFocus
ScreenToClient
PostMessageA
SendMessageA
GetSystemMetrics
SystemParametersInfoA
GetSysColor
EnableWindow
ReleaseCapture
GetSysColorBrush
LoadCursorA
IsWindow
DestroyWindow
SetCapture
InvalidateRect
ReleaseDC
GetDC
GetClientRect
OffsetRect
CharUpperA
UnregisterClassA
CallNextHookEx
gdi32
DeleteDC
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
Escape
ExtTextOutA
RectVisible
PtVisible
CreateFontIndirectA
SetMapMode
SetBkMode
RestoreDC
SaveDC
SetBkColor
SetTextColor
GetClipBox
CreateBitmap
GetDeviceCaps
DeleteObject
SelectObject
GetTextExtentPointA
SetTextJustification
TextOutA
GetStockObject
GetObjectA
GetTextExtentPoint32A
comdlg32
GetFileTitleA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
RegEnumKeyA
RegQueryValueExA
RegOpenKeyExA
RegQueryValueA
RegCreateKeyExA
RegSetValueExA
RegDeleteKeyA
RegCloseKey
RegOpenKeyA
shell32
ShellExecuteA
comctl32
ord17
shlwapi
PathFindExtensionA
PathFindFileNameA
PathStripToRootA
PathIsDirectoryA
PathIsUNCA
ole32
CoUninitialize
CoInitialize
CoCreateInstance
oleaut32
VariantInit
VariantChangeType
VariantClear
SysFreeString
SysAllocStringLen
version
GetFileVersionInfoA
VerQueryValueA
GetFileVersionInfoSizeA
Sections
.text Size: 192KB - Virtual size: 190KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 56KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 76KB - Virtual size: 87KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 680KB - Virtual size: 679KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ