Static task
static1
Behavioral task
behavioral1
Sample
d3abd57d536e88b9b5a6e4f02bfae84647acb788b1b6790f5d616a9797de150e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d3abd57d536e88b9b5a6e4f02bfae84647acb788b1b6790f5d616a9797de150e.exe
Resource
win10v2004-20220812-en
General
-
Target
d3abd57d536e88b9b5a6e4f02bfae84647acb788b1b6790f5d616a9797de150e
-
Size
453KB
-
MD5
86fe75057918dacf941f7420d60524f1
-
SHA1
f07d210c46a5b8e7b625a63ff59a63cf9079cd52
-
SHA256
d3abd57d536e88b9b5a6e4f02bfae84647acb788b1b6790f5d616a9797de150e
-
SHA512
eb5131ed00c92650e69f5b3915cdd0f9672ede8b355eb47b5c541a4daed1a2f0b2b8bc03e97e2b3d4c7e3fc339befc94cccd7d8b17b8120ef3453736d426b502
-
SSDEEP
12288:LKdjWeQ72MsIssVK0G53wODE1k1TWoDIg4DSTBtGccqh2m:8hMFlKdAk+g4D2Gccrm
Malware Config
Signatures
Files
-
d3abd57d536e88b9b5a6e4f02bfae84647acb788b1b6790f5d616a9797de150e.exe windows x86
2f61d815ea823a845468b1dda24f4098
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
AddFontResourceA
SetBkColor
DeviceCapabilitiesExW
user32
RegisterClassA
SendNotifyMessageW
CreatePopupMenu
SetWindowsHookA
GetWindowWord
CharToOemBuffW
GetNextDlgGroupItem
RegisterWindowMessageW
DestroyAcceleratorTable
MapWindowPoints
DispatchMessageW
advapi32
CryptGetDefaultProviderW
RegOpenKeyA
InitializeSecurityDescriptor
comdlg32
ChooseFontA
GetSaveFileNameW
GetFileTitleA
GetOpenFileNameA
ChooseColorA
PageSetupDlgW
GetSaveFileNameA
FindTextW
PrintDlgW
PageSetupDlgA
kernel32
GetSystemTimeAsFileTime
GetStartupInfoA
DeleteCriticalSection
GetCurrentThread
LoadLibraryA
FreeEnvironmentStringsA
GetCurrentThreadId
LeaveCriticalSection
UnhandledExceptionFilter
TlsSetValue
SetLastError
HeapFree
QueryPerformanceCounter
CreateFileMappingA
LCMapStringW
GetStringTypeW
EnterCriticalSection
HeapDestroy
HeapSize
TlsGetValue
OpenWaitableTimerA
ExitThread
GetModuleHandleA
HeapAlloc
TlsFree
GetEnvironmentStringsW
TerminateProcess
GetFileType
GetModuleFileNameA
SetStdHandle
WriteFile
GetOEMCP
TlsAlloc
GetVersion
GetACP
VirtualQuery
LCMapStringA
GlobalUnlock
RtlUnwind
GetLastError
ExitProcess
HeapReAlloc
VirtualAlloc
GetTickCount
InitializeCriticalSection
GetProcAddress
GetStringTypeA
VirtualFree
SetHandleCount
HeapCreate
GetCPInfo
GetCurrentProcessId
IsBadWritePtr
GetEnvironmentStrings
GetCurrentProcess
FileTimeToSystemTime
GetDiskFreeSpaceExW
WriteConsoleOutputCharacterW
InterlockedExchange
MultiByteToWideChar
GetCommandLineA
GetStdHandle
WideCharToMultiByte
ReadFileEx
WritePrivateProfileSectionA
FreeEnvironmentStringsW
Sections
.text Size: 137KB - Virtual size: 136KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 305KB - Virtual size: 304KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ