Static task
static1
Behavioral task
behavioral1
Sample
12e3057132636ca3d210cc280b9dceea.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
12e3057132636ca3d210cc280b9dceea.exe
Resource
win10v2004-20231215-en
General
-
Target
12e3057132636ca3d210cc280b9dceea
-
Size
461KB
-
MD5
12e3057132636ca3d210cc280b9dceea
-
SHA1
fa959c1ee9a4d4017f151de3d0293a345dbb946a
-
SHA256
64526e3e2c64056687dd89e03a8c092d2b4ba0213958d367d1bb0643b62ce67c
-
SHA512
a9c16f4c4e4d971739186a004bb7ebc7a43721415469a297d82b550367ab95bd6dddc5bcba5a58e4b632140c69c9014f6cc27fb8145a14ca216901fdd036f32f
-
SSDEEP
12288:HDFwMZFUlpkyPJRIp2VZZuLQyEmDFTzFl0RECJgrh:HZwKSlp5ZUUyTFYECJgrh
Malware Config
Signatures
Files
-
12e3057132636ca3d210cc280b9dceea.exe windows:4 windows x86 arch:x86
8c20f0472f333349b2cada643f9171f5
Code Sign
58:c5:9e:e7:a5:e0:83:69:92:73:e6:2c:3a:e3:20:57:4e:90:f4:98Signer
Actual PE Digest58:c5:9e:e7:a5:e0:83:69:92:73:e6:2c:3a:e3:20:57:4e:90:f4:98Digest Algorithmsha1PE Digest MatchestrueHeaders
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
ord17
version
VerQueryValueW
wininet
HttpEndRequestA
kernel32
lstrcmpiA
GetTickCount
GetDefaultCommConfigA
GetVersion
LockResource
ExitProcess
VirtualAlloc
ReadFile
GetModuleHandleW
GetLastError
CreateFileMappingA
QueryPerformanceCounter
CloseHandle
FreeResource
FreeLibrary
FindResourceA
FindFirstFileA
FindClose
FileTimeToLocalFileTime
SetErrorMode
GetStringTypeA
LoadLibraryA
GetOEMCP
GetACP
GetCPInfo
FlushFileBuffers
SetStdHandle
HeapReAlloc
HeapAlloc
RtlUnwind
VirtualFree
HeapCreate
HeapDestroy
GetEnvironmentVariableA
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
WideCharToMultiByte
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetModuleFileNameA
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
HeapFree
SetFilePointer
GetCommandLineW
GetStartupInfoA
GetSystemTimeAsFileTime
GetModuleHandleA
GetCommandLineA
GetProcAddress
GetVersionExA
CreateThread
GetUserDefaultLangID
WriteFile
GetStringTypeW
LCMapStringA
LCMapStringW
MultiByteToWideChar
user32
IsChild
GetDC
InvalidateRect
GetSystemMetrics
GetWindowLongA
GetSystemMenu
GetClassInfoA
GetCapture
IntersectRect
GetWindowThreadProcessId
RegisterClassW
MessageBoxA
IsIconic
IsRectEmpty
IsWindow
RemovePropA
SetMenu
SetMenuItemInfoA
SetPropA
SetRect
SetScrollInfo
GetWindowPlacement
GetWindowRect
GetClassNameA
GetKeyboardType
GetScrollPos
PtInRect
LoadStringA
GetClientRect
DialogBoxParamA
RegisterClassExA
CreateDialogParamA
CreateWindowExA
IsDialogMessageA
gdi32
CreatePenIndirect
Rectangle
GetDeviceCaps
SetBkColor
TextOutW
ExcludeClipRect
GetClipBox
CreatePen
advapi32
RegSetValueExW
AllocateLocallyUniqueId
RegCreateKeyExA
RegCloseKey
GetUserNameA
oleaut32
SafeArrayGetUBound
SafeArrayRedim
SafeArrayGetLBound
SafeArrayGetElement
SafeArrayCreate
SysAllocStringLen
SysReAllocStringLen
SafeArrayPutElement
Sections
.text Size: 404KB - Virtual size: 402KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 4KB - Virtual size: 100B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ