Static task
static1
Behavioral task
behavioral1
Sample
98b91426313dec492d8796144ff1a391150cde17d0ffb9a2afcc1cfbde414270.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
98b91426313dec492d8796144ff1a391150cde17d0ffb9a2afcc1cfbde414270.exe
Resource
win10v2004-20220901-en
General
-
Target
98b91426313dec492d8796144ff1a391150cde17d0ffb9a2afcc1cfbde414270
-
Size
268KB
-
MD5
8ba46b68e2a716e3ea2d0b42f126c4e0
-
SHA1
7696d22e198f22d5528bb84a4269f875057a4355
-
SHA256
98b91426313dec492d8796144ff1a391150cde17d0ffb9a2afcc1cfbde414270
-
SHA512
d90ff9cd789a66adeae1742e929cc5682cf01877095baad7839dd1d5de3c75b0baeb264a948be7203201e99fcc281432202456493e08398337023c3fd23a7db2
-
SSDEEP
6144:W2x4Wm6wAK9x7AsCDueuX7XZsFwJZ0PUNHb+:HxS6wzcsde89f2W
Malware Config
Signatures
Files
-
98b91426313dec492d8796144ff1a391150cde17d0ffb9a2afcc1cfbde414270.exe windows x86
2b7dd7d79e138abf9792778b4bd1790b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comdlg32
GetSaveFileNameA
ChooseColorA
GetFileTitleA
gdi32
DeleteMetaFile
SetBitmapBits
GetTextExtentPointA
GetFontData
TextOutW
SetViewportOrgEx
GetNearestPaletteIndex
SetViewportExtEx
SelectObject
RealizePalette
StretchBlt
StartDocW
EnumFontsA
GetTextFaceW
shell32
SHGetMalloc
ole32
OleSave
CoInitializeSecurity
StgOpenStorage
CoCreateInstance
OleIsCurrentClipboard
ReadFmtUserTypeStg
GetClassFile
CoTaskMemRealloc
CreateGenericComposite
CreateItemMoniker
user32
GetParent
ShowScrollBar
AdjustWindowRectEx
RegisterClipboardFormatW
GetNextDlgGroupItem
GrayStringW
ScrollWindow
wvsprintfW
BringWindowToTop
GetMenuStringW
RemovePropA
SetLayeredWindowAttributes
CreateMenu
GetMessageW
DialogBoxIndirectParamA
RegisterClassExW
ShowCaret
SetActiveWindow
AppendMenuW
GetClipboardFormatNameA
MapVirtualKeyW
GetUpdateRgn
GetSysColor
IsWindowEnabled
GetWindowTextA
SetPropA
IsDlgButtonChecked
TabbedTextOutA
DialogBoxIndirectParamW
LoadIconA
CreateCaret
CharToOemA
SetMessageQueue
CallWindowProcW
WaitMessage
CopyImage
GetInputState
CheckRadioButton
RegisterWindowMessageA
IsCharAlphaNumericW
EnumDisplayMonitors
EndDialog
ExitWindowsEx
DrawStateW
GetDCEx
MessageBeep
CharLowerW
kernel32
GetDateFormatA
GetCurrentProcessId
LCMapStringW
LCMapStringA
GetStringTypeA
MultiByteToWideChar
LoadLibraryA
HeapReAlloc
HeapAlloc
GetACP
LeaveCriticalSection
EnterCriticalSection
InterlockedDecrement
RtlUnwind
HeapFree
VirtualFree
HeapCreate
HeapDestroy
GetVersionExA
GetEnvironmentVariableA
SetLastError
TlsSetValue
GetCurrentThreadId
GetFileType
GetStdHandle
GetEnvironmentStringsW
WideCharToMultiByte
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetProcAddress
ExitProcess
GetVersion
GetStartupInfoA
GetModuleHandleA
GlobalAlloc
TlsAlloc
VirtualAlloc
InitializeCriticalSection
GetSystemWindowsDirectoryW
GetThreadPriority
GetDriveTypeA
MoveFileW
RemoveDirectoryW
CloseHandle
LocalFree
WriteConsoleA
GetPrivateProfileStringW
WriteFile
FindFirstFileA
FormatMessageW
ReleaseMutex
GetConsoleCP
SearchPathW
IsDebuggerPresent
GetExitCodeProcess
GetEnvironmentStrings
VerSetConditionMask
GetFileAttributesExW
GetLastError
TerminateThread
FreeEnvironmentStringsW
WritePrivateProfileSectionA
SystemTimeToTzSpecificLocalTime
VirtualQueryEx
SystemTimeToFileTime
GetFileTime
CreateMutexA
GetStringTypeW
CreateSemaphoreW
GlobalDeleteAtom
EnumCalendarInfoA
CompareStringW
SetUnhandledExceptionFilter
CreateThread
MoveFileExA
SetWaitableTimer
GetFileAttributesA
GetCommandLineA
GetTempPathA
GetLogicalDriveStringsA
DebugBreak
GlobalAddAtomA
lstrcmpA
EnumResourceNamesW
BackupRead
GetCPInfo
DuplicateHandle
CreateEventA
FindNextChangeNotification
WaitForMultipleObjects
GetSystemDefaultLangID
GetConsoleMode
DeleteFileA
OpenFileMappingA
CreateToolhelp32Snapshot
GetProcessAffinityMask
DeviceIoControl
_lopen
GetSystemPowerStatus
SetPriorityClass
GlobalGetAtomNameW
GlobalAddAtomW
lstrcatA
InterlockedCompareExchange
GetSystemTimeAsFileTime
LocalAlloc
ReleaseSemaphore
GetTempPathW
SetThreadLocale
GetModuleFileNameA
LoadResource
GetFullPathNameA
GetPrivateProfileIntW
GetWindowsDirectoryW
GetSystemInfo
TransactNamedPipe
GetStringTypeExA
MoveFileA
MapViewOfFileEx
SetHandleCount
SetProcessWorkingSetSize
TlsGetValue
lstrlenW
LocalFileTimeToFileTime
FormatMessageA
Process32FirstW
CreateFileW
GetVersionExW
OpenEventW
LocalUnlock
lstrcatW
IsBadCodePtr
EnumResourceLanguagesW
GetStringTypeExW
GetOEMCP
MulDiv
DeleteTimerQueueTimer
InterlockedIncrement
GetSystemTime
lstrcmpiA
FreeEnvironmentStringsA
SetFileAttributesW
comctl32
ImageList_Replace
version
VerQueryValueA
advapi32
StartServiceCtrlDispatcherW
CryptDestroyKey
RegSetKeySecurity
ChangeServiceConfig2W
CryptGenRandom
GetSecurityDescriptorLength
CryptAcquireContextA
GetFileSecurityW
shlwapi
PathFindFileNameA
oleaut32
SysStringLen
Sections
.text Size: 227KB - Virtual size: 227KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 23KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 15KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 736B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ