Static task
static1
Behavioral task
behavioral1
Sample
488fc09cbc640ffb5403e12ee66ee46a38223169a4ce955393cd52d76fb8ca3b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
488fc09cbc640ffb5403e12ee66ee46a38223169a4ce955393cd52d76fb8ca3b.exe
Resource
win10v2004-20220812-en
General
-
Target
488fc09cbc640ffb5403e12ee66ee46a38223169a4ce955393cd52d76fb8ca3b
-
Size
85KB
-
MD5
41d1d40700f471894d8f11835a9f69e6
-
SHA1
abb3c498295906a4da058f9d12d9415fca6c4ea0
-
SHA256
488fc09cbc640ffb5403e12ee66ee46a38223169a4ce955393cd52d76fb8ca3b
-
SHA512
76272c2ce0167dd2de92ba3652ef4e5979350c26141a14c85a94086b69e28498a0fba461bf6583fda4fb6865f619d127af0cb4da645446a3e130537e69ebeafc
-
SSDEEP
384:aBjoKkJOfyEsPc7MXZr+Akzh/WdMjMEIbAT2FaLJlEMMDe4mDZvapr41L:aQJEJQcYgI/bAT2FaL7VV8ML
Malware Config
Signatures
Files
-
488fc09cbc640ffb5403e12ee66ee46a38223169a4ce955393cd52d76fb8ca3b.exe windows x86
650770c6aa35b9a63609e4001ad638ef
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalFree
InterlockedDecrement
InterlockedIncrement
LoadLibraryA
LoadLibraryW
LocalFree
MulDiv
OutputDebugStringA
QueryPerformanceCounter
RemoveDirectoryW
SearchPathW
GlobalAlloc
SetErrorMode
SetFileAttributesW
SetLastError
SetUnhandledExceptionFilter
TerminateProcess
UnhandledExceptionFilter
lstrcatW
lstrcmpiW
lstrcpyW
lstrcpynW
lstrlenW
GetWindowsDirectoryW
GetVersionExW
GetTickCount
GetSystemTimeAsFileTime
GetSystemDirectoryW
GetProcAddress
GetPrivateProfileStringW
GetPrivateProfileIntW
GetModuleHandleW
GetModuleHandleA
GetModuleFileNameW
GetLastError
GetFileAttributesW
GetExitCodeThread
GetCurrentThreadId
GetCurrentProcessId
GetCurrentProcess
GetCurrentDirectoryW
GetCommandLineW
FreeLibrary
FormatMessageW
FindNextFileW
FindFirstFileW
FindClose
ExitProcess
DeleteFileW
CreateProcessW
CreateFileW
CreateFileMappingW
CloseHandle
LocalAlloc
GetCurrentThread
VirtualAlloc
SetCurrentDirectoryW
ReadFile
user32
GetWindowRect
GetWindowTextW
InflateRect
InvalidateRect
IsChild
IsDlgButtonChecked
IsRectEmpty
IsWindowEnabled
IsWindowVisible
LoadAcceleratorsW
LoadCursorW
LoadIconW
LoadImageW
LoadStringA
LoadStringW
MapWindowPoints
MessageBeep
MessageBoxW
MoveWindow
MsgWaitForMultipleObjects
OffsetRect
PeekMessageW
PostMessageW
PostQuitMessage
RedrawWindow
RegisterClassExW
RegisterClassW
ReleaseDC
SendDlgItemMessageW
SendMessageW
SetCursor
SetFocus
SetForegroundWindow
SetMessageQueue
SetWindowLongW
SetWindowPos
SetWindowTextW
ShowWindow
TranslateAcceleratorW
TranslateMessage
UnregisterClassW
UpdateWindow
WaitMessage
wsprintfW
GetWindowLongW
GetWindow
GetUpdateRect
GetSysColorBrush
GetSysColor
GetParent
GetMessageW
GetLastActivePopup
GetFocus
GetDlgItem
GetDlgCtrlID
GetDesktopWindow
GetDC
GetClientRect
GetClassInfoW
FindWindowW
FillRect
ExitWindowsEx
EnumThreadWindows
EnumChildWindows
EndPaint
EndDialog
EnableWindow
DrawTextW
DrawIcon
DrawFocusRect
DrawEdge
DispatchMessageW
DialogBoxParamW
DestroyWindow
DefWindowProcW
CreateWindowExW
CreateDialogParamW
CopyRect
CheckRadioButton
CheckDlgButton
CharPrevW
CharNextW
CallWindowProcW
BringWindowToTop
BeginPaint
GetSystemMetrics
GetNextDlgTabItem
gdi32
StretchBlt
SetTextColor
SetMapMode
SetBkMode
SetBkColor
SelectObject
GetTextMetricsW
GetStockObject
GetObjectW
GetMapMode
BitBlt
DeleteObject
DeleteDC
DPtoLP
CreateFontIndirectW
CreateCompatibleDC
CreateCompatibleBitmap
CreateBitmap
GetDeviceCaps
advapi32
AdjustTokenPrivileges
RegSetValueExW
RegQueryValueW
RegQueryValueExW
RegQueryValueExA
RegOpenKeyW
RegOpenKeyExA
RegDeleteValueW
RegCreateKeyW
RegCreateKeyExW
RegCloseKey
OpenProcessToken
RegOpenKeyExW
LookupPrivilegeValueW
shell32
SHGetSpecialFolderLocation
SHGetPathFromIDListW
SHGetMalloc
ShellExecuteW
ole32
CoInitialize
CoUninitialize
CoCreateInstance
shlwapi
PathIsURLW
PathIsFileSpecW
msvcrt
_wsplitpath
swscanf
setlocale
memmove
_except_handler3
_vsnwprintf
_wmakepath
_wtoi
free
malloc
Sections
.text Size: 29KB - Virtual size: 29KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data2 Size: 1024B - Virtual size: 1000B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data10 Size: 1024B - Virtual size: 1000B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data9 Size: 1024B - Virtual size: 1000B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data8 Size: 1024B - Virtual size: 1000B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data7 Size: 1024B - Virtual size: 1000B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data6 Size: 1024B - Virtual size: 1000B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data5 Size: 1024B - Virtual size: 1000B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data4 Size: 1024B - Virtual size: 1000B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data3 Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text3 Size: 49KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text2 Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 881KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ