Static task
static1
Behavioral task
behavioral1
Sample
656a7f8eafb6ad52774a85e6730e4412e81221b362c675b4ac1005dee5f47e60.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
656a7f8eafb6ad52774a85e6730e4412e81221b362c675b4ac1005dee5f47e60.exe
Resource
win10v2004-20220812-en
General
-
Target
656a7f8eafb6ad52774a85e6730e4412e81221b362c675b4ac1005dee5f47e60
-
Size
842KB
-
MD5
10d3c321292395d27cf237247dfe5b20
-
SHA1
578eb6044fa39787ef66686d7a16254490575c73
-
SHA256
656a7f8eafb6ad52774a85e6730e4412e81221b362c675b4ac1005dee5f47e60
-
SHA512
d10deab39a9220abf6ff0925cbb3915e977a6a1be82d14a052317032ccbf44d8870be0b3b06ccaebb2e541e5116a6f66694b5c1a3717e6dc03651c146e254b48
-
SSDEEP
24576:pe6FFG1Qul3xxC2tnTUA16G//0HAaeSr4Y84u:pe6f5uBp716s/WAEsY84u
Malware Config
Signatures
Files
-
656a7f8eafb6ad52774a85e6730e4412e81221b362c675b4ac1005dee5f47e60.exe windows x86
32f36a6270519d36504b2e4e5bdacebf
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SizeofResource
SetErrorMode
HeapCreate
GetCurrentProcessId
HeapDestroy
SetHandleCount
GetVersionExA
UnhandledExceptionFilter
GetModuleFileNameA
FreeEnvironmentStringsA
CompareStringA
LocalAlloc
CreateFileA
WriteConsoleA
SetFileTime
GlobalReAlloc
HeapAlloc
QueryPerformanceCounter
RaiseException
SetEnvironmentVariableA
LoadResource
TlsGetValue
GetACP
IsDebuggerPresent
GetTimeZoneInformation
GetLastError
VirtualQuery
LCMapStringA
GetVersion
GetCommandLineW
InterlockedDecrement
FlushFileBuffers
ConvertDefaultLocale
GetConsoleOutputCP
GlobalFlags
GetSystemInfo
DeleteCriticalSection
LocalReAlloc
GetFileSize
Sleep
SystemTimeToFileTime
DuplicateHandle
GlobalHandle
LeaveCriticalSection
GetProcessHeap
GetStdHandle
GetFileType
InterlockedIncrement
lstrcmpA
GetCurrentThread
EnterCriticalSection
FileTimeToLocalFileTime
WriteFile
MulDiv
GlobalLock
CloseHandle
VirtualFree
GetLocaleInfoA
GetStartupInfoA
GetConsoleCP
TlsAlloc
TlsFree
GetSystemDirectoryA
GetCommandLineA
ReadFile
GetThreadLocale
RtlUnwind
lstrlenA
LockResource
GetWindowsDirectoryA
SetLastError
UnlockFile
SetFilePointer
FileTimeToSystemTime
TlsSetValue
GlobalDeleteAtom
GlobalUnlock
InterlockedExchange
LocalFree
LockFile
HeapFree
GetStringTypeA
SetEndOfFile
SetStdHandle
GetConsoleMode
HeapReAlloc
FreeResource
GetEnvironmentStrings
LocalFileTimeToFileTime
GetFileTime
SetUnhandledExceptionFilter
GetSystemTimeAsFileTime
TerminateProcess
EnumResourceLanguagesW
InitializeCriticalSection
VirtualAlloc
FreeLibrary
HeapSize
lstrcpyA
GetCurrentThreadId
GetModuleHandleA
GetOEMCP
LoadLibraryA
GetLocalTime
GlobalFree
GetProcAddress
lstrcatA
GlobalAlloc
FindClose
ExitProcess
user32
TrackPopupMenu
PostQuitMessage
GetNextDlgTabItem
DrawIcon
ShowScrollBar
IntersectRect
BeginPaint
IsZoomed
GetWindowRect
MapDialogRect
CreatePopupMenu
GetMenuItemCount
SendDlgItemMessageA
SetScrollRange
GetActiveWindow
BeginDeferWindowPos
SetActiveWindow
ReleaseDC
SetMenu
SystemParametersInfoA
SetCursor
GetScrollInfo
UnhookWindowsHookEx
ScrollWindow
GetMenuCheckMarkDimensions
GetNextDlgGroupItem
CopyRect
RedrawWindow
SetScrollPos
UnpackDDElParam
EndPaint
MapWindowPoints
GetWindowPlacement
MessageBeep
IsWindow
SetMenuItemBitmaps
SetWindowRgn
ValidateRect
TranslateMessage
GetSubMenu
CallNextHookEx
GetDesktopWindow
IsWindowVisible
UpdateWindow
UnregisterClassA
IsWindowEnabled
GetScrollPos
CheckMenuItem
EndDialog
GetDCEx
GetWindowThreadProcessId
BringWindowToTop
SetTimer
SetRect
GetSystemMetrics
ShowOwnedPopups
ReleaseCapture
GetForegroundWindow
SetFocus
GetDlgItem
GetTopWindow
GetLastActivePopup
GetClientRect
PtInRect
GetParent
GetDlgCtrlID
GetMenuState
IsChild
GetMessagePos
GetScrollRange
GetSysColorBrush
ReuseDDElParam
ShowWindow
OffsetRect
MoveWindow
GetWindowDC
SetRectEmpty
SetScrollInfo
SetParent
InvalidateRgn
SetWindowPos
WindowFromPoint
GetFocus
GetSysColor
IsIconic
DestroyIcon
DestroyWindow
GetWindowRgn
GetWindow
EnableMenuItem
GetMessageTime
EndDeferWindowPos
SetCapture
ScreenToClient
GetCapture
GetSystemMenu
GetCursorPos
FillRect
SetWindowContextHelpId
GetDC
GetMenuItemID
InflateRect
GetKeyState
SetForegroundWindow
AdjustWindowRectEx
KillTimer
IsRectEmpty
InvalidateRect
LockWindowUpdate
DestroyMenu
DeferWindowPos
EqualRect
ClientToScreen
DeleteMenu
GetMenu
gdi32
SetTextColor
CreateEllipticRgn
SetWindowExtEx
SelectClipRgn
CreatePatternBrush
CombineRgn
SetViewportExtEx
BitBlt
RestoreDC
SetBkMode
GetDeviceCaps
CreateSolidBrush
CreateRectRgnIndirect
CreateRectRgn
OffsetViewportOrgEx
Escape
ScaleViewportExtEx
ExcludeClipRect
IntersectClipRect
GetMapMode
ExtSelectClipRgn
ScaleWindowExtEx
GetWindowExtEx
SetViewportOrgEx
DPtoLP
GetBkColor
DeleteDC
RectVisible
SetMapMode
CreateCompatibleBitmap
OffsetRgn
SetBkColor
GetRgnBox
PtVisible
SaveDC
Ellipse
PatBlt
GetStockObject
CreateCompatibleDC
DeleteObject
StretchDIBits
SelectObject
CreateBitmap
GetTextColor
GetClipBox
SetRectRgn
GetPixel
advapi32
SetFileSecurityW
RegCloseKey
shell32
DragFinish
ole32
CoRevokeClassObject
OleFlushClipboard
StgOpenStorageOnILockBytes
OleUninitialize
CLSIDFromProgID
CoFreeUnusedLibraries
StgCreateDocfileOnILockBytes
CoGetClassObject
OleInitialize
CreateILockBytesOnHGlobal
CoRegisterMessageFilter
CLSIDFromString
OleIsCurrentClipboard
CreateStreamOnHGlobal
CoCreateInstance
oleaut32
OleLoadPicture
OleCreateFontIndirect
SysStringLen
VariantInit
SysAllocString
SafeArrayDestroy
VariantTimeToSystemTime
VariantClear
SystemTimeToVariantTime
VariantCopy
SysAllocStringLen
SysFreeString
VariantChangeType
comctl32
ImageList_LoadImageW
shlwapi
PathFindExtensionW
PathFindFileNameW
PathRemoveExtensionW
PathStripToRootW
PathFileExistsW
PathIsUNCW
wldap32
ord201
msvcrt
atoi
Sections
.text Size: 474KB - Virtual size: 474KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 344KB - Virtual size: 364KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ