Static task
static1
Behavioral task
behavioral1
Sample
f55a9139c1a5cc56423f0a8ac71b319aa2c6f90b55a657536f296534c543b171.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f55a9139c1a5cc56423f0a8ac71b319aa2c6f90b55a657536f296534c543b171.exe
Resource
win10v2004-20221111-en
General
-
Target
f55a9139c1a5cc56423f0a8ac71b319aa2c6f90b55a657536f296534c543b171
-
Size
34KB
-
MD5
9c159bc948a66ae9de64d727ed693784
-
SHA1
64c8861efa10704d505cd72664079ed6eb83f569
-
SHA256
f55a9139c1a5cc56423f0a8ac71b319aa2c6f90b55a657536f296534c543b171
-
SHA512
96c6a014bafe62d5f30d6c21f23bac4517de679e94fe737cb2754a2c8c572e2cb8f380cd28e89efb9445c421f1a13b2b174045d4bc63fdcb28648f087beebcca
-
SSDEEP
768:mIKHvHXf5OELs4ORfAgb9s7ur++JlEqTVMwJh/B3V3z:M/Le44ou3NGwL
Malware Config
Signatures
Files
-
f55a9139c1a5cc56423f0a8ac71b319aa2c6f90b55a657536f296534c543b171.exe windows x86
1e51b55bbf4a0bd8848e58b40d9a62b7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
GetSecurityDescriptorDacl
RegCreateKeyExA
RegOpenKeyExA
icmp
IcmpSendEcho
IcmpCreateFile
IcmpCloseHandle
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
crtdll
_environ_dll
free
_fpreset
msvcrt
_wcsnicmp
strncpy
iswalpha
kernel32
CloseHandle
CreateDirectoryW
CreateMutexW
DeleteFileA
FileTimeToDosDateTime
FindCloseChangeNotification
CopyFileA
ExitThread
EnterCriticalSection
FindNextFileW
CreateEventA
CreateFileMappingW
FindNextFileA
FindResourceW
FormatMessageA
DeleteFileW
CreateFileMappingA
GetAtomNameA
GetConsoleCP
FreeResource
FlushFileBuffers
GetConsoleOutputCP
GetEnvironmentVariableA
FindResourceA
GetLogicalDrives
GetDriveTypeW
GetThreadContext
GetModuleHandleA
GetShortPathNameA
GetCurrentProcess
GetCurrentThread
GetModuleFileNameA
GetTempPathW
GetFileTime
GetStringTypeExW
GetStartupInfoW
GetTempPathA
GetPrivateProfileSectionW
GetVersionExW
GlobalSize
GetUserDefaultLCID
IsValidLocale
GetVersion
GetPrivateProfileStringA
GetLocaleInfoA
GetProcessHeap
GlobalAlloc
GlobalAddAtomA
GetExitCodeThread
lstrlenW
GetPrivateProfileStringW
GetThreadPriority
GetTimeZoneInformation
GetTempFileNameW
OutputDebugStringA
SetFileAttributesA
GetUserDefaultLangID
lstrcpynA
LockResource
ReadFile
LocalAlloc
OpenFileMappingW
OpenMutexW
lstrcmpiA
ReleaseMutex
InterlockedDecrement
LoadResource
HeapFree
SetErrorMode
UnmapViewOfFile
SetThreadPriority
MultiByteToWideChar
SetEndOfFile
SetUnhandledExceptionFilter
WritePrivateProfileSectionW
TlsSetValue
lstrcpyA
WriteConsoleA
SetCurrentDirectoryW
RaiseException
SetFileAttributesW
UnhandledExceptionFilter
TlsAlloc
WinExec
VirtualQueryEx
WriteConsoleW
MoveFileExW
SetLastError
WideCharToMultiByte
SystemTimeToFileTime
VirtualAlloc
WaitForSingleObject
SearchPathA
SizeofResource
TerminateProcess
user32
ActivateKeyboardLayout
CharLowerA
CallNextHookEx
DestroyIcon
DefFrameProcA
CheckMenuItem
CreateIcon
CharLowerBuffA
DrawFocusRect
DeleteMenu
EmptyClipboard
GetClassNameW
DrawIconEx
GetClipboardFormatNameA
FrameRect
DdeClientTransaction
GetCursorPos
FindWindowA
EndDeferWindowPos
EnumClipboardFormats
EnableWindow
GetClipboardData
EndDialog
GetCaretPos
DialogBoxIndirectParamA
GetDlgItemTextW
GetMenu
GetActiveWindow
GetWindowThreadProcessId
GetKeyNameTextA
GetDoubleClickTime
GetFocus
GetMenuItemInfoA
GetKeyState
GetMenuState
GetSysColor
GetWindowPlacement
GetDesktopWindow
GetUpdateRect
GetMenuStringA
GetWindowRect
MessageBoxA
GetQueueStatus
HideCaret
GetKeyboardLayoutNameA
IsZoomed
RegisterClassA
IsCharAlphaA
InvalidateRect
IntersectRect
IsDialogMessageA
GetSystemMenu
IsWindow
KillTimer
IsChild
IsDlgButtonChecked
GetUpdateRgn
OpenClipboard
IsRectEmpty
LoadMenuW
SetFocus
IsCharAlphaNumericA
TrackPopupMenuEx
SetMenu
SetKeyboardState
SetCursor
LockWindowUpdate
SetWindowLongA
PtInRect
ShowCaret
PostThreadMessageA
SetTimer
SetWindowTextA
SetWindowPos
SetScrollRange
ShowWindowAsync
SetParent
SetRect
WindowFromPoint
RemoveMenu
SetScrollInfo
ShowWindow
TrackPopupMenu
ScreenToClient
UpdateWindow
SetDlgItemTextW
SetPropA
Sections
CODE Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
DATA Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: - Virtual size: 14KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE