Static task
static1
Behavioral task
behavioral1
Sample
38962f84d0f2e1a248719225979334939c722c62591a8d8accb6015104120d17.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
38962f84d0f2e1a248719225979334939c722c62591a8d8accb6015104120d17.exe
Resource
win10v2004-20220901-en
General
-
Target
38962f84d0f2e1a248719225979334939c722c62591a8d8accb6015104120d17
-
Size
11.2MB
-
MD5
d366543ac87b8d5181efee863f05f31a
-
SHA1
9636c00afe6b50a3a7c25d27876997907f8c64fc
-
SHA256
38962f84d0f2e1a248719225979334939c722c62591a8d8accb6015104120d17
-
SHA512
c9241016039ac693a3583bf8ccdc2340dc04092f1ae2b9e7b5971083d2a8071c876d6809cfe9b2f85e952a8e809c413334f96b4a7d2f8a53770583192557e325
-
SSDEEP
196608:BmOzhtx253awbyXfRu2TmUvcUL8yqgCf/oksFNI7I95x057f8xLnbnZpP/Zijpt3:BmOzhtiqxTT1UCqgUwksXIUm5TmnrDPk
Malware Config
Signatures
Files
-
38962f84d0f2e1a248719225979334939c722c62591a8d8accb6015104120d17.exe windows x86
6f74612eaf3bfb86c54ee9769537e9c5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
InitCommonControlsEx
shell32
SHGetMalloc
SHGetFileInfoW
CommandLineToArgvW
ShellExecuteW
ShellExecuteExW
SHBrowseForFolderW
SHGetPathFromIDListW
SHGetSpecialFolderLocation
kernel32
CreateFileA
FreeLibrary
GetProcessHeap
HeapAlloc
GetLastError
GetProcAddress
HeapFree
LoadLibraryW
GetModuleFileNameW
LocalFree
WaitForSingleObject
CreateProcessW
SetCurrentDirectoryW
GetCurrentDirectoryW
CloseHandle
SetFileApisToOEM
GetCurrentThread
SetPriorityClass
GetEnvironmentVariableW
SetThreadPriority
GetCurrentProcess
GetModuleHandleW
GetVersionExW
CreateFileW
ExpandEnvironmentStringsW
GetCommandLineW
GetFileAttributesW
RemoveDirectoryW
CreateDirectoryW
DeleteFileW
FindNextFileW
FindFirstFileW
FindClose
FormatMessageW
InterlockedExchangeAdd
SetEndOfFile
SetFileTime
WriteFile
GetFileSize
ReadFile
SetFilePointer
MultiByteToWideChar
WideCharToMultiByte
GetACP
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
SetFileAttributesW
GetLongPathNameW
MoveFileW
lstrlenW
GetTempPathW
GetFullPathNameW
GetWindowsDirectoryW
GetTempFileNameW
SetEvent
ResetEvent
CreateEventW
FindResourceW
FileTimeToSystemTime
SetStdHandle
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
GetStringTypeW
GetStringTypeA
GetLocaleInfoA
LoadLibraryA
HeapReAlloc
VirtualAlloc
FlushFileBuffers
GetConsoleMode
GetConsoleCP
LCMapStringW
LCMapStringA
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
VirtualFree
HeapCreate
HeapDestroy
WaitForMultipleObjects
ResumeThread
GetStartupInfoA
GetFileType
SetHandleCount
GetCommandLineA
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetSystemTimeAsFileTime
GetVersionExA
GetStartupInfoW
ExitThread
GetCurrentThreadId
CreateThread
RaiseException
RtlUnwind
GetModuleHandleA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
InterlockedDecrement
Sleep
HeapSize
ExitProcess
GetStdHandle
GetModuleFileNameA
GetCPInfo
GetOEMCP
IsValidCodePage
user32
LoadIconW
ScreenToClient
TranslateMessage
IsWindowVisible
EnableWindow
GetMessageW
DispatchMessageW
SetTimer
DestroyIcon
IsWindow
MessageBoxW
ShowWindow
PostMessageW
DialogBoxParamW
SetWindowPos
GetWindowRect
GetSystemMetrics
GetDlgItem
SendMessageW
EndDialog
SetFocus
GetWindowTextW
SetWindowTextW
CreateDialogParamW
IsDialogMessageW
GetActiveWindow
GetDesktopWindow
LoadStringW
PostQuitMessage
KillTimer
gdi32
CreateSolidBrush
DeleteObject
ole32
CoUninitialize
CoTaskMemFree
CoInitializeEx
CoCreateInstance
CoInitialize
Sections
.text Size: 255KB - Virtual size: 255KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 51KB - Virtual size: 50KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 130KB - Virtual size: 129KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ