Static task
static1
Behavioral task
behavioral1
Sample
39d0d0c6d44e0289cc56d390642b07c1ce34b0a0e7af50fe580db879c9b7fde9.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
39d0d0c6d44e0289cc56d390642b07c1ce34b0a0e7af50fe580db879c9b7fde9.exe
Resource
win10v2004-20220812-en
General
-
Target
39d0d0c6d44e0289cc56d390642b07c1ce34b0a0e7af50fe580db879c9b7fde9
-
Size
1.9MB
-
MD5
2fcdbb7e7a31d3d28becb7e6efb36848
-
SHA1
456203fc65de3da7674986a4191485e5abd255a3
-
SHA256
39d0d0c6d44e0289cc56d390642b07c1ce34b0a0e7af50fe580db879c9b7fde9
-
SHA512
e328fcd68ded70acee301aa94c164c70215a226f7d8ff92dc1a35f4e0cf50c93cd6862a817053b46f2f84cfc3ce1b1c551b5b366fb69ba63fdc47dc26f0448de
-
SSDEEP
49152:2Kyi8h7P6HEa9GDRtWCR5AeYmUXQ5REvrHs8n7vA/5:2KyiRgDRtjvE/nE/5
Malware Config
Signatures
Files
-
39d0d0c6d44e0289cc56d390642b07c1ce34b0a0e7af50fe580db879c9b7fde9.exe windows x86
74101ebdef561a26ab5fac88f388282e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
ord17
kernel32
GetProcAddress
LoadLibraryA
LockResource
LoadResource
SizeofResource
FindResourceExA
MulDiv
GlobalFree
GlobalAlloc
lstrcmpiA
GetSystemDefaultLCID
GetSystemDefaultUILanguage
GetUserDefaultUILanguage
MultiByteToWideChar
GetLocaleInfoW
lstrlenA
lstrcmpiW
GetEnvironmentVariableW
lstrcmpW
GlobalMemoryStatusEx
VirtualAlloc
WideCharToMultiByte
ExpandEnvironmentStringsW
RemoveDirectoryW
FindClose
FindNextFileW
DeleteFileW
FindFirstFileW
SetThreadLocale
CompareFileTime
lstrlenW
GetSystemTimeAsFileTime
GetTempPathW
SetEnvironmentVariableW
CloseHandle
GetExitCodeProcess
GetQueuedCompletionStatus
ResumeThread
SetInformationJobObject
CreateIoCompletionPort
AssignProcessToJobObject
CreateJobObjectW
CreateProcessW
GetStartupInfoW
GetCommandLineW
CreateFileW
GetDriveTypeW
SetCurrentDirectoryW
SetProcessWorkingSetSize
GetCurrentProcess
GetModuleFileNameW
GetVersionExW
CreateEventW
SetEvent
ResetEvent
InitializeCriticalSection
TerminateThread
SuspendThread
GetCurrentThreadId
GetSystemDirectoryW
LocalFree
lstrcpyW
GetModuleHandleW
DeleteCriticalSection
GetFileSize
SetFilePointer
ReadFile
SetFileTime
SetEndOfFile
EnterCriticalSection
LeaveCriticalSection
WaitForMultipleObjects
HeapFree
HeapAlloc
ExitThread
RaiseException
RtlUnwind
HeapReAlloc
GetCommandLineA
GetStartupInfoA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetModuleFileNameA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
InterlockedDecrement
HeapSize
ExitProcess
HeapCreate
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
TerminateProcess
IsDebuggerPresent
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetLocaleInfoA
InitializeCriticalSectionAndSpinCount
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
VirtualFree
GetStdHandle
WriteFile
CreateDirectoryW
GetFileAttributesW
GetLocalTime
SystemTimeToFileTime
GetLastError
CreateThread
WaitForSingleObject
GetExitCodeThread
Sleep
SetLastError
SetFileAttributesW
GetDiskFreeSpaceExW
FormatMessageW
user32
GetSystemMetrics
SystemParametersInfoW
ShowWindow
DrawTextW
GetDC
ClientToScreen
GetWindow
DialogBoxIndirectParamW
DrawIconEx
CallWindowProcW
DefWindowProcW
CallNextHookEx
PtInRect
SetWindowsHookExW
LoadImageW
LoadIconW
MessageBeep
EnableWindow
IsWindow
EnableMenuItem
GetSystemMenu
SetFocus
wvsprintfW
CharUpperW
SetWindowPos
GetWindowDC
ReleaseDC
CopyImage
wsprintfW
GetParent
GetWindowRect
ScreenToClient
CreateWindowExW
SetTimer
GetMessageW
DispatchMessageW
KillTimer
DestroyWindow
SendMessageW
EndDialog
UnhookWindowsHookEx
SetWindowLongW
GetClientRect
GetDlgItem
GetKeyState
MessageBoxA
wsprintfA
SetWindowTextW
GetSysColor
GetWindowTextLengthW
GetWindowTextW
GetClassNameA
GetWindowLongW
CreateWindowExA
GetMenu
gdi32
SelectObject
CreateCompatibleDC
CreateCompatibleBitmap
GetDeviceCaps
DeleteObject
CreateFontIndirectW
SetStretchBltMode
StretchBlt
GetCurrentObject
GetObjectW
DeleteDC
advapi32
FreeSid
AllocateAndInitializeSid
CheckTokenMembership
shell32
SHBrowseForFolderW
SHGetPathFromIDListW
SHGetMalloc
ShellExecuteW
ShellExecuteExW
SHGetSpecialFolderPathW
SHGetFileInfoW
ole32
CoInitialize
CreateStreamOnHGlobal
CoCreateInstance
oleaut32
SysAllocString
SysFreeString
VariantClear
OleLoadPicture
Sections
.text Size: 116KB - Virtual size: 116KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 22KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 27KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ