Static task
static1
Behavioral task
behavioral1
Sample
38d5826f1fd56dc6d2b7bf30bf11223c8d111f3e0564e21c36745b084b76ffc9.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
38d5826f1fd56dc6d2b7bf30bf11223c8d111f3e0564e21c36745b084b76ffc9.exe
Resource
win10v2004-20220812-en
General
-
Target
38d5826f1fd56dc6d2b7bf30bf11223c8d111f3e0564e21c36745b084b76ffc9
-
Size
317KB
-
MD5
cf796605ac3cccd4b4791fcbb42ef30c
-
SHA1
d23b9d7f1340c2ff5674c3a6a2ed9102158a1d51
-
SHA256
38d5826f1fd56dc6d2b7bf30bf11223c8d111f3e0564e21c36745b084b76ffc9
-
SHA512
3732f76b6d7251b2732a7fec010f869cb4850772c847f146ea4fd44ef4d6a3c9957e5e11ce2a391e1ece2b55ef2621e93d31916d66c4ce714bb2797cc833bc5c
-
SSDEEP
6144:m1Lz60cKdrmGmi3Io2Q9OnTujupApxW97iTp0o/LUa4+UDVy:m1q0ldGiR20OLO+str/l
Malware Config
Signatures
Files
-
38d5826f1fd56dc6d2b7bf30bf11223c8d111f3e0564e21c36745b084b76ffc9.exe windows x86
02061f478f2bf9296d89f86df1a7d7f8
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetSystemDefaultLangID
PeekNamedPipe
UnhandledExceptionFilter
_hread
FreeResource
FindFirstFileW
SetNamedPipeHandleState
GetSystemDirectoryW
ReadConsoleA
GetDriveTypeW
LocalLock
GetDiskFreeSpaceW
_lclose
SetThreadPriorityBoost
FindFirstFileA
InitializeCriticalSection
GetThreadPriority
GetEnvironmentStringsW
GetTapeParameters
FillConsoleOutputCharacterA
EnumResourceNamesA
GlobalFlags
GetTimeZoneInformation
GetFileAttributesA
GetLocaleInfoW
SetConsoleCursorPosition
GlobalAddAtomA
ScrollConsoleScreenBufferA
GetHandleInformation
RemoveDirectoryW
EnumResourceLanguagesW
SetEnvironmentVariableW
UnmapViewOfFile
MoveFileExA
GetStringTypeExW
GetSystemInfo
lstrcpynA
EnumSystemCodePagesW
MultiByteToWideChar
GetCPInfo
GetTickCount
VirtualQueryEx
ConnectNamedPipe
EnumResourceNamesW
SetProcessAffinityMask
LocalFileTimeToFileTime
GetTempPathW
SetCommMask
GetCurrentProcessId
CreateWaitableTimerA
CreateIoCompletionPort
GetEnvironmentVariableW
CompareStringA
PulseEvent
FindFirstFileExW
_llseek
TlsGetValue
AreFileApisANSI
SetLastError
SetCurrentDirectoryA
GetStartupInfoA
EraseTape
GetShortPathNameA
GetModuleHandleA
GetProfileStringA
GetSystemTimeAdjustment
WriteConsoleOutputCharacterA
GetDiskFreeSpaceExA
CloseHandle
EnumTimeFormatsW
FormatMessageA
SystemTimeToFileTime
GetComputerNameW
IsBadWritePtr
ReadConsoleOutputA
GetOverlappedResult
FatalAppExitA
WritePrivateProfileStringA
SetupComm
GetLongPathNameA
GetVersion
GetProfileIntA
GetUserDefaultLangID
VirtualFree
QueryDosDeviceW
GetTempFileNameA
GetThreadContext
VirtualProtect
LocalSize
EnumCalendarInfoW
DeleteCriticalSection
GetCommandLineA
lstrlenA
VirtualAlloc
SetProcessShutdownParameters
ExitProcess
user32
GetMenuItemCount
EnumDisplaySettingsExW
HiliteMenuItem
GetWindowLongA
DefDlgProcW
OpenClipboard
TranslateMessage
EnableWindow
GetForegroundWindow
SetCursor
EnumWindowStationsA
GetClassInfoExA
IsCharAlphaW
SetForegroundWindow
CallNextHookEx
GetMonitorInfoA
GetPropW
GetWindowTextA
IsIconic
GetClipboardOwner
GetWindowRect
EnumClipboardFormats
ScrollWindow
SetCaretBlinkTime
GetAsyncKeyState
ShowWindowAsync
GetDCEx
DestroyIcon
CreateWindowExA
CheckMenuRadioItem
SetWindowRgn
GetWindow
EnumDisplayDevicesA
SwitchDesktop
VkKeyScanA
MsgWaitForMultipleObjectsEx
SetUserObjectInformationW
SetMenu
CreateDialogIndirectParamA
GetClipboardSequenceNumber
TabbedTextOutA
UnregisterHotKey
ChildWindowFromPoint
AppendMenuA
MapDialogRect
GetDlgItemTextW
BeginPaint
CopyImage
GetMessageW
GetDlgItemInt
OpenIcon
TrackPopupMenuEx
CharToOemBuffA
RegisterDeviceNotificationW
FlashWindowEx
MapVirtualKeyExW
GetDesktopWindow
gdi32
CreateFontIndirectA
GetSystemPaletteEntries
SetMetaFileBitsEx
PtInRegion
GetBrushOrgEx
BitBlt
GetROP2
CloseEnhMetaFile
GetDIBColorTable
SelectClipPath
GdiFlush
CreateHalftonePalette
StretchDIBits
SaveDC
GetCharacterPlacementA
SetEnhMetaFileBits
CreateBitmapIndirect
comdlg32
GetSaveFileNameW
ReplaceTextA
advapi32
RegisterServiceCtrlHandlerA
RegSaveKeyA
CryptSignHashW
RevertToSelf
EnumServicesStatusA
RegDeleteValueW
shell32
SHFileOperationW
FindExecutableW
SHBrowseForFolderA
SHChangeNotify
ShellExecuteA
Shell_NotifyIconA
SHGetSpecialFolderPathA
SHAddToRecentDocs
ole32
OleSetClipboard
ReadClassStm
CoGetClassObject
StringFromGUID2
oleaut32
SafeArrayUnaccessData
QueryPathOfRegTypeLi
SafeArrayPutElement
comctl32
ImageList_Remove
PropertySheetW
CreateToolbarEx
shlwapi
PathIsSameRootW
SHEnumValueW
StrPBrkW
StrCmpLogicalW
msvcrt
wcslen
_unlink
iswspace
swprintf
clearerr
wcscoll
_wchmod
wcsncmp
towupper
ungetc
_strcmpi
_wcsnset
_getdrive
_lseek
_memicmp
_getche
tmpnam
__p___argc
_wfreopen
_spawnv
_mbsnbcmp
atof
_cexit
_eof
_pipe
_wfsopen
_isctype
_ltow
Sections
.text Size: 237KB - Virtual size: 236KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 73KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE