Static task
static1
Behavioral task
behavioral1
Sample
895795a48aa1af1680a3eac0e5d9a84dff25b6672fda4b7c76d49aed0fdfa4da.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
895795a48aa1af1680a3eac0e5d9a84dff25b6672fda4b7c76d49aed0fdfa4da.exe
Resource
win10v2004-20220812-en
General
-
Target
895795a48aa1af1680a3eac0e5d9a84dff25b6672fda4b7c76d49aed0fdfa4da
-
Size
183KB
-
MD5
2caf48c146abfc475ddd1b923088d7b0
-
SHA1
cf717f2ad3de869b1cc1d5f531bc47fc0a62f807
-
SHA256
895795a48aa1af1680a3eac0e5d9a84dff25b6672fda4b7c76d49aed0fdfa4da
-
SHA512
5cb568a8c9e1232198ae8db980641d260e059172456936e6771cb44c7048d73fad7af878789803b7add8b77c0d2f717aceab9eb8deaf65f0a0db39aacc1b2821
-
SSDEEP
3072:f/ampeVe/rQIf3dx3Qx0kY9Y/XeVaqB+JPKmPJZFLmBKZ2PPT38xrHqDUEqg:fTpeVGrbtx3a0r9gWUfJPmBWxrfg
Malware Config
Signatures
Files
-
895795a48aa1af1680a3eac0e5d9a84dff25b6672fda4b7c76d49aed0fdfa4da.exe windows x86
f2d0737820c08643846be74d748cac4c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualFree
GetACP
GetOEMCP
GetModuleHandleW
MulDiv
GlobalFree
GlobalAlloc
SizeofResource
LockResource
LoadResource
FindResourceA
lstrcmpiA
lstrcmpW
MultiByteToWideChar
WideCharToMultiByte
ExpandEnvironmentStringsW
lstrlenA
RemoveDirectoryW
FindClose
FindNextFileW
DeleteFileW
FindFirstFileW
LoadLibraryA
GetEnvironmentVariableW
CompareFileTime
GetSystemTimeAsFileTime
lstrlenW
GetUserDefaultUILanguage
GetUserDefaultLCID
GetTempPathW
SetEnvironmentVariableW
lstrcmpiW
VirtualAlloc
CreateFileW
GetDriveTypeW
SetCurrentDirectoryW
GetModuleFileNameW
GetCommandLineW
GetVersionExW
GetProcAddress
FindResourceW
TerminateThread
ResumeThread
SuspendThread
LocalFree
lstrcpyW
FormatMessageW
GetSystemDirectoryW
DeleteCriticalSection
GetFileSize
SetFilePointer
ReadFile
SetFileTime
SetEndOfFile
EnterCriticalSection
LeaveCriticalSection
WaitForMultipleObjects
CreateEventW
SetEvent
ResetEvent
InitializeCriticalSection
GetStdHandle
WriteFile
CreateDirectoryW
GetFileAttributesW
GetLocalTime
SystemTimeToFileTime
GetLastError
CreateThread
WaitForSingleObject
GetExitCodeThread
Sleep
SetFileAttributesW
CloseHandle
SetLastError
GetStartupInfoA
user32
GetClientRect
SetWindowLongW
SetFocus
ShowWindow
DrawTextW
GetSystemMetrics
GetDC
ClientToScreen
GetWindow
DialogBoxIndirectParamW
SystemParametersInfoW
DrawIconEx
CallWindowProcW
DefWindowProcW
wvsprintfW
LoadImageW
LoadIconW
MessageBeep
EnableWindow
GetDlgItem
EnableMenuItem
GetSystemMenu
ReleaseDC
CopyImage
GetParent
GetWindowRect
ScreenToClient
CreateWindowExW
SetTimer
GetMessageW
DispatchMessageW
KillTimer
DestroyWindow
CharUpperW
GetKeyState
MessageBoxA
wsprintfA
SetWindowPos
wsprintfW
CreateWindowExA
GetSysColor
GetWindowDC
SendMessageW
EndDialog
GetWindowTextLengthW
GetWindowTextW
GetClassNameA
GetWindowLongW
GetMenu
IsWindow
SetWindowTextW
gdi32
SetStretchBltMode
CreateCompatibleBitmap
SelectObject
CreateCompatibleDC
StretchBlt
GetDeviceCaps
CreateFontIndirectW
DeleteObject
GetObjectW
DeleteDC
GetCurrentObject
shell32
SHGetFileInfoW
SHBrowseForFolderW
SHGetPathFromIDListW
ShellExecuteExW
ShellExecuteW
SHGetSpecialFolderPathW
SHGetMalloc
ole32
CoInitialize
CoCreateInstance
CreateStreamOnHGlobal
oleaut32
VariantClear
OleLoadPicture
SysAllocString
comctl32
ord17
msvcrt
_controlfp
?terminate@@YAXXZ
??3@YAXPAX@Z
??2@YAPAXI@Z
_purecall
__CxxFrameHandler
memcmp
free
malloc
memcpy
memmove
strncmp
_wtol
_wcsnicmp
memset
_CxxThrowException
_beginthreadex
_except_handler3
__dllonexit
_onexit
??1type_info@@UAE@XZ
_c_exit
_exit
_XcptFilter
_cexit
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
Sections
.text Size: 79KB - Virtual size: 80KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 17KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 14KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ