Static task
static1
Behavioral task
behavioral1
Sample
4d3d18dfef47730bbfc4ba88cfc11421e525f335b83f2901989a428dee0ade8b.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
4d3d18dfef47730bbfc4ba88cfc11421e525f335b83f2901989a428dee0ade8b.exe
Resource
win10v2004-20220901-en
General
-
Target
4d3d18dfef47730bbfc4ba88cfc11421e525f335b83f2901989a428dee0ade8b
-
Size
211KB
-
MD5
011459e03b1c3e7bca3dfdd3580f1290
-
SHA1
1e6821cb2a6ec7a8a8e3aa168a4e12d4bc6e8551
-
SHA256
4d3d18dfef47730bbfc4ba88cfc11421e525f335b83f2901989a428dee0ade8b
-
SHA512
f2e76d8f228ca83291b4cbadc1682ccbd7d1c0442a8cc50140eee4ef00ac89bb96fb81664b4b8e8bacd1b16aefd536fa69685da981811f0c2704a9d70b98a8cc
-
SSDEEP
3072:fyNLgSmcfEpHLPLcTU/U0ga7pG53B9KB9MJFnjUq0tOXbWw2sl2N+6f8mcMl1rFl:a5HnEprCgGxW8RjvDXb3l49nrP
Malware Config
Signatures
Files
-
4d3d18dfef47730bbfc4ba88cfc11421e525f335b83f2901989a428dee0ade8b.exe windows x86
a1f2a00057f2c98e0b1bf55fa2da0ab6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetFileAttributesA
GlobalLock
FindNextFileA
UnhandledExceptionFilter
HeapSize
GlobalFlags
GetStringTypeA
ExitProcess
ReleaseActCtx
GetVersion
CreateFileA
GetEnvironmentVariableA
lstrlenA
GetStringTypeW
GetACP
SetEndOfFile
FindResourceA
TlsGetValue
LocalFree
GetTimeZoneInformation
VirtualAlloc
GetProcAddress
GlobalFindAtomA
LocalFileTimeToFileTime
WideCharToMultiByte
TlsAlloc
SetConsoleCursorInfo
FlushFileBuffers
GetCommandLineA
LCMapStringW
SetSystemTime
CompareStringW
LoadResource
FreeEnvironmentStringsA
GetFileType
Sleep
GetLastError
GetCPInfo
DeleteFileA
InterlockedDecrement
GetOEMCP
FindFirstFileA
LockFile
GlobalUnlock
FileTimeToLocalFileTime
GetEnvironmentStringsW
UnlockFile
FindClose
InterlockedIncrement
GetThreadLocale
GlobalHandle
InitializeCriticalSection
Beep
GlobalAlloc
GetCurrentProcess
ReadFile
IsBadWritePtr
GlobalGetAtomNameA
GetEnvironmentStringsA
GetProcessVersion
GetFullPathNameA
GlobalDeleteAtom
GetStartupInfoA
TlsFree
FatalExit
LocalReAlloc
GetFileSize
FreeEnvironmentStringsW
DuplicateHandle
lstrcpynA
SetFilePointer
LeaveCriticalSection
HeapFree
GetDriveTypeA
LCMapStringA
GetCurrentThreadId
IsValidLocale
HeapDestroy
GetModuleFileNameA
IsBadCodePtr
SetCurrentDirectoryA
GetVolumeInformationA
Toolhelp32ReadProcessMemory
GetFileTime
lstrcmpiA
GetWindowsDirectoryA
GetModuleHandleA
RaiseException
SetUnhandledExceptionFilter
LoadLibraryA
CloseHandle
WriteFile
FreeLibrary
EnterCriticalSection
GetStdHandle
GetVersionExA
SetConsoleTextAttribute
FlushInstructionCache
IsDebuggerPresent
GetCurrentDirectoryA
LockResource
SystemTimeToFileTime
HeapCreate
RtlUnwind
lstrcmpA
GetSystemDirectoryA
TlsSetValue
MultiByteToWideChar
SetStdHandle
IsBadReadPtr
GetCurrentThread
LocalUnlock
InitializeSListHead
lstrcpyA
MulDiv
LocalAlloc
SystemTimeToTzSpecificLocalTime
GlobalAddAtomA
VirtualFree
DeleteCriticalSection
SetErrorMode
CompareStringA
SetFileAttributesA
lstrcatA
GlobalFree
DosDateTimeToFileTime
FileTimeToSystemTime
HeapAlloc
HeapReAlloc
SetHandleCount
ClearCommError
SetEnvironmentVariableA
SetLastError
gdi32
SelectClipRgn
DeleteObject
CreateBitmap
GetRelAbs
GdiPlayDCScript
ExtTextOutA
CreateDIBitmap
PtInRegion
GetDeviceCaps
SetMapMode
SetWindowExtEx
RestoreDC
DeleteDC
RoundRect
CreateEllipticRgn
ScaleViewportExtEx
GetClipBox
TextOutA
comdlg32
dwOKSubclass
GetFileTitleA
advapi32
LockServiceDatabase
RegSetValueExA
MSChapSrvChangePassword
AddAccessDeniedAceEx
SystemFunction016
AddUsersToEncryptedFile
SystemFunction030
RegCreateKeyExA
RegDeleteValueA
LsaEnumeratePrivileges
GetAclInformation
OpenThreadToken
RegCloseKey
LsaICLookupNamesWithCreds
SetSecurityDescriptorControl
RegOpenKeyExA
user32
GetSysColor
GetClientRect
CharUpperA
GetLastActivePopup
LoadBitmapA
SetWindowPos
IsWindowVisible
GetParent
ClientToScreen
GetWindowTextA
CreateWindowExA
WinHelpA
IsDialogMessageA
ShowWindow
DestroyWindow
DefWindowProcA
CreateDialogIndirectParamA
BeginPaint
GetDlgItem
EndDialog
GetDC
GetForegroundWindow
DestroyMenu
GetWindow
IsWindow
DrawIcon
GetWindowTextLengthA
EndPaint
CallNextHookEx
PostMessageA
PeekMessageA
GetMenuItemID
GetCapture
LoadIconA
UnregisterClassA
LoadStringA
UpdateWindow
GetMessageA
ExitWindowsEx
CopyRect
SetMenuItemBitmaps
TranslateMessage
wsprintfA
GetSystemMetrics
PtInRect
RegisterClassA
MapWindowPoints
ValidateRect
GetMenuCheckMarkDimensions
SystemParametersInfoA
GetCursorPos
EnableMenuItem
PostQuitMessage
MessageBoxA
CheckMenuItem
GrayStringA
GetMessagePos
EnableWindow
GetTopWindow
CallWindowProcA
IsWindowEnabled
SetActiveWindow
RemovePropA
GetPropA
SetWindowTextA
GetSubMenu
GetWindowLongA
SendDlgItemMessageA
SetForegroundWindow
ReleaseDC
GetMenuItemCount
LoadCursorA
SetWindowsHookExA
GetKeyState
GetMenuState
GetDlgCtrlID
GetFocus
GetSysColorBrush
GetWindowPlacement
GetClassInfoA
GetClassNameA
SetWindowLongA
GetMenu
SendMessageA
GetActiveWindow
GetWindowRect
UnhookWindowsHookEx
winmm
mmioAdvance
waveOutGetPitch
timeGetSystemTime
mixerOpen
Sections
.text Size: 187KB - Virtual size: 187KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ