Static task
static1
Behavioral task
behavioral1
Sample
14f2e22034f4d5bafca4b6467d2b24d8602b9b2e3256f287333a51b0d697cdf5.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
14f2e22034f4d5bafca4b6467d2b24d8602b9b2e3256f287333a51b0d697cdf5.exe
Resource
win10v2004-20220901-en
General
-
Target
14f2e22034f4d5bafca4b6467d2b24d8602b9b2e3256f287333a51b0d697cdf5
-
Size
210KB
-
MD5
74dc7ba33fbac9bb6b408d383f4baac9
-
SHA1
0d7f36a4b40a1d17aa62da5e1c288d9c369f7c7e
-
SHA256
14f2e22034f4d5bafca4b6467d2b24d8602b9b2e3256f287333a51b0d697cdf5
-
SHA512
009fb765186399f857b81b8afdaabbf31492065c0e372fa42e278bf68c447a166ca3f1301aa03b74df8fac84aa805d5ee5f57904566c9e08b4dafbad579bbe3d
-
SSDEEP
6144:iylwqQKvx4E4b7Y//KajT13Z0xEoz1ypYac5M:KTK54f+/KavxZozIpYa6M
Malware Config
Signatures
Files
-
14f2e22034f4d5bafca4b6467d2b24d8602b9b2e3256f287333a51b0d697cdf5.exe windows x86
d2ed31a718240e2723e9491218bac5f9
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
MulDiv
GetFileSize
GetACP
GetSystemTimeAsFileTime
lstrcpynW
SetEndOfFile
InterlockedIncrement
GlobalFree
SetThreadPriority
lstrcpyA
CreateThread
GetThreadPriority
CloseHandle
HeapFree
lstrcmpW
InterlockedDecrement
GlobalFindAtomW
GetProfileIntA
GetCurrentProcessId
CreateSemaphoreW
GetDiskFreeSpaceW
ReadFile
GetCurrentThread
GlobalUnlock
HeapAlloc
EnterCriticalSection
GetLastError
lstrlenW
LoadLibraryW
GetProcessHeap
lstrcmpiW
GetFileAttributesW
WaitForMultipleObjects
InitializeCriticalSection
InterlockedExchange
LeaveCriticalSection
lstrcpyW
SetLastError
GetPrivateProfileStringW
CreateFileW
IsBadReadPtr
IsBadWritePtr
SetEvent
WriteFile
MultiByteToWideChar
WaitForSingleObject
GetFullPathNameW
ResetEvent
SetFilePointer
GetModuleFileNameA
GetCurrentProcess
IsBadCodePtr
lstrlenA
GlobalLock
GetProcAddress
ReleaseSemaphore
GlobalMemoryStatus
GlobalHandle
CreateEventW
VirtualFree
FreeLibrary
WideCharToMultiByte
GetTickCount
GetVersionExW
GetQueuedCompletionStatus
DeleteCriticalSection
SetUnhandledExceptionFilter
GlobalAlloc
QueryPerformanceCounter
oleaut32
VarBstrFromUI1
VarBstrFromDate
VarBstrFromDisp
VarBstrFromDec
VarBstrFromUI8
VarBstrFromR4
VarBstrFromI1
VarBstrFromCy
VarBstrFromUI4
VarBstrFromI2
VarBstrFromI4
VarBstrFromR8
VarBstrFromUI2
VarBstrFromI8
user32
SetCursor
IsWindowVisible
IsRectEmpty
GetClientRect
CheckDlgButton
GetDlgItemInt
SetDlgItemTextW
InvalidateRect
SetDlgItemInt
MoveWindow
DestroyWindow
CheckRadioButton
CreateDialogParamW
GetDlgItem
GetWindowRect
DefWindowProcW
LoadStringW
LoadCursorW
PeekMessageW
DispatchMessageW
IsWindow
ShowWindow
GetWindowLongW
SetWindowLongW
ClientToScreen
GetAsyncKeyState
GetDesktopWindow
TranslateMessage
ReleaseDC
GetDC
EnableWindow
SendMessageW
cewmdm
DllGetClassObject
DllCanUnloadNow
DllRegisterServer
DllUnregisterServer
msls31
LssbGetObjDimSubline
LsCompressSubline
LssbGetDurTrailWithPensInSubline
LssbGetPlsrunsFromSubline
LssbGetNumberDnodesInSubline
LssbGetVisibleDcpInSubline
nddeapi
NDdeIsValidAppTopicListA
NDdeGetShareSecurityW
NDdeGetTrustedShareW
NDdeIsValidAppTopicListW
NDdeGetErrorStringA
NDdeGetTrustedShareA
msltus40
DllRegisterServer
DllUnregisterServer
msoeacct
HrCreateAccountManager
DllGetClassObject
ValidEmailAddress
GetDllMajorVersion
DllCanUnloadNow
msnetobj
DllCanUnloadNow
DllRegisterServer
DllUnregisterServer
DllGetClassObject
Sections
.text Size: 81KB - Virtual size: 81KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 118KB - Virtual size: 117KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 6.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ