Static task
static1
Behavioral task
behavioral1
Sample
4cc1fc4c8bc219e3363496e61d30814dd021009d0dad5e67edb6e59225a0721a.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
4cc1fc4c8bc219e3363496e61d30814dd021009d0dad5e67edb6e59225a0721a.exe
Resource
win10v2004-20221111-en
General
-
Target
4cc1fc4c8bc219e3363496e61d30814dd021009d0dad5e67edb6e59225a0721a
-
Size
17.7MB
-
MD5
621a88f433cefd7133f668503b7d2271
-
SHA1
251a05560f6184141266ec7714ac77cfec5974f3
-
SHA256
4cc1fc4c8bc219e3363496e61d30814dd021009d0dad5e67edb6e59225a0721a
-
SHA512
5575658031b03a11b2e826f0cc41a56d76d68cfbaf262803749dfe36aa91dc695de63499e8b083c4a5f3dc7ae384ccfb585e543edb618759852e943c5b5e30de
-
SSDEEP
393216:UI/R9tWn0zP217jzCRWChPeQoWMt4R9vWn0zP2/7Gv9pbc:zp9M0zKu5roWiu9q0zQe9xc
Malware Config
Signatures
Files
-
4cc1fc4c8bc219e3363496e61d30814dd021009d0dad5e67edb6e59225a0721a.exe windows x86
ede59d4dae8467aba5321766e52fede6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
ShellExecuteA
SHGetPathFromIDListA
SHBrowseForFolderA
SHGetMalloc
FindExecutableA
user32
GetSysColor
GetClientRect
SetRect
EndPaint
LoadCursorA
GetLastActivePopup
ShowWindow
PostMessageA
SendMessageA
EnableWindow
GetWindowLongA
SetWindowLongA
SetWindowTextA
SetForegroundWindow
SetActiveWindow
DialogBoxIndirectParamA
SetDlgItemTextA
GetDlgItemTextA
EndDialog
BeginPaint
GetSystemMetrics
SetWindowPos
GetKeyState
CharUpperBuffA
SetTimer
KillTimer
SendDlgItemMessageA
GetDlgItem
InvalidateRect
UpdateWindow
OemToCharBuffA
PeekMessageA
TranslateMessage
DispatchMessageA
GetParent
MessageBoxA
SetCursor
CharNextA
SetWindowWord
GetWindowWord
DefWindowProcA
RegisterClassA
GetWindowRect
kernel32
lstrlenA
SetStdHandle
LCMapStringW
LCMapStringA
MultiByteToWideChar
GetLocaleInfoA
GetSystemInfo
VirtualProtect
VirtualAlloc
GetCPInfo
GetOEMCP
GetACP
HeapSize
HeapAlloc
HeapReAlloc
VirtualQuery
InterlockedExchange
LoadLibraryA
GetStringTypeW
GetStringTypeA
HeapFree
VirtualFree
HeapCreate
HeapDestroy
GetFileType
SetHandleCount
GetEnvironmentStringsW
GetLastError
WideCharToMultiByte
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
UnhandledExceptionFilter
FindClose
FindFirstFileA
GetCurrentDirectoryA
CreateDirectoryA
SetFileTime
LocalFileTimeToFileTime
DosDateTimeToFileTime
LocalAlloc
_lopen
GetDriveTypeA
GetEnvironmentVariableA
GlobalFree
GlobalUnlock
GlobalHandle
_lclose
_llseek
_lread
GlobalLock
GlobalAlloc
LocalFree
GlobalMemoryStatus
GetVersion
GetModuleFileNameA
WriteFile
GetSystemTime
ExitProcess
CloseHandle
CreateFileA
SetCurrentDirectoryA
FlushFileBuffers
_lcreat
GetVolumeInformationA
GetWindowsDirectoryA
SetFilePointer
WinExec
_lwrite
lstrcmpiA
SetErrorMode
GetProcAddress
GetModuleHandleA
TerminateProcess
GetCurrentProcess
GetStartupInfoA
GetCommandLineA
GetVersionExA
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
RtlUnwind
GetStdHandle
gdi32
SelectObject
SetTextAlign
SetBkColor
SetTextColor
DeleteObject
GetBkColor
GetTextExtentPoint32A
ExtTextOutA
CreateDCA
GetDeviceCaps
CreateFontIndirectA
DeleteDC
advapi32
RegQueryValueA
comctl32
ord17
Sections
.text Size: 44KB - Virtual size: 40KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_winzip_ Size: 17.6MB - Virtual size: 17.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ