Static task
static1
Behavioral task
behavioral1
Sample
441e3cebefdb437f63180701df4beef80ae0e71e927372cb456092e1a7995734.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
441e3cebefdb437f63180701df4beef80ae0e71e927372cb456092e1a7995734.exe
Resource
win10v2004-20230221-en
General
-
Target
441e3cebefdb437f63180701df4beef80ae0e71e927372cb456092e1a7995734
-
Size
948KB
-
MD5
1a91fd295446f993e33e41d5ad73c4b0
-
SHA1
7e6654e4480171e899bc3771d06751a50eaacd16
-
SHA256
441e3cebefdb437f63180701df4beef80ae0e71e927372cb456092e1a7995734
-
SHA512
e6ad38e7e502767b3d60b07e9ba6c8350ab15427ccc162d04e801d40fcdb2749e690ac85730eab7b952405f4cee4ebb235ffe7c42d896ebd17b758e3d8d622d1
-
SSDEEP
12288:Zgrykts3BqO0DoMOrGSYHcfLHDCCCkTanVQ4BiycoaYui0HoYoV5j:+mko0pmL6c7pTanVHcoLuTolj
Malware Config
Signatures
Files
-
441e3cebefdb437f63180701df4beef80ae0e71e927372cb456092e1a7995734.exe windows x86
0755588b063acbd9a9a3443b0adef13b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
rpcrt4
UuidToStringA
RpcStringFreeA
kernel32
InterlockedIncrement
GlobalFlags
RaiseException
InitializeCriticalSection
DeleteCriticalSection
LocalAlloc
LeaveCriticalSection
GlobalReAlloc
GlobalHandle
EnterCriticalSection
TlsGetValue
TlsAlloc
TlsSetValue
LocalReAlloc
TlsFree
lstrcmpW
GlobalFindAtomA
GlobalGetAtomNameA
SetErrorMode
GetCPInfo
GetOEMCP
ExitProcess
RtlUnwind
HeapAlloc
HeapFree
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
GetStartupInfoA
GetCommandLineA
TerminateProcess
HeapSize
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapDestroy
HeapCreate
VirtualFree
IsBadWritePtr
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
SetUnhandledExceptionFilter
GetTimeZoneInformation
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
SetStdHandle
SetEnvironmentVariableA
lstrcatA
WritePrivateProfileStringA
GetFullPathNameA
GetVolumeInformationA
GetCurrentProcess
DuplicateHandle
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
GetFileTime
GetFileSize
GetFileAttributesA
CreateFileA
FindFirstFileA
FindClose
FileTimeToLocalFileTime
FileTimeToSystemTime
InterlockedDecrement
SetLastError
GlobalFree
GlobalUnlock
FormatMessageA
lstrcpynA
LocalFree
GlobalAddAtomA
GetCurrentThread
GetCurrentThreadId
GlobalLock
GlobalAlloc
FreeLibrary
GlobalDeleteAtom
lstrcmpA
GetModuleHandleA
GetProcAddress
ConvertDefaultLocale
EnumResourceLanguagesA
LoadLibraryA
CompareStringW
CompareStringA
lstrlenA
lstrcmpiA
GetVersion
GetLastError
MultiByteToWideChar
GetTempPathA
SetCurrentDirectoryA
CreateDirectoryA
FreeResource
lstrcpyA
CreateProcessA
WaitForSingleObject
CloseHandle
RemoveDirectoryA
GetModuleFileNameA
DeleteFileA
Sleep
WideCharToMultiByte
FindResourceA
LoadResource
LockResource
SizeofResource
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
HeapReAlloc
user32
RegisterWindowMessageA
WinHelpA
GetCapture
CreateWindowExA
GetClassLongA
GetClassInfoExA
SetPropA
GetPropA
RemovePropA
GetForegroundWindow
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
LoadIconA
MapWindowPoints
SetForegroundWindow
GetClientRect
GetMenu
AdjustWindowRectEx
GetClassInfoA
RegisterClassA
DefWindowProcA
CallWindowProcA
SystemParametersInfoA
IsIconic
GetWindowPlacement
CopyRect
SetWindowPos
ShowWindow
SetWindowLongA
GetDlgItem
LoadCursorA
GetSysColorBrush
UnregisterClassA
GetSysColor
ReleaseDC
GetDC
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
ClientToScreen
CharUpperA
PostQuitMessage
PostMessageA
SetCursor
GetWindow
GetDlgCtrlID
GetWindowRect
PtInRect
GetWindowTextA
SetWindowTextA
GetClassNameA
wsprintfA
GetSystemMetrics
UnhookWindowsHookEx
GetMenuItemID
DestroyMenu
SendMessageA
EnableWindow
IsWindowEnabled
GetLastActivePopup
GetWindowLongA
GetParent
MessageBoxA
ValidateRect
GetCursorPos
PeekMessageA
GetKeyState
IsWindowVisible
GetActiveWindow
DispatchMessageA
TranslateMessage
GetMessageA
CallNextHookEx
SetWindowsHookExA
GetMenuItemCount
GetSubMenu
SetMenuItemBitmaps
GetFocus
ModifyMenuA
GetMenuState
EnableMenuItem
CheckMenuItem
GetMenuCheckMarkDimensions
LoadBitmapA
gdi32
DeleteDC
GetStockObject
SelectObject
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
GetDeviceCaps
CreateBitmap
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetClipBox
SetMapMode
SetTextColor
SetBkColor
RestoreDC
SaveDC
DeleteObject
SetViewportOrgEx
comdlg32
GetFileTitleA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
RegQueryValueA
RegSetValueExA
RegCreateKeyExA
RegCloseKey
RegOpenKeyA
RegEnumKeyA
RegDeleteKeyA
RegOpenKeyExA
RegQueryValueExA
comctl32
ord17
shlwapi
PathFindExtensionA
PathFindFileNameA
PathStripToRootA
PathIsUNCA
ole32
CoCreateGuid
oleaut32
VariantClear
VariantChangeType
VariantInit
Sections
.text Size: 96KB - Virtual size: 92KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 816KB - Virtual size: 813KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ