Static task
static1
Behavioral task
behavioral1
Sample
33e3b61ff8cc4a27119a1f4857b2e61ad8a085a2d2c959feed3d6a75b2c8243e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
33e3b61ff8cc4a27119a1f4857b2e61ad8a085a2d2c959feed3d6a75b2c8243e.exe
Resource
win10v2004-20220812-en
General
-
Target
33e3b61ff8cc4a27119a1f4857b2e61ad8a085a2d2c959feed3d6a75b2c8243e
-
Size
71KB
-
MD5
cd5fc466315f7ef890245afb38b9d877
-
SHA1
eab1a3794b2dd3aa3ea64c5f07879afa1c523d06
-
SHA256
33e3b61ff8cc4a27119a1f4857b2e61ad8a085a2d2c959feed3d6a75b2c8243e
-
SHA512
479b74860194c617cf8dd07a5d9af720f01198a7cad3d1727284c4b796a53ddf34be5ee3d486cee9b7755052127fda7462e22feb2fbe5e99e06ca9d920936eb0
-
SSDEEP
768:G2OLU/TKkYeuRT7pWipR2dii0Wieqa7J9SCV38Bf0udz09bIbJtHQPuAe9qFmeLc:BVmkYzdb8UiL9DSCh8ghcfqe9qn/Q
Malware Config
Signatures
Files
-
33e3b61ff8cc4a27119a1f4857b2e61ad8a085a2d2c959feed3d6a75b2c8243e.exe windows x86
a171004d938dcf65945fe223c706327e
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualAlloc
GetWindowsDirectoryA
lstrlenA
lstrcpyA
CreateFileA
LoadLibraryA
GetProcAddress
user32
MapWindowPoints
GetKeyState
LoadAcceleratorsA
EnumDisplaySettingsW
ToAsciiEx
SetUserObjectInformationW
InvertRect
EnumPropsExA
LoadMenuA
GetMenuItemCount
CharNextExA
GetClassWord
ShowCursor
GetPriorityClipboardFormat
GetUpdateRect
DeregisterShellHookWindow
PostQuitMessage
PtInRect
EnumClipboardFormats
MonitorFromPoint
GetMonitorInfoW
DdeQueryConvInfo
GetMessageTime
CreateDesktopA
SetThreadDesktop
GetClassInfoW
GetKeyboardState
ReleaseCapture
DispatchMessageA
TranslateAccelerator
GetClipboardOwner
ReplyMessage
GetClassInfoExW
CreateDialogIndirectParamW
DrawIconEx
CharToOemBuffA
SetWindowsHookExA
EnumWindows
SetLayeredWindowAttributes
WaitMessage
SetDlgItemInt
SetFocus
IsCharAlphaW
GetKBCodePage
SendNotifyMessageW
BeginPaint
ModifyMenuW
IsClipboardFormatAvailable
SetWindowLongW
DdeEnableCallback
SendDlgItemMessageW
GetMonitorInfoA
InSendMessageEx
EnableWindow
GetScrollInfo
SetShellWindow
EnableScrollBar
DefDlgProcW
CreateMDIWindowW
EndTask
IsIconic
IsCharAlphaA
IsWindowUnicode
CharUpperBuffW
DialogBoxParamA
CharLowerA
KillTimer
OemToCharBuffW
SetClipboardData
PeekMessageW
SetMessageExtraInfo
MsgWaitForMultipleObjects
LoadIconA
GetQueueStatus
CharToOemA
UnloadKeyboardLayout
SendMessageTimeoutW
GetKeyboardLayout
MessageBoxA
SetSysColors
RegisterClipboardFormatW
GetClassLongW
EqualRect
SetParent
DeferWindowPos
EnumDisplaySettingsA
wsprintfW
CharToOemW
RegisterClassA
IsDlgButtonChecked
advapi32
RegOpenKeyExA
shlwapi
StrRChrIA
SHRegOpenUSKeyW
UrlApplySchemeA
PathCommonPrefixA
SHRegOpenUSKeyA
StrCmpNA
SHDeleteEmptyKeyA
PathFileExistsA
StrFormatByteSize64A
StrRetToBufW
StrStrW
UrlIsOpaqueW
StrRetToBufA
AssocQueryStringW
StrCmpNW
PathRemoveExtensionW
StrCSpnIW
StrNCatW
SHRegWriteUSValueA
StrFormatKBSizeA
PathGetArgsW
StrCatW
SHGetInverseCMAP
SHRegDeleteEmptyUSKeyW
SHCopyKeyA
StrChrW
PathQuoteSpacesA
PathIsUNCServerW
SHRegDeleteEmptyUSKeyA
PathCombineW
StrFromTimeIntervalA
UrlIsA
StrFormatByteSizeW
StrChrIA
AssocQueryKeyA
PathRemoveBlanksW
PathUnquoteSpacesA
StrIsIntlEqualA
PathIsNetworkPathW
PathFindOnPathW
PathAppendW
PathRemoveExtensionA
SHDeleteEmptyKeyW
PathRemoveArgsA
PathCompactPathExA
PathParseIconLocationA
UrlIsW
PathGetDriveNumberW
PathSkipRootW
SHIsLowMemoryMachine
PathIsUNCServerA
UrlIsNoHistoryW
StrCmpNIW
PathUnmakeSystemFolderA
PathFindExtensionA
PathMakePrettyA
SHEnumKeyExA
SHRegGetBoolUSValueW
AssocQueryStringByKeyW
SHRegEnumUSValueW
StrDupW
UrlCreateFromPathW
AssocQueryStringByKeyA
ChrCmpIA
SHRegQueryUSValueW
StrSpnA
SHEnumValueA
StrPBrkW
PathIsFileSpecA
PathFileExistsW
PathIsRootW
StrTrimA
SHStrDupW
StrCatBuffA
PathRenameExtensionW
SHRegGetBoolUSValueA
PathIsRelativeW
StrChrIW
SHSetThreadRef
SHAutoComplete
SHRegCreateUSKeyA
PathMakeSystemFolderA
UrlCanonicalizeA
wvnsprintfA
SHRegEnumUSValueA
PathFindNextComponentW
PathSearchAndQualifyA
SHRegQueryInfoUSKeyA
SHRegEnumUSKeyA
SHCopyKeyW
PathRemoveBackslashA
StrStrIW
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.d3 Size: 1024B - Virtual size: 1000B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.d2 Size: 1024B - Virtual size: 1000B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.d1 Size: 40KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 920B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ