Static task
static1
Behavioral task
behavioral1
Sample
ca887312d4de913438b7a4edf62b310f1e08e895b2d841ca736ddeae2cacbce5.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ca887312d4de913438b7a4edf62b310f1e08e895b2d841ca736ddeae2cacbce5.exe
Resource
win10v2004-20220901-en
General
-
Target
ca887312d4de913438b7a4edf62b310f1e08e895b2d841ca736ddeae2cacbce5
-
Size
118KB
-
MD5
c594b29b2e7c3af6dd602e76a57aafa9
-
SHA1
0f4839438fb82d21804d0c3ba9d438b536a087ad
-
SHA256
ca887312d4de913438b7a4edf62b310f1e08e895b2d841ca736ddeae2cacbce5
-
SHA512
fce81cb4b7288ba34bad0c89657717e335d3e25f55be68e29b92e1aad05d8567343ab2d460288b842464a3f9b3058b133a1c9982b89ff6d1bc361807fbd30a2b
-
SSDEEP
1536:BHqWcIFj1TEAixU3IzWQkoh7oVfBWp6Wx3h5JyeZPq+HbZiRqupL:UWcM1TWxDbkoh2f4p93hfHHVi9pL
Malware Config
Signatures
Files
-
ca887312d4de913438b7a4edf62b310f1e08e895b2d841ca736ddeae2cacbce5.exe windows x86
99d2ed46588ee9969e2b0152fc7f5761
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
user32
TrackMouseEvent
BeginPaint
CallWindowProcA
CharLowerA
ClientToScreen
CopyImage
CreateWindowExA
DefWindowProcA
DeleteMenu
DestroyAcceleratorTable
DestroyIcon
DestroyWindow
DispatchMessageA
EnableMenuItem
EnableWindow
EndPaint
FillRect
GetCapture
GetClassInfoA
GetClassLongA
GetClientRect
GetCursorPos
GetDC
GetFocus
GetKeyState
GetParent
GetPropA
GetSysColor
GetSystemMenu
GetUpdateRect
GetUpdateRgn
GetWindow
GetWindowDC
GetWindowLongA
GetWindowRect
GetWindowTextA
GetWindowTextLengthA
InvalidateRect
InvalidateRgn
IsIconic
IsWindow
IsWindowEnabled
IsWindowVisible
IsZoomed
KillTimer
LoadCursorA
LoadIconA
MessageBoxA
PeekMessageA
PostMessageA
PostQuitMessage
RegisterClassA
ReleaseCapture
ReleaseDC
RemovePropA
ScreenToClient
SendMessageA
SetCapture
SetCursor
SetFocus
SetPropA
SetTimer
SetWindowLongA
SetWindowPos
SetWindowTextA
ShowWindow
TranslateMessage
UpdateWindow
ValidateRect
WaitMessage
OffsetRect
InflateRect
MessageBoxA
advapi32
RegCloseKey
RegCreateKeyExA
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
kernel32
CloseHandle
GetCommandLineA
GetFileAttributesA
GetModuleFileNameA
GetModuleHandleA
GetPrivateProfileIntA
GetProcAddress
LoadLibraryA
TerminateProcess
WinExec
WritePrivateProfileStringA
GetLastError
GetModuleFileNameA
GetModuleHandleA
GetProcessHeap
HeapAlloc
HeapFree
WriteFile
ReadFile
CloseHandle
SetFilePointer
CreateFileA
GetFileType
GetStartupInfoA
GetStdHandle
GetCommandLineA
GetCurrentProcessId
GetCurrentThreadId
GetCurrentProcess
ReadProcessMemory
SetUnhandledExceptionFilter
ExitProcess
gdi32
BitBlt
CombineRgn
CreateCompatibleBitmap
CreateCompatibleDC
CreateDIBSection
CreateFontIndirectA
CreateRectRgn
CreateRectRgnIndirect
CreateSolidBrush
DeleteDC
DeleteObject
ExcludeClipRect
GetDeviceCaps
GetObjectA
GetStockObject
GetWindowOrgEx
IntersectClipRect
MoveToEx
RestoreDC
SaveDC
SelectClipRgn
SelectObject
SetBkColor
SetBkMode
SetBrushOrgEx
SetROP2
SetTextColor
SetWindowOrgEx
StretchDIBits
CreateFontIndirectA
comctl32
InitCommonControls
Sections
.text Size: 87KB - Virtual size: 86KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: - Virtual size: 5KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE