Static task
static1
Behavioral task
behavioral1
Sample
1f1ddbde0e586a3c9c0953c2a2a439937e37235ae7156d063ff5406a5800b10e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1f1ddbde0e586a3c9c0953c2a2a439937e37235ae7156d063ff5406a5800b10e.exe
Resource
win10v2004-20220812-en
General
-
Target
1f1ddbde0e586a3c9c0953c2a2a439937e37235ae7156d063ff5406a5800b10e
-
Size
209KB
-
MD5
719b54d842d8881e88aecd909758f172
-
SHA1
17ccd6ed452970430400335b9d5f9239a79c4c0c
-
SHA256
1f1ddbde0e586a3c9c0953c2a2a439937e37235ae7156d063ff5406a5800b10e
-
SHA512
caac94924898be4aedd7ac1c7787624010a9e1d7dd0e2e1284111ebe232b21df54ef36b2a525d56d9c0bd3b147b8670b4f0dd16baa671925ccaca7ed056243f4
-
SSDEEP
6144:rDWUQ0CGVUHU0JPrxT+aO1nZoPZ02D8u0rY:+UtLVUHNjxJEgQ5rY
Malware Config
Signatures
Files
-
1f1ddbde0e586a3c9c0953c2a2a439937e37235ae7156d063ff5406a5800b10e.exe windows x86
f4417d88364313218dff1ec40b8a564b
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
EnterCriticalSection
SetEvent
GetProcessHeap
FreeLibrary
GetCurrentProcessId
MultiByteToWideChar
GetLastError
SetUnhandledExceptionFilter
GetModuleFileNameA
GetCurrentThread
lstrlenA
GetACP
SetThreadPriority
CreateEventW
WaitForMultipleObjects
WideCharToMultiByte
SetEndOfFile
IsBadWritePtr
GetDiskFreeSpaceW
GetProcAddress
WriteFile
GetFileSize
ReleaseSemaphore
InterlockedDecrement
GetFileAttributesW
CreateFileW
CreateSemaphoreW
InterlockedIncrement
SetLastError
GetProfileIntA
VirtualFree
GlobalFindAtomW
GetQueuedCompletionStatus
HeapAlloc
lstrcpynW
GetTickCount
CloseHandle
GetPrivateProfileStringW
ResetEvent
MulDiv
GlobalMemoryStatus
GlobalAlloc
GlobalFree
GlobalUnlock
lstrcpyA
SetFilePointer
GetThreadPriority
GetLocaleInfoA
lstrcpyW
GetSystemTimeAsFileTime
WaitForSingleObject
lstrcmpW
GetFullPathNameW
HeapFree
InitializeCriticalSection
ReadFile
GetVersionExW
InterlockedExchange
CreateThread
GlobalHandle
GlobalLock
IsBadCodePtr
GetCurrentProcess
IsBadReadPtr
LoadLibraryW
QueryPerformanceCounter
LeaveCriticalSection
lstrlenW
lstrcmpiW
DeleteCriticalSection
user32
GetDesktopWindow
LoadStringW
ShowWindow
GetDlgItemInt
GetDC
InvalidateRect
SetDlgItemInt
IsRectEmpty
SendMessageW
CreateDialogParamW
TranslateMessage
IsWindow
CheckRadioButton
IsWindowVisible
GetAsyncKeyState
SetCursor
PeekMessageW
DefWindowProcW
EnableWindow
SetWindowLongW
GetDlgItem
LoadCursorW
MoveWindow
ClientToScreen
GetWindowRect
GetClientRect
DestroyWindow
GetWindowLongW
ReleaseDC
CheckDlgButton
DispatchMessageW
SetDlgItemTextW
msnetobj
DllGetClassObject
DllCanUnloadNow
DllRegisterServer
oleaut32
VarBstrFromDate
VarBstrFromI2
VarBstrFromUI4
VarBstrFromI8
VarBstrFromR8
VarBstrFromUI8
VarBstrFromI4
VarBstrFromI1
VarBstrFromR4
VarBstrFromDisp
VarBstrFromCy
VarBstrFromUI1
VarBstrFromDec
VarBstrFromUI2
msls31
LssbGetObjDimSubline
LssbGetVisibleDcpInSubline
LsCompressSubline
LssbGetPlsrunsFromSubline
LssbGetDurTrailWithPensInSubline
LssbGetNumberDnodesInSubline
msoeacct
ValidEmailAddress
GetDllMajorVersion
HrCreateAccountManager
DllCanUnloadNow
DllGetClassObject
Sections
.text Size: 81KB - Virtual size: 81KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 117KB - Virtual size: 117KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 6.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 996B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ