Static task
static1
Behavioral task
behavioral1
Sample
82e5b4d85cf7616085d7f5c29149e97f3073426177521f7f072b58e76946d075.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
82e5b4d85cf7616085d7f5c29149e97f3073426177521f7f072b58e76946d075.exe
Resource
win10v2004-20221111-en
General
-
Target
82e5b4d85cf7616085d7f5c29149e97f3073426177521f7f072b58e76946d075
-
Size
3.5MB
-
MD5
c6ce4da538b8d61bdbecdf78d7b1507d
-
SHA1
5d835cba88a984952223fd31d20d9a1aac60902a
-
SHA256
82e5b4d85cf7616085d7f5c29149e97f3073426177521f7f072b58e76946d075
-
SHA512
919db3f0f1a408e22f6701cf6a25a68c485c6b0353a97fe5f7944f32b26edc53ed2c7e498aac5baa31fced84debd6db7139abf8dc508f5f3d8761f048dfeff7a
-
SSDEEP
24576:0MhCBSKzGDrqicORtgA0g8WQfpmWA30+rUXT1Q6ns7RKb/ATjP717bZ4:iBS8trW5Nr45o8YT7
Malware Config
Signatures
Files
-
82e5b4d85cf7616085d7f5c29149e97f3073426177521f7f072b58e76946d075.exe windows x86
aa6df5acf6c5022dac84b4a2b82d1585
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapFree
HeapAlloc
HeapReAlloc
RaiseException
HeapSize
GetACP
GetTimeZoneInformation
LCMapStringA
LCMapStringW
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetEnvironmentVariableA
HeapDestroy
ExitProcess
VirtualFree
VirtualAlloc
IsBadWritePtr
SetUnhandledExceptionFilter
GetCurrentProcessId
GetStringTypeA
GetStringTypeW
SetStdHandle
IsBadReadPtr
IsBadCodePtr
CompareStringA
CompareStringW
GetCommandLineA
GetProfileStringA
SetEnvironmentVariableA
ExitThread
CreateThread
RtlUnwind
GetFileAttributesA
GetFullPathNameA
SetEndOfFile
FlushFileBuffers
SetFilePointer
CreateFileA
SetErrorMode
FileTimeToLocalFileTime
FileTimeToSystemTime
GetOEMCP
GetCPInfo
GetProcessVersion
TlsGetValue
LocalReAlloc
TlsSetValue
EnterCriticalSection
GlobalReAlloc
LeaveCriticalSection
TlsFree
GlobalHandle
DeleteCriticalSection
TlsAlloc
InitializeCriticalSection
LocalAlloc
GlobalFlags
GetLastError
GetProfileIntA
lstrcpynA
LocalFree
lstrcmpA
GetCurrentThread
MulDiv
SetLastError
MultiByteToWideChar
WideCharToMultiByte
lstrlenA
InterlockedDecrement
InterlockedIncrement
GetVersion
lstrcatA
GetCurrentThreadId
GlobalGetAtomNameA
lstrcmpiA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
lstrcpyA
GetModuleHandleA
GlobalLock
GlobalUnlock
GetPrivateProfileStringA
FindResourceA
GetTickCount
ResumeThread
GlobalAlloc
GlobalFree
SizeofResource
LoadResource
LockResource
WinExec
GetWindowsDirectoryA
GetVersionExA
CreateToolhelp32Snapshot
Process32First
OpenProcess
Process32Next
SetSystemPowerState
GetCurrentProcess
GetTempPathA
FindFirstFileA
FindNextFileA
FindClose
RemoveDirectoryA
GetCurrentDirectoryA
CreateDirectoryA
GetModuleFileNameA
Sleep
WriteFile
LoadLibraryA
GetProcAddress
FreeLibrary
GetSystemTime
CreatePipe
GetStartupInfoA
CreateProcessA
CloseHandle
ReadFile
WaitForSingleObject
TerminateProcess
GetDriveTypeA
DeleteFileA
WritePrivateProfileStringA
GetPrivateProfileIntA
HeapCreate
user32
ModifyMenuA
GetMenuState
GetMenuCheckMarkDimensions
ClientToScreen
GetWindowDC
BeginPaint
EndPaint
PostQuitMessage
ValidateRect
GetMessageA
DestroyMenu
SetRectEmpty
GetDCEx
WindowFromPoint
GetSysColorBrush
LoadStringA
SetDlgItemTextA
GetDlgItemTextA
UpdateWindow
SendDlgItemMessageA
MapWindowPoints
GetFocus
SetFocus
AdjustWindowRectEx
EqualRect
IsWindowVisible
GetTopWindow
MessageBoxA
GetCapture
WinHelpA
wsprintfA
GetClassInfoA
RegisterClassA
GetMenu
GetMenuItemCount
GetMenuItemID
TrackPopupMenu
GetWindowTextLengthA
SetMenuItemBitmaps
GetDlgCtrlID
CreateWindowExA
SetWindowsHookExA
GetClassLongA
SetPropA
UnhookWindowsHookEx
GetPropA
CallWindowProcA
RemovePropA
DefWindowProcA
GetMessageTime
GetLastActivePopup
GetForegroundWindow
SetForegroundWindow
GetWindow
SetWindowPos
OffsetRect
IntersectRect
SystemParametersInfoA
GetWindowPlacement
GetNextDlgTabItem
EndDialog
GetActiveWindow
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
GetDlgItem
IsWindowEnabled
LoadCursorA
CopyIcon
InflateRect
RedrawWindow
IsWindow
SetCursor
GetMessagePos
ScreenToClient
MessageBeep
DestroyCursor
RegisterWindowMessageA
ExitWindowsEx
FillRect
PeekMessageA
TranslateMessage
DispatchMessageA
GrayStringA
DrawTextA
TabbedTextOutA
PostMessageA
SetCapture
DrawFocusRect
GetDC
ReleaseDC
CopyRect
GetWindowLongA
GetWindowRect
UnregisterClassA
HideCaret
ShowCaret
ExcludeUpdateRgn
DefDlgProcA
CharNextA
IsWindowUnicode
SetWindowLongA
GetSysColor
GetParent
GetKeyState
InsertMenuA
RemoveMenu
KillTimer
InvalidateRect
SetTimer
GetCursorPos
LoadMenuA
GetSubMenu
ReleaseCapture
CheckMenuItem
EnableMenuItem
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
GetWindowTextA
PtInRect
GetClassNameA
IsIconic
GetSystemMetrics
GetClientRect
DrawIcon
SetWindowRgn
LoadBitmapA
SendMessageA
LoadIconA
EnableWindow
CallNextHookEx
gdi32
DeleteObject
CombineRgn
CreateRectRgn
GetDIBits
PlayEnhMetaFile
RealizePalette
SelectPalette
CreatePalette
DeleteDC
GetEnhMetaFilePaletteEntries
SetBkColor
SelectObject
DeleteEnhMetaFile
GetDeviceCaps
SetWinMetaFileBits
GetEnhMetaFileHeader
SetEnhMetaFileBits
GetClipBox
SetTextColor
SaveDC
RestoreDC
SetBkMode
SetROP2
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowOrgEx
SetWindowExtEx
GetTextExtentPoint32A
SelectClipRgn
IntersectClipRect
CreatePen
CreatePatternBrush
PatBlt
CreateRectRgnIndirect
UnrealizeObject
SetRectRgn
CreateFontIndirectA
Rectangle
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetWindowExtEx
GetViewportExtEx
CreateBitmap
GetPixel
GetObjectA
CreateCompatibleDC
LPtoDP
CreateCompatibleBitmap
GetMapMode
DPtoLP
GetBkColor
BitBlt
GetStockObject
CreateRoundRectRgn
ScaleWindowExtEx
CreateDIBitmap
GetTextExtentPointA
CreateSolidBrush
comdlg32
GetOpenFileNameA
GetSaveFileNameA
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
advapi32
LookupPrivilegeValueA
OpenProcessToken
RegCloseKey
RegQueryValueA
RegOpenKeyExA
RegCreateKeyExA
RegSetValueExA
AdjustTokenPrivileges
shell32
SHGetSpecialFolderLocation
DragQueryFileA
ShellExecuteA
SHBrowseForFolderA
SHGetPathFromIDListA
comctl32
ord17
ImageList_Destroy
ws2_32
htons
ntohl
htonl
ntohs
Sections
.text Size: 1.0MB - Virtual size: 1.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 180KB - Virtual size: 179KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 108KB - Virtual size: 148KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2.1MB - Virtual size: 2.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ