Static task
static1
Behavioral task
behavioral1
Sample
0ced84ae985c59306d6369f51b57f0e5f2b4ea457c9aa9b4d200ba799a1428b4.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
0ced84ae985c59306d6369f51b57f0e5f2b4ea457c9aa9b4d200ba799a1428b4.exe
Resource
win10v2004-20221111-en
General
-
Target
0ced84ae985c59306d6369f51b57f0e5f2b4ea457c9aa9b4d200ba799a1428b4
-
Size
1.1MB
-
MD5
58bd501f268c1114989ffaf26391135b
-
SHA1
e2275f5ba740ac37114f3ba8df3ebfcd91c526a0
-
SHA256
0ced84ae985c59306d6369f51b57f0e5f2b4ea457c9aa9b4d200ba799a1428b4
-
SHA512
4e92da00ce94c80fc1e3cf1b14c367c59f6e3284d19a4e3b69929de3373b4525fbbb0224cfc38f53854c1fdccb5c6daa6fd8a08fe185df41df36fb5b59b71786
-
SSDEEP
6144:MAqTnJ61QX3Kdvyb1cRn5f0E6RnrKypRwhsN:6X3yyhcR9f6Q0
Malware Config
Signatures
Files
-
0ced84ae985c59306d6369f51b57f0e5f2b4ea457c9aa9b4d200ba799a1428b4.exe windows x86
b5a1f0b2b575f6b395765939b1783325
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
anyservice
ord6
ord17
kernel32
HeapFree
HeapAlloc
GetProcessHeap
GetStartupInfoW
GetSystemTimeAsFileTime
RtlUnwind
ExitProcess
RaiseException
HeapReAlloc
HeapSize
GetStdHandle
GetModuleFileNameA
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
HeapDestroy
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
TerminateProcess
SetUnhandledExceptionFilter
IsDebuggerPresent
VirtualAlloc
GetCPInfo
GetACP
GetOEMCP
GetTimeFormatA
GetDateFormatA
GetTimeZoneInformation
GetConsoleCP
GetConsoleMode
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CreateFileA
SetEnvironmentVariableA
lstrlenW
WideCharToMultiByte
GetModuleFileNameW
SizeofResource
LockResource
LoadResource
FindResourceW
lstrcatW
Sleep
CreateThread
MultiByteToWideChar
GetProcAddress
GetModuleHandleW
GlobalDeleteAtom
FreeLibrary
GlobalAlloc
lstrcmpW
GlobalLock
InterlockedExchange
CompareStringA
LoadLibraryW
GetLocaleInfoW
lstrcmpA
EnumResourceLanguagesW
GetVersion
ConvertDefaultLocale
GetCurrentThreadId
GetCurrentThread
WritePrivateProfileStringW
SetErrorMode
lstrlenA
FreeResource
GlobalFree
GlobalUnlock
CloseHandle
GetCurrentProcess
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
GetThreadLocale
InterlockedIncrement
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
GlobalFlags
FormatMessageW
LocalFree
MulDiv
GetModuleHandleA
GlobalFindAtomW
CompareStringW
LoadLibraryA
GetVersionExA
InterlockedDecrement
GetCurrentProcessId
GetLastError
SetLastError
GlobalAddAtomW
user32
LoadCursorW
ShowWindow
SetWindowTextW
IsDialogMessageW
SetDlgItemTextW
EndPaint
BeginPaint
ReleaseDC
GetDC
ClientToScreen
GrayStringW
DrawTextExW
DrawTextW
TabbedTextOutW
RegisterWindowMessageW
SendDlgItemMessageW
SendDlgItemMessageA
WinHelpW
GetCapture
GetClassLongW
GetClassNameW
SetPropW
GetPropW
RemovePropW
SetFocus
GetWindowTextW
GetForegroundWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetForegroundWindow
GetMenu
GetSubMenu
GetMenuItemID
CreateWindowExW
GetClassInfoExW
GetClassInfoW
RegisterClassW
AdjustWindowRectEx
PtInRect
GetDlgCtrlID
DefWindowProcW
CallWindowProcW
SetWindowLongW
SetWindowPos
SystemParametersInfoA
GetWindowPlacement
GetWindowRect
GetWindow
GetSysColor
DestroyMenu
CopyRect
UnhookWindowsHookEx
GetWindowThreadProcessId
GetLastActivePopup
MessageBoxW
SetCursor
SetWindowsHookExW
CallNextHookEx
GetMessageW
TranslateMessage
DispatchMessageW
IsWindowVisible
GetKeyState
PeekMessageW
GetCursorPos
ValidateRect
UnregisterClassW
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
GetSysColorBrush
GetTopWindow
LoadBitmapW
GetFocus
ModifyMenuW
GetMenuState
EnableMenuItem
CheckMenuItem
GetDesktopWindow
GetActiveWindow
SetActiveWindow
CreateDialogIndirectParamW
DestroyWindow
IsWindow
GetWindowLongW
GetDlgItem
IsWindowEnabled
GetParent
GetNextDlgTabItem
EndDialog
PostMessageW
EnableWindow
SendMessageW
wsprintfW
PostQuitMessage
UpdateWindow
DrawIcon
GetClientRect
GetSystemMetrics
IsIconic
AppendMenuW
GetSystemMenu
LoadIconW
GetMenuItemCount
UnregisterClassA
gdi32
SetMapMode
DeleteObject
PtVisible
RectVisible
TextOutW
Escape
SelectObject
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
DeleteDC
GetStockObject
GetDeviceCaps
RestoreDC
SaveDC
SetBkColor
SetTextColor
GetClipBox
ExtTextOutW
GetObjectW
CreateBitmap
winspool.drv
ClosePrinter
DocumentPropertiesW
OpenPrinterW
advapi32
RegOpenKeyW
RegQueryValueExW
RegOpenKeyExW
RegCreateKeyExW
RegQueryValueW
RegCloseKey
RegEnumKeyW
RegDeleteKeyW
RegSetValueExW
shell32
ShellExecuteW
comctl32
InitCommonControlsEx
shlwapi
PathFindFileNameW
PathFindExtensionW
oleaut32
SysAllocStringLen
VariantClear
VariantChangeType
VariantInit
Sections
.text Size: 148KB - Virtual size: 146KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 36KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 12KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 48KB - Virtual size: 48KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 88KB - Virtual size: 88KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Size: 88KB - Virtual size: 88KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Size: 88KB - Virtual size: 88KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Size: 88KB - Virtual size: 88KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Size: 88KB - Virtual size: 88KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Size: 88KB - Virtual size: 88KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Size: 88KB - Virtual size: 88KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Size: 88KB - Virtual size: 88KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rmnet Size: 152KB - Virtual size: 152KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE