Static task
static1
Behavioral task
behavioral1
Sample
df515e5ca556a4c8312da9f84f40189e4eae44bf9d5c400b9b7714a06eb19f19.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
df515e5ca556a4c8312da9f84f40189e4eae44bf9d5c400b9b7714a06eb19f19.exe
Resource
win10v2004-20220812-en
General
-
Target
df515e5ca556a4c8312da9f84f40189e4eae44bf9d5c400b9b7714a06eb19f19
-
Size
200KB
-
MD5
571a663881bdcb5de18acb78916eb093
-
SHA1
53b3075760d38ced1234e831f87e9216ebed6f94
-
SHA256
df515e5ca556a4c8312da9f84f40189e4eae44bf9d5c400b9b7714a06eb19f19
-
SHA512
7ba23197a829ab32292a6e8b7f4ca6392a224fd4174bc3972b363979c0990af047ec7d9cfe9dff8c102e5a9db0514769a4a6be366f198e9446adc18c23b468d0
-
SSDEEP
3072:KR6JVPx++LLL7SufZ/MPEBMoFM0Ou5hSr0J5SgT0DbqV:dx+qL7rB/MPGMoFxR5t0
Malware Config
Signatures
Files
-
df515e5ca556a4c8312da9f84f40189e4eae44bf9d5c400b9b7714a06eb19f19.exe windows x86
c4fee5642487c53b009569f428b431a5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
DrawEdge
DrawFrameControl
DispatchMessageW
ClientToScreen
DestroyCursor
CharToOemA
DispatchMessageA
DestroyIcon
DestroyWindow
ChildWindowFromPoint
BeginPaint
CharNextA
CreateIcon
CheckMenuItem
CharLowerA
CharLowerBuffA
CharUpperBuffA
DefFrameProcA
DrawIcon
CharNextW
DestroyMenu
CallWindowProcA
CloseClipboard
CreatePopupMenu
CreateMenu
DefMDIChildProcA
CallNextHookEx
DeleteMenu
DefWindowProcA
AdjustWindowRectEx
comdlg32
GetFileTitleA
GetOpenFileNameA
ChooseColorA
GetSaveFileNameA
FindTextA
msvcrt
abs
comctl32
ImageList_Remove
ImageList_Write
ImageList_DragShowNolock
ImageList_Draw
ImageList_Destroy
ImageList_Read
ImageList_GetBkColor
ImageList_Add
oleaut32
SysAllocStringLen
version
GetFileVersionInfoSizeA
VerInstallFileA
ole32
CreateBindCtx
StgCreateDocfileOnILockBytes
kernel32
CreateEventA
CompareStringA
CreateThread
DeleteCriticalSection
GetDiskFreeSpaceA
GetFileType
lstrlenA
GetFileSize
GlobalAlloc
DeleteFileA
FindClose
GetProcAddress
EnumCalendarInfoA
GetFullPathNameA
GetCurrentThreadId
GetCommandLineA
EnterCriticalSection
GetACP
LoadLibraryA
FindResourceA
GetEnvironmentStrings
CreateFileA
GetCurrentProcessId
FreeResource
GetVersionExA
FindFirstFileA
FormatMessageA
GetModuleHandleA
ExitProcess
VirtualAlloc
GetCPInfo
ExitThread
CloseHandle
GetLastError
GetFileAttributesA
Sleep
LocalAlloc
FreeLibrary
IsBadReadPtr
GetDateFormatA
shell32
Shell_NotifyIconA
SHGetFileInfoA
SHGetDiskFreeSpaceA
gdi32
GetDIBits
GetObjectA
GetPaletteEntries
GetDIBColorTable
SelectObject
GetRgnBox
LineTo
GetPixel
CreatePenIndirect
shlwapi
SHGetValueA
SHDeleteKeyA
SHEnumValueA
PathIsDirectoryA
PathGetCharTypeA
SHSetValueA
PathFileExistsA
SHDeleteValueA
Sections
.text Size: 68KB - Virtual size: 67KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 942B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc2 Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc7 Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc3 Size: 118KB - Virtual size: 118KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc9 Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc6 Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 976B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ