Static task
static1
Behavioral task
behavioral1
Sample
857073d47a97df9bd8a1297a381a554ed63f62115cac73b2acddedd9ea4787d0.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
857073d47a97df9bd8a1297a381a554ed63f62115cac73b2acddedd9ea4787d0.exe
Resource
win10v2004-20230220-en
General
-
Target
857073d47a97df9bd8a1297a381a554ed63f62115cac73b2acddedd9ea4787d0
-
Size
1.2MB
-
MD5
77d9bdd062c17b39fc202bf7370154f0
-
SHA1
7b0b0d7a004181c4e78fcf3de11619ebebf5c5b0
-
SHA256
857073d47a97df9bd8a1297a381a554ed63f62115cac73b2acddedd9ea4787d0
-
SHA512
1f483ed81ae82126f19dc85ba1cb8e067c5ed5b46f364c42e785b4d472df04679fdc5277cf81cdc4fd9263601296a3eab1bf6a147815911ead88cec38a83bf2a
-
SSDEEP
12288:TC2/u5Zr0yvF/kgyFg9B0gFvtMrFdDtCc8x6vRCHM:T5/u5Zr0y9/kjmRvtvc3JCs
Malware Config
Signatures
Files
-
857073d47a97df9bd8a1297a381a554ed63f62115cac73b2acddedd9ea4787d0.exe windows x86
dd5f80cca8169173bcfae1a87829f384
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegSetValueExA
RegCloseKey
RegDeleteValueA
RegOpenKeyExA
comctl32
ImageList_Draw
InitCommonControlsEx
ImageList_Create
ImageList_ReplaceIcon
ImageList_Destroy
CreateToolbarEx
gdi32
CreateDIBSection
CreateFontIndirectA
GetDeviceCaps
PatBlt
GetTextExtentPoint32A
Rectangle
SetBkMode
SetTextColor
ExtFloodFill
RoundRect
CreateSolidBrush
CreateCompatibleDC
CreateCompatibleBitmap
CreatePen
SelectObject
SelectClipRgn
CreateRoundRectRgn
MoveToEx
LineTo
BitBlt
TextOutA
DeleteDC
DeleteObject
kernel32
SetThreadExecutionState
GetModuleFileNameA
GetVersionExA
QueryPerformanceFrequency
LocalFree
FormatMessageA
WideCharToMultiByte
DeleteFileA
GetComputerNameA
GetLocalTime
MapViewOfFile
CreateFileMappingA
UnmapViewOfFile
OpenFile
GetSystemInfo
QueryPerformanceCounter
SetThreadPriority
GetThreadPriority
GetCurrentThread
Sleep
GetProcessAffinityMask
GetCurrentProcess
SetCommTimeouts
SetCommState
GetCommState
ReadFile
GetSystemPowerStatus
lstrcpy
lstrlen
GlobalUnlock
GlobalLock
GlobalSize
GetOEMCP
GetACP
GetCPInfo
WriteFile
HeapSize
SetUnhandledExceptionFilter
IsBadWritePtr
HeapReAlloc
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
GetVersion
GetCommandLineA
GetStartupInfoA
GetModuleHandleA
TerminateProcess
ExitProcess
GetSystemTimeAsFileTime
GetSystemTime
GetTimeZoneInformation
RaiseException
RtlUnwind
HeapAlloc
HeapFree
GetLastError
CreateFileA
DeviceIoControl
CloseHandle
GetEnvironmentVariableA
GetEnvironmentStringsW
LockResource
GetStdHandle
LoadLibraryA
GetProcAddress
FreeLibrary
MultiByteToWideChar
LCMapStringA
LCMapStringW
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetFileType
SetFilePointer
FreeEnvironmentStringsW
GetEnvironmentStrings
GetStringTypeA
GetStringTypeW
SetStdHandle
FlushFileBuffers
IsBadReadPtr
IsBadCodePtr
SetEndOfFile
CompareStringA
CompareStringW
ClearCommError
SetEnvironmentVariableA
powrprof
CallNtPowerInformation
setupapi
SetupDiGetClassDevsA
SetupDiGetDeviceInterfaceDetailA
SetupDiEnumDeviceInterfaces
SetupDiDestroyDeviceInfoList
shell32
Shell_NotifyIcon
ShellExecuteA
user32
GetDesktopWindow
WinHelpA
UpdateWindow
SetDlgItemInt
DrawTextExA
ScreenToClient
MoveWindow
GetWindowDC
SendDlgItemMessageA
InvalidateRect
GetDlgItem
EnableWindow
GetMenu
GetSystemMetrics
GetDC
GetSysColorBrush
FillRect
ReleaseDC
KillTimer
GetWindowRect
CreateWindowExA
SetWindowPos
SetTimer
ClientToScreen
TrackMouseEvent
GetDlgItemInt
ReleaseCapture
RegisterClassA
GetDlgItemTextA
EnableMenuItem
SetForegroundWindow
DestroyWindow
LoadMenuA
GetSubMenu
GetCursorPos
DeleteMenu
TrackPopupMenu
PostMessageA
DestroyMenu
DefWindowProcA
LoadIconA
LoadCursorA
RegisterClassExA
CreateDialogParamA
ShowWindow
PostQuitMessage
DialogBoxParamA
SetWindowTextA
SendMessageA
GetMessageA
TranslateMessage
DispatchMessageA
MessageBoxA
EndDialog
SetDlgItemTextA
OpenClipboard
GetClipboardData
LoadStringA
CloseClipboard
SetCapture
DrawTextA
GetClientRect
winmm
PlaySound
ws2_32
WSACleanup
socket
WSAStartup
gethostbyname
WSAGetLastError
htons
connect
recv
send
closesocket
comdlg32
GetOpenFileNameA
Sections
.text Size: 83KB - Virtual size: 83KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 67KB - Virtual size: 67KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text1 Size: 256KB - Virtual size: 256KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.adata Size: 64KB - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data1 Size: 128KB - Virtual size: 128KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 256KB - Virtual size: 256KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 360KB - Virtual size: 356KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.mackt Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE