Static task
static1
Behavioral task
behavioral1
Sample
228645e5c72c69047d81f3c7b5e0ebfa.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
228645e5c72c69047d81f3c7b5e0ebfa.exe
Resource
win10v2004-20231215-en
General
-
Target
228645e5c72c69047d81f3c7b5e0ebfa
-
Size
461KB
-
MD5
228645e5c72c69047d81f3c7b5e0ebfa
-
SHA1
5d4349d9772d2beaebfca84c5d7fd3cc68c894f8
-
SHA256
037d797d32f72b349f3afe79d1dc8c6addce1545ee618a58b488ddcfa1942c72
-
SHA512
7aedad7e4ef0ab750a29f01b92f24b42620294f568565558750a222a5121e8b70eb8e2a0c1a747118f634f0b5be08dcf0b401b6804e6fd419757c805829095c9
-
SSDEEP
6144:SoakgWv8LmllrvJQOwxW6XUrbV0O0T5jDTRGGzz5TBNU3Xi0GsAxnCJgr/t:SGgW+GzO/WwUrPWJlfzddNU3XBwCJgrl
Malware Config
Signatures
Files
-
228645e5c72c69047d81f3c7b5e0ebfa.exe windows:4 windows x86 arch:x86
1cb603963eb3d2013e8d2e7bdd2ad576
Code Sign
85:0d:28:16:f5:d5:a5:ef:6c:44:b3:b1:b7:43:e1:0b:a9:62:50:b2Signer
Actual PE Digest85:0d:28:16:f5:d5:a5:ef:6c:44:b3:b1:b7:43:e1:0b:a9:62:50:b2Digest Algorithmsha1PE Digest MatchestrueHeaders
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
ord17
version
VerQueryValueW
wininet
HttpEndRequestA
kernel32
GetVersion
GetVersionExA
LockResource
VirtualAlloc
CreateFileA
WriteFile
GetLastError
CreateFileMappingA
CloseHandle
GetTickCount
FreeResource
FreeLibrary
FindResourceA
FindFirstFileA
FindClose
FileTimeToLocalFileTime
GetCommandLineA
GetStringTypeA
MultiByteToWideChar
LoadLibraryA
GetDefaultCommConfigA
GetACP
GetCPInfo
FlushFileBuffers
SetStdHandle
HeapReAlloc
HeapAlloc
RtlUnwind
VirtualFree
HeapCreate
HeapDestroy
GetEnvironmentVariableA
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
WideCharToMultiByte
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetModuleFileNameA
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
HeapFree
GetStartupInfoA
GetSystemTimeAsFileTime
SetFilePointer
GetCommandLineW
GetModuleHandleW
lstrcmpiA
ExitProcess
ReadFile
CreateThread
GetModuleHandleA
GetProcAddress
GetStringTypeW
LCMapStringA
LCMapStringW
SetEndOfFile
GetOEMCP
user32
IsIconic
MessageBoxA
IsDialogMessageA
RegisterClassW
GetSystemMetrics
InvalidateRect
GetWindowLongA
GetSystemMenu
GetClassInfoA
GetCapture
IntersectRect
GetWindowThreadProcessId
GetDC
IsRectEmpty
IsWindow
RemovePropA
SetMenu
SetMenuItemInfoA
SetPropA
SetRect
SetScrollInfo
GetWindowPlacement
GetWindowRect
GetClassNameA
GetKeyboardType
GetScrollPos
PtInRect
SetScrollRange
CreateDialogParamA
LoadStringA
GetClientRect
DialogBoxParamA
CreateWindowExA
IsChild
gdi32
CreatePenIndirect
Rectangle
GetDeviceCaps
SetBkColor
TextOutW
ExcludeClipRect
GetClipBox
CreatePen
advapi32
GetUserNameA
RegCreateKeyExA
AllocateLocallyUniqueId
RegCloseKey
ole32
CoUninitialize
CoInitialize
CoTaskMemAlloc
oleaut32
SafeArrayGetUBound
SafeArrayRedim
SafeArrayGetLBound
SafeArrayGetElement
SafeArrayCreate
SysAllocStringLen
SysReAllocStringLen
SafeArrayPutElement
Sections
.text Size: 408KB - Virtual size: 404KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.tdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ