Static task
static1
Behavioral task
behavioral1
Sample
f54aa1212e0e67ea552b9caf7dd8b00746971a5bf44e8ba05346ed4276e3618b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f54aa1212e0e67ea552b9caf7dd8b00746971a5bf44e8ba05346ed4276e3618b.exe
Resource
win10v2004-20220812-en
General
-
Target
f54aa1212e0e67ea552b9caf7dd8b00746971a5bf44e8ba05346ed4276e3618b
-
Size
9.4MB
-
MD5
2e7bb676ef5608d9a38c7ffe1669163e
-
SHA1
ab530642c746d8d3e5c295f7858435aa70588321
-
SHA256
f54aa1212e0e67ea552b9caf7dd8b00746971a5bf44e8ba05346ed4276e3618b
-
SHA512
11c89fef981cb05cebe0f99f238dcbe7b6dd26c4f034013868d328b70a35296a9dbff0e81aa3c029caa6d642523b9bdbf650fce8ed540eb1f6223af620e88583
-
SSDEEP
196608:80h0El0Eg0t0v0h0EE0Z0v0h0El0Eg0t0v0h0EE0:80h0El0Eg0t0v0h0EE0Z0v0h0El0Eg03
Malware Config
Signatures
Files
-
f54aa1212e0e67ea552b9caf7dd8b00746971a5bf44e8ba05346ed4276e3618b.exe windows x86
589127764b99b6ce54a13cb37f6e4979
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comdlg32
PageSetupDlgW
FindTextW
PrintDlgExW
ChooseFontW
GetSaveFileNameW
GetOpenFileNameW
ReplaceTextW
GetFileTitleW
CommDlgExtendedError
shell32
DragFinish
DragQueryFileW
DragAcceptFiles
ShellAboutW
winspool.drv
GetPrinterDriverW
ClosePrinter
OpenPrinterW
comctl32
CreateStatusWindowW
msvcrt
_cexit
_XcptFilter
_exit
_c_exit
time
exit
wcsncpy
iswctype
_wtol
wcsncmp
_snwprintf
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
_controlfp
localtime
advapi32
RegQueryValueExW
RegCloseKey
RegCreateKeyW
IsTextUnicode
RegQueryValueExA
RegOpenKeyExA
RegSetValueExW
kernel32
GlobalUnlock
GetFileInformationByHandle
CreateFileMappingW
MapViewOfFile
MultiByteToWideChar
UnmapViewOfFile
GetACP
DeleteFileW
SetEndOfFile
GetUserDefaultLangID
FormatMessageW
GlobalLock
GetTimeFormatW
GetDateFormatW
GetUserDefaultLCID
GetLocalTime
LoadLibraryA
GetStartupInfoA
GlobalFree
GetLocaleInfoW
lstrcatW
FindClose
FindFirstFileW
GetFileAttributesW
lstrcpyW
lstrcmpW
LocalFree
LocalAlloc
lstrlenW
LocalUnlock
CompareStringW
LocalLock
FoldStringW
CloseHandle
ReadFile
CreateFileW
lstrcmpiW
GetCurrentProcessId
GetProcAddress
GetCommandLineW
MulDiv
lstrcpynW
LocalSize
GetLastError
WriteFile
SetLastError
WideCharToMultiByte
LocalReAlloc
GetModuleHandleA
gdi32
EndPage
AbortDoc
EndDoc
DeleteDC
StartPage
GetTextExtentPoint32W
CreateDCW
SetAbortProc
GetTextFaceW
TextOutW
StartDocW
EnumFontsW
GetStockObject
GetObjectW
GetDeviceCaps
CreateFontIndirectW
DeleteObject
GetTextMetricsW
SetBkMode
LPtoDP
SetWindowExtEx
SetViewportExtEx
SetMapMode
SelectObject
user32
ReleaseDC
GetDC
DialogBoxParamW
SetActiveWindow
GetKeyboardLayout
DefWindowProcW
DestroyWindow
MessageBeep
PostQuitMessage
GetForegroundWindow
IsIconic
SetCursor
GetWindowPlacement
CharUpperW
LoadStringW
SetWindowLongW
LoadAcceleratorsW
GetSystemMenu
RegisterClassExW
LoadImageW
LoadCursorW
SetWindowPlacement
CreateWindowExW
RegisterWindowMessageW
GetClientRect
ShowWindow
GetDesktopWindow
GetFocus
UpdateWindow
SetScrollPos
CharLowerW
GetWindowLongW
PeekMessageW
EnableWindow
DrawTextExW
CreateDialogParamW
GetWindowTextW
LoadIconW
MoveWindow
InvalidateRect
WinHelpW
GetDlgCtrlID
ChildWindowFromPoint
ScreenToClient
GetCursorPos
SendDlgItemMessageW
SendMessageW
CharNextW
SetWindowTextW
CheckMenuItem
CloseClipboard
IsClipboardFormatAvailable
OpenClipboard
GetMenuState
EnableMenuItem
GetSubMenu
GetMenu
MessageBoxW
SetFocus
SetDlgItemTextW
wsprintfW
GetDlgItemTextW
EndDialog
GetParent
UnhookWinEvent
DispatchMessageW
TranslateMessage
TranslateAcceleratorW
IsDialogMessageW
PostMessageW
GetMessageW
SetWinEventHook
GetSystemMetrics
Sections
.text Size: 27KB - Virtual size: 27KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 34KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ