Static task
static1
Behavioral task
behavioral1
Sample
2519108914e6a2568ea7d6a0196f43ac6d3604a44c935df9ee3def907c68073c.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
2519108914e6a2568ea7d6a0196f43ac6d3604a44c935df9ee3def907c68073c.exe
Resource
win10v2004-20220812-en
General
-
Target
2519108914e6a2568ea7d6a0196f43ac6d3604a44c935df9ee3def907c68073c
-
Size
235KB
-
MD5
4637ca26fb495d0d1f5d65a9400ea220
-
SHA1
1513b831ba3aa8f31fddf878d87825b014e84aa2
-
SHA256
2519108914e6a2568ea7d6a0196f43ac6d3604a44c935df9ee3def907c68073c
-
SHA512
36b935828c46576053597abda84591d05c299fdab774176452f8125f02b6cd5de4bd2721e052f433763de2e4afde2ebdc887332a359a402cbef9fbd131f6fcbf
-
SSDEEP
3072:rNdEpx3D6NG8G31JY9cXDRn1NXGsh5onjQHXmTiT/TG+RXUxXZXxRz90fq9v/lOJ:TEv4G91RXDzJGE5oMHXg+RXUtJaQoJ
Malware Config
Signatures
Files
-
2519108914e6a2568ea7d6a0196f43ac6d3604a44c935df9ee3def907c68073c.exe windows x86
0fdf9d32a66cd1bd4c6876923678df3f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comdlg32
GetFileTitleA
gdi32
CreateEllipticRgn
CreateDIBitmap
GetDeviceCaps
ExtTextOutA
SetWindowExtEx
SetMapMode
DeleteObject
GetClipBox
SetViewportExtEx
GetRelAbs
DeleteDC
RestoreDC
RoundRect
TextOutA
ScaleViewportExtEx
kernel32
GlobalHandle
FindClose
EnterCriticalSection
GetFileType
GlobalAddAtomA
LocalReAlloc
RtlUnwind
HeapFree
LocalUnlock
LCMapStringW
GetThreadLocale
GetCurrentThreadId
GetCommandLineA
IsValidLocale
DeleteFileA
TlsGetValue
FlushFileBuffers
ReadFile
GetFullPathNameA
SetConsoleTextAttribute
GlobalFree
ReleaseActCtx
IsBadWritePtr
InitializeCriticalSection
GetVolumeInformationA
InterlockedDecrement
SetFilePointer
GetOEMCP
GetDriveTypeA
GlobalGetAtomNameA
FreeEnvironmentStringsA
GetCurrentProcess
HeapSize
GetLastError
SystemTimeToTzSpecificLocalTime
WideCharToMultiByte
VirtualAlloc
MulDiv
HeapReAlloc
GetStartupInfoA
ClearCommError
SetConsoleCursorInfo
GetCurrentDirectoryA
SetFileAttributesA
GetVersion
SetEnvironmentVariableA
TlsSetValue
SetUnhandledExceptionFilter
Beep
FileTimeToLocalFileTime
GetVersionExA
LockResource
DuplicateHandle
lstrcatA
LoadResource
GetWindowsDirectoryA
GetModuleHandleA
GetEnvironmentVariableA
lstrcpynA
GetEnvironmentStringsW
FileTimeToSystemTime
HeapDestroy
CloseHandle
GetModuleFileNameA
GetProcessVersion
LCMapStringA
GlobalUnlock
LeaveCriticalSection
SetErrorMode
GetEnvironmentStringsA
GlobalDeleteAtom
GetStdHandle
GetSystemDirectoryA
InterlockedIncrement
SetHandleCount
SetEndOfFile
DosDateTimeToFileTime
LocalAlloc
InitializeSListHead
GetFileAttributesA
lstrcmpiA
GetStringTypeA
SetLastError
GetProcAddress
GetStringTypeW
FlushInstructionCache
MultiByteToWideChar
SetCurrentDirectoryA
GlobalAlloc
CompareStringA
GlobalLock
LoadLibraryA
FreeEnvironmentStringsW
HeapAlloc
FindNextFileA
FreeLibrary
GetTimeZoneInformation
Toolhelp32ReadProcessMemory
LocalFree
FindResourceA
VirtualFree
GetCPInfo
LocalFileTimeToFileTime
IsBadCodePtr
GetFileTime
lstrcpyA
CompareStringW
RaiseException
GlobalFindAtomA
IsBadReadPtr
SetSystemTime
TlsFree
SetStdHandle
GlobalFlags
LockFile
SystemTimeToFileTime
lstrcmpA
IsDebuggerPresent
GetACP
DeleteCriticalSection
CreateFileA
HeapCreate
ExitProcess
UnlockFile
UnhandledExceptionFilter
GetCurrentThread
WriteFile
TlsAlloc
Sleep
GetFileSize
FindFirstFileA
lstrlenA
winmm
timeGetSystemTime
mmioAdvance
waveOutGetPitch
advapi32
RegCreateKeyExA
RegSetValueExA
OpenThreadToken
RegCloseKey
SetSecurityDescriptorControl
LsaICLookupNamesWithCreds
RegOpenKeyExA
LockServiceDatabase
RegDeleteValueA
AddUsersToEncryptedFile
GetAclInformation
MSChapSrvChangePassword
LsaEnumeratePrivileges
SystemFunction016
user32
GetMessagePos
PtInRect
SetWindowsHookExA
UpdateWindow
GetWindowTextLengthA
GetSubMenu
UnregisterClassA
GetClassNameA
LoadCursorA
MapWindowPoints
GetMenuItemCount
GetSysColor
GetFocus
EndPaint
GetActiveWindow
IsWindowVisible
RemovePropA
IsWindow
ValidateRect
ShowWindow
CheckMenuItem
PeekMessageA
SetWindowTextA
DestroyWindow
GetClientRect
EnableWindow
CharUpperA
GetWindowLongA
GetClassInfoA
GetMenuItemID
DrawIcon
GrayStringA
ExitWindowsEx
IsDialogMessageA
WinHelpA
CallWindowProcA
SetWindowLongA
CreateDialogIndirectParamA
EndDialog
LoadStringA
GetParent
IsWindowEnabled
MessageBoxA
GetDlgCtrlID
TranslateMessage
EnableMenuItem
LoadBitmapA
GetSystemMetrics
GetMenuCheckMarkDimensions
SystemParametersInfoA
GetWindowPlacement
CreateWindowExA
PostQuitMessage
SetPropA
GetSysColorBrush
GetKeyState
SetMenuItemBitmaps
wsprintfA
SetActiveWindow
GetTopWindow
GetMenuState
BeginPaint
SendMessageA
GetWindowRect
PostMessageA
GetWindow
GetLastActivePopup
RegisterClassA
GetForegroundWindow
GetMessageA
GetWindowTextA
GetDC
SetWindowPos
GetDlgItem
ReleaseDC
CallNextHookEx
SetForegroundWindow
SendDlgItemMessageA
LoadIconA
GetMenu
GetCursorPos
ClientToScreen
GetCapture
CopyRect
UnhookWindowsHookEx
GetPropA
DestroyMenu
Sections
.text Size: 201KB - Virtual size: 201KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 504B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ