Static task
static1
Behavioral task
behavioral1
Sample
19d1f2ae6e3a523ac4d8bf73a1cb77a3bcc3c1ea69c6f41a97e0fdfe2bddcf61.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
19d1f2ae6e3a523ac4d8bf73a1cb77a3bcc3c1ea69c6f41a97e0fdfe2bddcf61.exe
Resource
win10v2004-20221111-en
General
-
Target
19d1f2ae6e3a523ac4d8bf73a1cb77a3bcc3c1ea69c6f41a97e0fdfe2bddcf61
-
Size
2.8MB
-
MD5
84343a01b2e9dd94cd344c0457b9faa1
-
SHA1
d55e0e5af4b3a13745403f504facd7b54214e952
-
SHA256
19d1f2ae6e3a523ac4d8bf73a1cb77a3bcc3c1ea69c6f41a97e0fdfe2bddcf61
-
SHA512
7c3203f2b9d3fc48e38f0eb1637e7c2e80bb772a578da72cbc367969535ebbf0463c40e8f82930cfe8eb96107162396177945bf9fb64d209f6dcab1a8668ef87
-
SSDEEP
49152:pjEQphgmtpAyKRH/GHqp7YIwjDKTPhiTss2a+9E93oNJ:pTpyQ6Ruqp7YIwUwTsK+
Malware Config
Signatures
Files
-
19d1f2ae6e3a523ac4d8bf73a1cb77a3bcc3c1ea69c6f41a97e0fdfe2bddcf61.exe windows x86
5f112d8d2142e21eb504f432a5aa2e7a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WaitForSingleObject
GetModuleFileNameA
GetDateFormatA
GetSystemDirectoryA
GetWindowsDirectoryA
GetCommandLineA
GetVersionExA
CreateMutexA
GetPrivateProfileIntA
GetPrivateProfileStringA
lstrcmpA
GetSystemTime
LocalFree
LocalAlloc
GetVersion
GetSystemInfo
GetComputerNameA
SetEndOfFile
LCMapStringA
GetStringTypeW
GetStringTypeA
GetOEMCP
lstrcpynA
GetCPInfo
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
HeapSize
HeapReAlloc
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
GetStartupInfoA
RtlUnwind
TerminateProcess
HeapAlloc
HeapFree
GetExitCodeProcess
SetFileTime
GlobalMemoryStatus
GetShortPathNameA
SetErrorMode
WritePrivateProfileStringA
WritePrivateProfileSectionA
MoveFileExA
GetCurrentProcess
ExitProcess
WideCharToMultiByte
CreateProcessA
RemoveDirectoryA
GetFileTime
VerLanguageNameA
CompareFileTime
CopyFileA
GetFileSize
GetLogicalDriveStringsA
FreeLibrary
GetCurrentDirectoryA
SetCurrentDirectoryA
MultiByteToWideChar
SetFileAttributesA
LCMapStringW
GetTempPathA
GetFileAttributesA
CreateDirectoryA
GetLocaleInfoA
FindFirstFileA
lstrcmpiA
FindNextFileA
FindClose
GetDriveTypeA
lstrcatA
GetModuleHandleA
LoadLibraryA
GetProcAddress
GetTickCount
Sleep
GetCurrentThread
QueryPerformanceFrequency
QueryPerformanceCounter
GetThreadPriority
SetThreadPriority
GlobalReAlloc
GlobalUnlock
GlobalFree
GlobalAlloc
GlobalLock
MulDiv
lstrlenA
GetLastError
FormatMessageA
WriteFile
ReadFile
lstrcpyA
SetFilePointer
CreateFileA
CloseHandle
GetACP
DeleteFileA
user32
FindWindowA
IsIconic
PostMessageA
RegisterClassA
SetRectEmpty
ExitWindowsEx
MsgWaitForMultipleObjects
GetMessageA
TranslateMessage
DispatchMessageA
FillRect
PostQuitMessage
EnableWindow
SetWindowPos
SetTimer
GetDlgItemTextA
CreateDialogParamA
GetWindowLongA
IsWindowEnabled
GetSystemMetrics
RegisterClassExA
GetClientRect
IsWindowVisible
PtInRect
SetCursor
EndDialog
GetActiveWindow
WaitMessage
IsDialogMessageA
MessageBoxA
CopyRect
KillTimer
DrawEdge
GetDlgItem
SendDlgItemMessageA
SetDlgItemTextA
PeekMessageA
SetWindowTextA
ReleaseDC
EnumDisplaySettingsA
LoadBitmapA
GetDC
DestroyWindow
DefWindowProcA
GetWindowRect
InvalidateRect
LoadIconA
LoadImageA
GetSysColor
GetDesktopWindow
SystemParametersInfoA
SetForegroundWindow
DialogBoxParamA
GetWindowTextLengthA
GetWindowTextA
CreateWindowExA
SetWindowLongA
SetFocus
GetSystemMenu
DeleteMenu
AppendMenuA
ShowWindow
LoadCursorA
GetCursorPos
ScreenToClient
SendMessageA
gdi32
SaveDC
SetMapMode
SetViewportOrgEx
RestoreDC
StartDocA
StartPage
EndPage
TextOutA
SetBkMode
SelectObject
CreateFontA
GetDeviceCaps
BitBlt
DeleteDC
DeleteObject
CreateSolidBrush
GetStockObject
SetBkColor
SetTextColor
CreateCompatibleBitmap
CreateCompatibleDC
StretchDIBits
GetTextExtentPoint32A
CreateBitmap
CreateDIBitmap
CreatePalette
AddFontResourceA
CreateScalableFontResourceA
EndDoc
RemoveFontResourceA
comdlg32
GetOpenFileNameA
PrintDlgA
advapi32
RegCloseKey
RegOpenKeyExA
AdjustTokenPrivileges
LookupPrivilegeValueA
RegDeleteValueA
RegQueryInfoKeyA
RegEnumKeyExA
OpenThreadToken
DuplicateToken
AllocateAndInitializeSid
InitializeSecurityDescriptor
GetLengthSid
InitializeAcl
AddAccessAllowedAce
SetSecurityDescriptorDacl
SetSecurityDescriptorGroup
SetSecurityDescriptorOwner
IsValidSecurityDescriptor
AccessCheck
FreeSid
GetUserNameA
RegSetValueExA
RegCreateKeyExA
OpenProcessToken
RegQueryValueExA
shell32
SHFileOperationA
SHBrowseForFolderA
SHGetSpecialFolderLocation
SHGetPathFromIDListA
SHGetMalloc
ShellExecuteA
SHChangeNotify
ole32
CoUninitialize
CoInitialize
OleInitialize
CoCreateInstance
OleUninitialize
oleaut32
RegisterTypeLi
LoadTypeLi
winmm
waveOutGetNumDevs
midiOutGetNumDevs
joyGetPos
comctl32
ord17
ImageList_Create
ImageList_Add
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
Sections
.text Size: 155KB - Virtual size: 154KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 338KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ