Static task
static1
Behavioral task
behavioral1
Sample
338aedbccfc8e85e0c36887c7879628e301305c8d6fa19564590cbe5f3031c4e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
338aedbccfc8e85e0c36887c7879628e301305c8d6fa19564590cbe5f3031c4e.exe
Resource
win10v2004-20220812-en
General
-
Target
338aedbccfc8e85e0c36887c7879628e301305c8d6fa19564590cbe5f3031c4e
-
Size
204KB
-
MD5
6cfb9593d06fe0086942db9b34cbe7f0
-
SHA1
d4a0a50e770fc1a9782992667997a41c0713ec53
-
SHA256
338aedbccfc8e85e0c36887c7879628e301305c8d6fa19564590cbe5f3031c4e
-
SHA512
8dd1c895c25a3b242da70f11dc95d64db9d5b53c9f9f7cdd43dc2ea07aa73e3937fb1949d61729c0e494be42ae39edb29d8b1308c7e49009cf45a132251b0968
-
SSDEEP
6144:WaSUDDtx78kD862AoV32gsFlCTYfQKRvgbzIt:WkDDX78F6hoIzHdxvgb
Malware Config
Signatures
Files
-
338aedbccfc8e85e0c36887c7879628e301305c8d6fa19564590cbe5f3031c4e.exe windows x86
a6176c057188f7fd61893dfef2852406
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
GetDeviceCaps
SetTextJustification
SetTextColor
GetGraphicsMode
GetPixelFormat
GetCurrentObject
SetTextCharacterExtra
GetObjectType
SetPixel
GetBkColor
GetSystemPaletteUse
GetDCPenColor
SetTextAlign
SetSystemPaletteUse
UpdateColors
user32
GetDlgItem
GetMenuState
GetInputState
SetFocus
LoadIconA
GetWindowLongA
EndPaint
GetQueueStatus
BeginPaint
IsWindowUnicode
EndDialog
GetDlgItemInt
SetDlgItemTextA
GetForegroundWindow
IsWindowEnabled
GetDC
WindowFromDC
ShowWindow
GetKeyboardType
GetWindowContextHelpId
GetMenu
DrawTextA
GetMenuItemID
CheckDlgButton
GetPropA
PostMessageA
RemovePropA
GetMenuItemCount
GetMenuCheckMarkDimensions
SendMessageA
GetCursor
GetWindowDC
GetScrollPos
SetWindowTextA
kernel32
SetEnvironmentVariableA
CompareStringW
CompareStringA
ReadFile
GetProcessHeap
SetEndOfFile
GetStringTypeW
GetStringTypeA
GetLocaleInfoA
HeapSize
CreateFileA
SetStdHandle
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
LCMapStringW
MultiByteToWideChar
LCMapStringA
GetTimeZoneInformation
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
InitializeCriticalSectionAndSpinCount
LoadLibraryA
GetCurrentProcess
GetProcAddress
FindClose
CloseHandle
LoadResource
GetFileType
GetStdHandle
FindResourceA
QueryPerformanceCounter
GlobalAlloc
DeleteFileA
LockResource
MoveFileA
GetCurrentThreadId
LocalFlags
SetFilePointer
SizeofResource
GetLastError
GetFileTime
GlobalHandle
GetTickCount
GetCurrentProcessId
GlobalFlags
GetModuleHandleA
IsDebuggerPresent
IsProcessorFeaturePresent
CreateThread
GetSystemTimeAsFileTime
HeapFree
HeapAlloc
FileTimeToSystemTime
FileTimeToLocalFileTime
GetDriveTypeA
FindFirstFileA
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
RaiseException
RtlUnwind
GetModuleHandleW
Sleep
ExitProcess
GetCommandLineA
GetStartupInfoA
HeapCreate
VirtualFree
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
HeapReAlloc
WriteFile
GetModuleFileNameA
GetFullPathNameA
GetCurrentDirectoryA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
InterlockedDecrement
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
FlushFileBuffers
SetHandleCount
Sections
.text Size: 159KB - Virtual size: 159KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 37KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE