Static task
static1
Behavioral task
behavioral1
Sample
a31ecfcc4ed4a28b39fa161ccf181289a690afb838c5e46266e4719602df36b7.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a31ecfcc4ed4a28b39fa161ccf181289a690afb838c5e46266e4719602df36b7.exe
Resource
win10v2004-20220812-en
General
-
Target
a31ecfcc4ed4a28b39fa161ccf181289a690afb838c5e46266e4719602df36b7
-
Size
213KB
-
MD5
b4dd079e4921e1172e64a90950b32064
-
SHA1
dddcffa733135d278f24bb7073e2bf8c76bdb16d
-
SHA256
a31ecfcc4ed4a28b39fa161ccf181289a690afb838c5e46266e4719602df36b7
-
SHA512
7e9ca29bfe5cf0f48aa33328bdfd75239ee0a7d159894c49d8b6e11a22cc00f01a9c0d1c778d872b16b41c255206d6aa71c3b672b92915a30feeb6eb1bba392c
-
SSDEEP
1536:qdSBnQm5QcVqjrkY3e+PuavOYR6CbdZsuuNB5oIVd9/X:RBn/V4oCtuavbwocX
Malware Config
Signatures
Files
-
a31ecfcc4ed4a28b39fa161ccf181289a690afb838c5e46266e4719602df36b7.exe windows x86
6094b2e748208ac746dada272971a961
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetFileAttributesW
SetFileAttributesW
Sleep
GetTickCount
GetLastError
GetFileSize
GetModuleFileNameW
GetVersion
GetCurrentProcess
CopyFileW
ExitProcess
SetEnvironmentVariableW
GetWindowsDirectoryW
GetTempPathW
GetCommandLineW
SetErrorMode
lstrlenW
lstrcpynW
GetDiskFreeSpaceW
SetCurrentDirectoryW
GlobalLock
CreateThread
CreateDirectoryW
CreateProcessW
lstrcmpiA
CreateFileW
GetTempFileNameW
WriteFile
lstrcatW
GetSystemDirectoryW
GetProcAddress
GetModuleHandleA
GetExitCodeProcess
WaitForSingleObject
RemoveDirectoryW
lstrcpyA
MoveFileExW
MoveFileW
GetFullPathNameW
GetShortPathNameW
SearchPathW
CompareFileTime
SetFileTime
CloseHandle
lstrcmpiW
lstrcmpW
ExpandEnvironmentStringsW
GlobalAlloc
GlobalFree
GetModuleHandleW
LoadLibraryExW
FreeLibrary
WritePrivateProfileStringW
GetPrivateProfileStringW
MulDiv
WideCharToMultiByte
lstrlenA
MultiByteToWideChar
ReadFile
SetFilePointer
FindClose
FindNextFileW
FindFirstFileW
DeleteFileW
GlobalUnlock
user32
IsWindowVisible
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
TrackPopupMenu
GetWindowRect
AppendMenuW
CreatePopupMenu
GetSystemMetrics
EndDialog
EnableMenuItem
GetSystemMenu
SetClassLongW
IsWindowEnabled
SetWindowPos
DialogBoxParamW
GetClassInfoW
CreateWindowExW
CallWindowProcW
RegisterClassW
SetDlgItemTextW
GetDlgItemTextW
MessageBoxIndirectW
CharNextA
CharPrevW
DispatchMessageW
PeekMessageW
wsprintfA
GetSysColor
CharNextW
ExitWindowsEx
DestroyWindow
CreateDialogParamW
SetTimer
SetWindowTextW
PostQuitMessage
SetForegroundWindow
GetMessagePos
ScreenToClient
CheckDlgButton
LoadCursorW
SetCursor
SystemParametersInfoW
GetWindowLongW
ShowWindow
SendMessageTimeoutW
FindWindowExW
IsWindow
GetDlgItem
SetWindowLongW
LoadImageW
GetDC
ReleaseDC
EnableWindow
InvalidateRect
SendMessageW
DefWindowProcW
BeginPaint
GetClientRect
FillRect
DrawTextW
EndPaint
wsprintfW
gdi32
SetBkColor
GetDeviceCaps
DeleteObject
CreateBrushIndirect
CreateFontIndirectW
SetBkMode
SetTextColor
SelectObject
shell32
ShellExecuteExW
SHBrowseForFolderW
SHGetPathFromIDListW
SHGetFileInfoW
SHFileOperationW
SHGetSpecialFolderLocation
advapi32
RegQueryValueExW
AdjustTokenPrivileges
RegDeleteValueW
RegSetValueExW
RegCreateKeyExW
RegOpenKeyExW
SetFileSecurityW
OpenProcessToken
RegDeleteKeyW
RegCloseKey
RegEnumKeyW
RegEnumValueW
LookupPrivilegeValueW
comctl32
ImageList_Destroy
ImageList_AddMasked
ord17
ImageList_Create
ole32
OleUninitialize
OleInitialize
CoTaskMemFree
CoCreateInstance
Sections
.text Size: 27KB - Virtual size: 27KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 191KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ndata Size: - Virtual size: 80KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 167KB - Virtual size: 166KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ