Static task
static1
Behavioral task
behavioral1
Sample
d67bc0f135df90f835194e7a4b9b392aa59c4367b5956af971b49394bc0599ea.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d67bc0f135df90f835194e7a4b9b392aa59c4367b5956af971b49394bc0599ea.exe
Resource
win10v2004-20220812-en
General
-
Target
d67bc0f135df90f835194e7a4b9b392aa59c4367b5956af971b49394bc0599ea
-
Size
207KB
-
MD5
79c2aa5f340e36bb897431742791c128
-
SHA1
414082974152e209aba7801d826c041dc1b5e751
-
SHA256
d67bc0f135df90f835194e7a4b9b392aa59c4367b5956af971b49394bc0599ea
-
SHA512
2fdd90c83087f8500bab96c980f9165f565b51274ac55d96e21380fa8c8bad766797851d306943fa2f7d7eb1d51e4d58cef36d9fc8e2b5d9e9426730e1edec4a
-
SSDEEP
6144:6x6FU1ciicpoXuhJG8Doek8T8IBnsEUVve:64K65cPhJxDYw8ksEUNe
Malware Config
Signatures
Files
-
d67bc0f135df90f835194e7a4b9b392aa59c4367b5956af971b49394bc0599ea.exe windows x86
ff25993db4e48d85fc5d18295f3c96fd
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetThreadPriority
HeapFree
GetLocaleInfoA
SetEndOfFile
lstrcmpiW
IsBadWritePtr
CloseHandle
MultiByteToWideChar
ReadFile
InterlockedExchange
GetPrivateProfileStringW
GetFileAttributesW
GetFullPathNameW
CreateEventW
lstrcpyA
GetCurrentProcess
SetThreadPriority
GlobalUnlock
SetEvent
lstrlenW
HeapAlloc
lstrcpyW
SetLastError
lstrcmpW
GlobalHandle
GetFileSize
InterlockedIncrement
WaitForMultipleObjects
IsBadReadPtr
WideCharToMultiByte
QueryPerformanceCounter
GlobalFindAtomA
VirtualFree
GetLastError
GetCurrentProcessId
WaitForSingleObject
InitializeCriticalSection
ReleaseSemaphore
GetSystemTimeAsFileTime
GetProcessHeap
DeleteCriticalSection
lstrcpynW
LoadLibraryW
CreateFileW
GetQueuedCompletionStatus
FreeLibrary
EnterCriticalSection
GetDiskFreeSpaceW
SetUnhandledExceptionFilter
GetACP
GetVersionExW
GlobalFree
GlobalLock
GetCurrentThread
CreateSemaphoreW
GlobalAlloc
IsBadCodePtr
ResetEvent
InterlockedDecrement
WriteFile
SetFilePointer
LeaveCriticalSection
MulDiv
GetProfileIntA
lstrlenA
GetProcAddress
GlobalMemoryStatus
GetTickCount
GetModuleFileNameA
CreateThread
oleaut32
VarBstrFromI2
VarBstrFromUI4
VarBstrFromUI8
VarBstrFromUI1
VarBstrFromDec
VarBstrFromDisp
VarBstrFromI8
VarBstrFromR8
VarBstrFromI1
VarBstrFromDate
VarBstrFromR4
VarBstrFromUI2
VarBstrFromCy
VarBstrFromI4
user32
IsWindow
IsRectEmpty
SendMessageW
EnableWindow
GetWindowLongW
ShowWindow
SetDlgItemTextW
ClientToScreen
GetDlgItem
DestroyWindow
LoadCursorW
CheckRadioButton
TranslateMessage
SetDlgItemInt
IsWindowVisible
CheckDlgButton
GetDC
GetAsyncKeyState
LoadStringW
DispatchMessageW
InvalidateRect
GetClientRect
ReleaseDC
CreateDialogParamW
GetDesktopWindow
SetWindowLongW
GetDlgItemInt
SetCursor
GetWindowRect
MoveWindow
DefWindowProcW
PeekMessageW
msls31
LssbGetNumberDnodesInSubline
LssbGetVisibleDcpInSubline
LssbGetDurTrailWithPensInSubline
LssbGetObjDimSubline
LsCompressSubline
LssbGetPlsrunsFromSubline
Sections
.text Size: 82KB - Virtual size: 81KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 117KB - Virtual size: 116KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 6.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ