Static task
static1
Behavioral task
behavioral1
Sample
38bfafc9c0d626a500c7cb379a343ac7f0c9d2699c0b48d710f2745c4f540467.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
38bfafc9c0d626a500c7cb379a343ac7f0c9d2699c0b48d710f2745c4f540467.exe
Resource
win10v2004-20220901-en
General
-
Target
38bfafc9c0d626a500c7cb379a343ac7f0c9d2699c0b48d710f2745c4f540467
-
Size
215KB
-
MD5
7cf86149b2e428c341d8f2b8907d20a1
-
SHA1
3b03a30b6a93fc0f2b442b38f9393589b8d00aca
-
SHA256
38bfafc9c0d626a500c7cb379a343ac7f0c9d2699c0b48d710f2745c4f540467
-
SHA512
1bebeb4523627f6d82ab187b326cc99e9671ef7e84904b800eb36c97f3ddd5009810e0a886f42d1eb939b7c4c76a7b3ab814bb3e5e4ee440ad59edc09d4533cb
-
SSDEEP
3072:d+dcFhQ6eabdetDqcI1PbQBK1ql9/nfPTcQIQOEEn1FfpzgXN2vxgxuMhOF0i:d+dcFWlaREIiBnfTIf1FhzgXIvxgox
Malware Config
Signatures
Files
-
38bfafc9c0d626a500c7cb379a343ac7f0c9d2699c0b48d710f2745c4f540467.exe windows x86
69b23e5f8463539b9fb4c5dae4437830
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
oleaut32
VarBstrFromDec
VarBstrFromUI8
VarBstrFromI8
VarBstrFromI4
VarBstrFromUI4
VarBstrFromI1
VarBstrFromUI2
VarBstrFromCy
VarBstrFromR8
VarBstrFromDisp
VarBstrFromUI1
VarBstrFromR4
VarBstrFromI2
VarBstrFromDate
user32
IsWindowVisible
InvalidateRect
EnableWindow
GetDC
ClientToScreen
SetCursor
CheckRadioButton
DispatchMessageW
LoadCursorW
DestroyWindow
GetClientRect
CheckDlgButton
GetAsyncKeyState
ShowWindow
SendMessageW
ReleaseDC
TranslateMessage
IsWindow
MoveWindow
IsRectEmpty
DefWindowProcW
SetDlgItemTextW
GetDesktopWindow
GetDlgItem
CreateDialogParamW
SetWindowLongW
GetWindowRect
PeekMessageW
LoadStringW
GetWindowLongW
GetDlgItemInt
SetDlgItemInt
kernel32
GetProcAddress
SetFilePointer
IsBadCodePtr
lstrcmpiW
GetTickCount
GlobalHandle
GlobalAlloc
GetDiskFreeSpaceW
GetCurrentThread
lstrcpyA
FreeLibrary
InterlockedDecrement
SetLastError
GetFileAttributesW
InterlockedIncrement
GetCurrentProcessId
GetThreadPriority
GlobalFree
GetVersionExW
GetLocaleInfoA
WaitForSingleObject
ResetEvent
IsBadWritePtr
InitializeCriticalSection
GlobalMemoryStatus
MulDiv
lstrcpynW
WaitForMultipleObjects
lstrcpyW
SetEvent
VirtualFree
SetEndOfFile
CloseHandle
WideCharToMultiByte
LeaveCriticalSection
ReadFile
IsBadReadPtr
GetQueuedCompletionStatus
SetThreadPriority
MultiByteToWideChar
GetCurrentProcess
CreateEventW
GetSystemTimeAsFileTime
CreateThread
GetModuleFileNameA
GetProcessHeap
CreateFileW
EnterCriticalSection
DeleteCriticalSection
InterlockedExchange
GetFileSize
ReleaseSemaphore
SetUnhandledExceptionFilter
lstrlenA
GetPrivateProfileStringW
HeapFree
QueryPerformanceCounter
GlobalUnlock
CreateSemaphoreW
lstrcmpW
GlobalLock
WriteFile
lstrlenW
GetProfileIntA
GetLastError
LoadLibraryW
HeapAlloc
GetFullPathNameW
GetACP
GlobalFindAtomA
msls31
LssbGetVisibleDcpInSubline
LsCompressSubline
LssbGetObjDimSubline
LssbGetPlsrunsFromSubline
LssbGetNumberDnodesInSubline
LssbGetDurTrailWithPensInSubline
Sections
.text Size: 88KB - Virtual size: 88KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 114KB - Virtual size: 114KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 6.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ