Static task
static1
Behavioral task
behavioral1
Sample
f4c23791254b3d45ff20a8a05073c67db32aeefa077f225bde9d0ddd3acb5e63.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f4c23791254b3d45ff20a8a05073c67db32aeefa077f225bde9d0ddd3acb5e63.exe
Resource
win10v2004-20220901-en
General
-
Target
f4c23791254b3d45ff20a8a05073c67db32aeefa077f225bde9d0ddd3acb5e63
-
Size
23KB
-
MD5
afaf2bd78087b55d13bca314cddb2cdf
-
SHA1
4742af99b43af271ce11f5840a068490585bb622
-
SHA256
f4c23791254b3d45ff20a8a05073c67db32aeefa077f225bde9d0ddd3acb5e63
-
SHA512
0a3627fa26ecf8f985a5b68dbf40c86f5b0bb5b961e51803441bd778f2dd0848eb992a90e58f7e373ddef1bb40b62d1d02a7cd0c744940bc4643a5beef02340c
-
SSDEEP
384:zT9IRlngsHZOxXJAoE5f2Oh2Taopnf0iWRs5LD8/8gN3KxP7A2U0U4ls42xMJp:aMp9A2OcEin/C8fPnU4lmxK
Malware Config
Signatures
Files
-
f4c23791254b3d45ff20a8a05073c67db32aeefa077f225bde9d0ddd3acb5e63.exe windows x86
11ba96fcce39c5ccded4b40557f46919
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcmpiA
lstrcmpiW
GetSystemTimeAsFileTime
UnmapViewOfFile
GetUserDefaultUILanguage
GetSystemInfo
WideCharToMultiByte
GetCurrentProcessId
HeapFree
MapViewOfFileEx
InterlockedCompareExchange
CreateFileMappingW
LocalFree
DisableThreadLibraryCalls
WritePrivateProfileSectionW
HeapAlloc
GetSystemDefaultUILanguage
GetFullPathNameW
FindNextFileW
GetTempFileNameW
GetTempPathW
lstrcmpW
GetTickCount
GetLocalTime
GetFileTime
EnumResourceLanguagesW
SetFileTime
CopyFileW
VirtualAlloc
FreeConsole
GetModuleFileNameW
RtlUnwind
ReadFile
GetPrivateProfileStringW
LocalReAlloc
FindClose
FindResourceW
GetCurrentProcess
LoadResource
InterlockedExchange
GetProcessHeap
GetSystemDirectoryW
GetVersionExW
MoveFileExW
FindFirstFileW
GetFileSize
GetPrivateProfileIntW
lstrlenW
GetDiskFreeSpaceW
Sleep
MulDiv
TerminateProcess
GetDriveTypeW
GetWindowsDirectoryW
LockResource
GetVolumeInformationW
SizeofResource
CreateDirectoryW
CreateFileW
LocalAlloc
ExpandEnvironmentStringsW
MapViewOfFile
MoveFileW
SetUnhandledExceptionFilter
GetLastError
RemoveDirectoryW
QueryPerformanceCounter
SetFileAttributesW
FreeLibrary
GetPrivateProfileSectionW
CreateProcessW
LoadLibraryW
GetShortPathNameW
MultiByteToWideChar
SearchPathW
LoadLibraryExW
SetLastError
GetProcAddress
DeleteFileW
GetEnvironmentVariableW
CompareStringW
FormatMessageW
UnhandledExceptionFilter
GetCurrentThreadId
WritePrivateProfileStringW
GetLocaleInfoW
CloseHandle
SetFilePointer
GetFileAttributesW
GetProfileStringW
FindResourceExW
ole32
CoTaskMemFree
OleInitialize
OleUninitialize
msvcrt
memcpy
_wcsicmp
memmove
_vsnwprintf
longjmp
wcsncmp
_setjmp3
_wcsnicmp
_adjust_fdiv
_XcptFilter
_ultow
_vsnprintf
malloc
_wtoi
free
_initterm
memset
_wtol
_amsg_exit
bsearch
gdi32
GetStockObject
GetObjectW
CreateFontIndirectW
GetDeviceCaps
DeleteObject
usp10
ScriptGetFontProperties
shlwapi
PathFileExistsW
StrChrW
PathAppendW
StrRChrW
PathRemoveFileSpecW
PathCombineW
PathAddBackslashW
StrStrIW
PathBuildRootW
crypt32
CryptFormatObject
user32
LoadStringW
SetWindowTextW
SetDlgItemTextW
UpdateWindow
GetDlgItem
CharNextW
GetSystemMetrics
CharUpperW
GetDC
CreateDialogParamW
GetDlgItemTextW
DispatchMessageW
IsWindow
PeekMessageW
EnableWindow
DestroyWindow
ShowWindow
CharPrevW
SendDlgItemMessageW
SetWindowPos
MsgWaitForMultipleObjects
EndDialog
ExitWindowsEx
GetWindowRect
GetDesktopWindow
ReleaseDC
MessageBoxW
DialogBoxParamW
CharNextA
MessageBeep
OemToCharA
SendMessageW
Sections
.rsrc Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.text Size: 512B - Virtual size: 432B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ