Static task
static1
Behavioral task
behavioral1
Sample
32a88be671fa819b11f89d1b72822a37c851743e8a76de382672f66bec64dcf4.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
32a88be671fa819b11f89d1b72822a37c851743e8a76de382672f66bec64dcf4.exe
Resource
win10v2004-20220812-en
General
-
Target
32a88be671fa819b11f89d1b72822a37c851743e8a76de382672f66bec64dcf4
-
Size
716KB
-
MD5
8bcd777ccb1b2994f7bb4bdf3fa3d1c2
-
SHA1
03da35d1d67ab4c7cf753193e5553fa9c9be8b91
-
SHA256
32a88be671fa819b11f89d1b72822a37c851743e8a76de382672f66bec64dcf4
-
SHA512
a481a3b35f8adb6283ac91e168ab4cff3e33e1cc3b5ac4f94623e2dab05b8c8f71021db05882b15848ab16bd06b47e3a27a54976a951fdd418def05cb42971cc
-
SSDEEP
12288:IJrciifmR4eTuDw6iX6vFZ8H2srq60PaMDx+CA3JWoHsj5ICIPz:I9cmwDw6iX6vK2srqHS2xOY31GPz
Malware Config
Signatures
Files
-
32a88be671fa819b11f89d1b72822a37c851743e8a76de382672f66bec64dcf4.exe windows x86
494d3521abcf89be08f355c58270e770
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
GetWindowExtEx
OffsetViewportOrgEx
GetDeviceCaps
GetCharWidthA
GetColorAdjustment
SelectObject
GetClipBox
GetPaletteEntries
SetMiterLimit
CreateEllipticRgnIndirect
CreateDiscardableBitmap
GetMapMode
GetCurrentPositionEx
RoundRect
CombineRgn
PlgBlt
RealizePalette
GetObjectA
SetWindowOrgEx
GetKerningPairsA
GdiComment
CreateDCA
SelectClipRgn
GetStockObject
CopyMetaFileA
GetBrushOrgEx
GetWindowOrgEx
GetRgnBox
FillPath
AngleArc
EndDoc
SetTextCharacterExtra
GetViewportExtEx
GetBitmapBits
GetRegionData
GetCharABCWidthsFloatA
EnumObjects
DeleteDC
Polygon
EndPage
ExcludeClipRect
SetTextAlign
AnimatePalette
GetTextExtentPoint32A
UpdateColors
DeleteMetaFile
AbortDoc
SetBkMode
GetMiterLimit
ExtCreatePen
PtInRegion
SetTextColor
EqualRgn
CreatePolyPolygonRgn
SetPolyFillMode
GetBoundsRect
SetAbortProc
DrawEscape
SetMapMode
PlayEnhMetaFile
CreatePalette
PlayMetaFile
CreateICA
ExtEscape
StartPage
SetPixelV
AbortPath
CreatePenIndirect
FrameRgn
FlattenPath
GetNearestPaletteIndex
GetAspectRatioFilterEx
SetRectRgn
GetPath
WidenPath
FloodFill
GetCharWidthFloatA
GetViewportOrgEx
CreateCompatibleDC
advapi32
RegSetValueExA
AdjustTokenPrivileges
RegOpenKeyExA
LookupPrivilegeValueA
CreateServiceA
ControlService
RegSetValueA
user32
DefWindowProcA
DeleteMenu
MessageBoxA
IsChild
DestroyWindow
GetParent
IsIconic
GetWindowTextA
PostQuitMessage
RegisterClassExA
SetWindowPos
DrawFocusRect
MapWindowPoints
CharUpperA
LoadCursorA
GetClassInfoExA
KillTimer
RegisterClassA
CreateWindowExA
LoadStringA
SetCapture
GetCursorPos
DestroyIcon
RegisterWindowMessageA
LoadBitmapA
GetDlgItem
ShowWindow
SystemParametersInfoA
MoveWindow
oleaut32
LoadTypeLi
kernel32
lstrcmpA
GlobalGetAtomNameA
WaitForMultipleObjects
GetLogicalDriveStringsA
GetFileSize
HeapSize
GetFileTime
GetModuleHandleA
WaitForSingleObject
GetEnvironmentVariableA
GetSystemDirectoryA
GetCurrentThread
GetUserDefaultLCID
VirtualProtect
OpenProcess
IsBadCodePtr
WideCharToMultiByte
FlushFileBuffers
CompareFileTime
SetStdHandle
LCMapStringA
GetComputerNameA
CompareStringA
GetCurrentProcessId
GetStringTypeA
GetProcAddress
RaiseException
GlobalHandle
HeapAlloc
GetCurrentDirectoryA
ResumeThread
InterlockedDecrement
GetCPInfo
ReadFile
CreateDirectoryA
SetThreadPriority
FreeLibrary
GetFullPathNameA
ExitProcess
HeapCreate
SetFileAttributesA
GetEnvironmentStringsW
TlsSetValue
TerminateProcess
GlobalAlloc
GetEnvironmentStrings
CreateMutexA
MultiByteToWideChar
GetLocalTime
LCMapStringW
LoadResource
CopyFileA
VirtualFree
GlobalLock
FormatMessageA
FindResourceA
TlsFree
GetFileAttributesA
LocalAlloc
EnterCriticalSection
DeleteFileA
RemoveDirectoryA
SetEvent
TlsGetValue
GlobalFindAtomA
LocalReAlloc
TlsAlloc
GlobalDeleteAtom
GetCommandLineA
GetVersionExA
FreeEnvironmentStringsW
SetEndOfFile
ResetEvent
SizeofResource
GetLocaleInfoA
WriteFile
GetPrivateProfileStringA
SetEnvironmentVariableA
GetOEMCP
InitializeCriticalSection
GlobalFlags
GetStringTypeW
MapViewOfFile
InterlockedIncrement
VirtualAlloc
FreeEnvironmentStringsA
VirtualQuery
CreateEventA
GetTempPathA
InterlockedExchange
FindClose
HeapReAlloc
UnhandledExceptionFilter
GetVersion
GetSystemTime
CloseHandle
GetLastError
SetHandleCount
CompareStringW
LocalFree
SetUnhandledExceptionFilter
GetModuleFileNameA
Sleep
MulDiv
FileTimeToSystemTime
HeapDestroy
GetStdHandle
lstrcpynA
IsBadReadPtr
HeapFree
RtlUnwind
GetACP
FindNextFileA
DeleteCriticalSection
SetFilePointer
LeaveCriticalSection
LockResource
GetCurrentProcess
GetTimeZoneInformation
lstrlenW
SetLastError
CreateFileA
QueryPerformanceCounter
GetCurrentThreadId
FindFirstFileA
GetFileType
GetSystemTimeAsFileTime
LoadLibraryA
CreateFileMappingA
GetStartupInfoA
GetTickCount
winspool.drv
ord204
OpenPrinterA
GetPrinterA
ClosePrinter
DocumentPropertiesA
GetJobA
ole32
OleCreateFromData
ReleaseStgMedium
CreateBindCtx
CreateItemMoniker
CoFreeUnusedLibraries
OleInitialize
IsAccelerator
CoRevokeClassObject
CoTaskMemFree
CoGetMalloc
OleCreateMenuDescriptor
CLSIDFromString
OleDestroyMenuDescriptor
OleRun
CreateDataAdviseHolder
OleGetClipboard
OleFlushClipboard
CoLockObjectExternal
OleIsCurrentClipboard
OleTranslateAccelerator
OleCreateStaticFromData
CoCreateInstance
shell32
ord155
ShellExecuteW
SHGetPathFromIDListW
SHGetSpecialFolderLocation
DragAcceptFiles
DragQueryFileW
Sections
.text Size: 80KB - Virtual size: 77KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 464KB - Virtual size: 462KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 112KB - Virtual size: 110KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 56KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ