Static task
static1
Behavioral task
behavioral1
Sample
d9c14edd480818f15a719cf6124d82da7c0e3d3fa147b5fdcb31613e8dea54f9.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d9c14edd480818f15a719cf6124d82da7c0e3d3fa147b5fdcb31613e8dea54f9.exe
Resource
win10v2004-20220812-en
General
-
Target
d9c14edd480818f15a719cf6124d82da7c0e3d3fa147b5fdcb31613e8dea54f9
-
Size
234KB
-
MD5
72e5c5d464c45d72d892ff62451492ab
-
SHA1
26062579ffe4f78cd82244ddf9a9f46d59320009
-
SHA256
d9c14edd480818f15a719cf6124d82da7c0e3d3fa147b5fdcb31613e8dea54f9
-
SHA512
ed6df360faa612a76aaaf9bbe9fd67c573fca5c334628767fa7d2308f8762b89050df614633ff2e87aee329b908466e0d98bb3c546df5a9ae8cf445314d15451
-
SSDEEP
6144:lTZgtOYJWp0a98KOcEwR/xiXOFG57PzN:llgJJW1OcEwhodNb
Malware Config
Signatures
Files
-
d9c14edd480818f15a719cf6124d82da7c0e3d3fa147b5fdcb31613e8dea54f9.exe windows x86
4f93ec81a3196637bff80ff2cb9b0893
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
wsprintfA
SetWindowTextA
SetActiveWindow
LoadBitmapA
EnableMenuItem
GetClassNameA
DrawIcon
UpdateWindow
TranslateMessage
ValidateRect
PeekMessageA
GetWindowLongA
LoadCursorA
GetSubMenu
EndPaint
GetKeyState
GetCursorPos
GetMenuItemCount
GetActiveWindow
LoadStringA
CreateWindowExA
GetNextDlgTabItem
ShowWindow
SendDlgItemMessageA
ClientToScreen
GetWindowTextLengthA
LoadIconA
GetMenuState
PostQuitMessage
DispatchMessageA
CallWindowProcA
GetWindowRect
WinHelpA
SetWindowLongA
GetDC
GetParent
SystemParametersInfoA
DefWindowProcA
IsWindow
GetMenuCheckMarkDimensions
GetClassInfoA
GetFocus
GetMessageTime
GetDlgCtrlID
GetMenu
DestroyMenu
IsIconic
PtInRect
SetPropA
SetForegroundWindow
ReleaseDC
SetWindowsHookExA
GetMessageA
GetSysColorBrush
RegisterClassA
DrawTextA
GetCapture
PostMessageA
GetWindowPlacement
EnableWindow
AdjustWindowRectEx
GetLastActivePopup
GetMenuItemID
GetWindowTextA
BeginPaint
SendMessageA
SetWindowPos
GetSysColor
GetDlgItem
GetSystemMetrics
CreateDialogIndirectParamA
DestroyWindow
CopyRect
UnhookWindowsHookEx
RegisterWindowMessageA
SetMenuItemBitmaps
GrayStringA
UnregisterClassA
RemovePropA
SetCursor
GetClientRect
MessageBoxA
CheckMenuItem
CallNextHookEx
GetMessagePos
CharUpperA
IsDialogMessageA
ModifyMenuA
GetClassLongA
MapWindowPoints
ExitWindowsEx
TabbedTextOutA
SetFocus
EndDialog
GetWindow
GetForegroundWindow
IsWindowVisible
GetTopWindow
GetPropA
IsWindowEnabled
advapi32
RegCloseKey
RegSetValueExA
RegCreateKeyExA
RegOpenKeyExA
RegDeleteValueA
gdi32
GetStockObject
RectVisible
GetClipBox
RestoreDC
TextOutA
SetTextColor
SetMapMode
SetBkColor
Escape
ScaleWindowExtEx
OffsetViewportOrgEx
PtVisible
SetViewportExtEx
GetObjectA
CreateBitmap
ScaleViewportExtEx
SaveDC
DeleteObject
DeleteDC
GetDeviceCaps
SelectObject
SetWindowExtEx
SetViewportOrgEx
ExtTextOutA
kernel32
GlobalHandle
GetOEMCP
GetModuleFileNameA
LoadResource
TlsSetValue
OutputDebugStringA
GlobalFree
FreeLibrary
GetVersionExA
SetEndOfFile
lstrcmpA
GetProcAddress
LocalFileTimeToFileTime
GetFileSize
GetEnvironmentStringsA
SetLastError
HeapAlloc
DuplicateHandle
DeleteFileA
FindNextFileA
lstrcmpiA
FindClose
TlsFree
GlobalUnlock
LeaveCriticalSection
GetCurrentProcess
GetVersion
HeapSize
GlobalAlloc
CompareStringA
LockResource
TlsAlloc
LocalAlloc
GlobalLock
SetStdHandle
GetSystemDirectoryA
SetCurrentDirectoryA
WriteFile
GlobalDeleteAtom
LCMapStringA
SetHandleCount
LoadLibraryA
GetVolumeInformationA
GetCurrentDirectoryA
GetStartupInfoA
GetACP
GetFileTime
GetCurrentThread
InitializeCriticalSection
GetStringTypeW
FileTimeToLocalFileTime
GlobalFindAtomA
MultiByteToWideChar
TlsGetValue
CreateFileA
VirtualFree
TerminateProcess
GetCommandLineA
ExitProcess
Sleep
GetWindowsDirectoryA
GlobalGetAtomNameA
UnlockFile
SetUnhandledExceptionFilter
DeleteCriticalSection
GetEnvironmentVariableA
GetFileAttributesA
MulDiv
HeapFree
LocalReAlloc
GetCurrentThreadId
InterlockedIncrement
WritePrivateProfileStringA
CloseHandle
VirtualAlloc
GetTimeZoneInformation
GetLastError
ReadFile
SetFileTime
SystemTimeToFileTime
GetStringTypeA
HeapDestroy
FindFirstFileA
WideCharToMultiByte
GetDriveTypeA
LCMapStringW
lstrcpyA
lstrcatA
SetFileAttributesA
GetFullPathNameA
CompareStringW
lstrlenA
IsBadWritePtr
GetStdHandle
FindResourceA
GlobalFlags
GetProcessVersion
SetEnvironmentVariableA
SetErrorMode
GlobalReAlloc
LocalFree
IsBadCodePtr
HeapReAlloc
FlushFileBuffers
GetFileType
HeapCreate
FreeEnvironmentStringsA
InterlockedDecrement
EnterCriticalSection
GlobalAddAtomA
IsBadReadPtr
GetModuleHandleA
GetEnvironmentStringsW
RtlUnwind
RaiseException
LockFile
UnhandledExceptionFilter
lstrcpynA
SetFilePointer
GetCPInfo
FreeEnvironmentStringsW
FileTimeToSystemTime
comdlg32
GetFileTitleA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
Sections
.text Size: 163KB - Virtual size: 163KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 29KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ