Static task
static1
Behavioral task
behavioral1
Sample
db5ef3b9c7ce47956ba65c5d03dde1e98ea0a5d3ca9fe73f2f383250c5adeae3.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
db5ef3b9c7ce47956ba65c5d03dde1e98ea0a5d3ca9fe73f2f383250c5adeae3.exe
Resource
win10v2004-20220812-en
General
-
Target
db5ef3b9c7ce47956ba65c5d03dde1e98ea0a5d3ca9fe73f2f383250c5adeae3
-
Size
348KB
-
MD5
0114862e125f332222b4617377531613
-
SHA1
3fbf16759437fb69bb1ef9a3a1eb6791ac959ec1
-
SHA256
db5ef3b9c7ce47956ba65c5d03dde1e98ea0a5d3ca9fe73f2f383250c5adeae3
-
SHA512
df309455991ac814288187d5b0cafb8019ea6847520f5b43383408f654b7418d554a7d0d2ee9bf7df84a09bcfa1465186c1a959bee23dd56e44fd0ec8a070b86
-
SSDEEP
6144:j08gTtSEcAYWJoh3o4zssQDs5ejuTFQoHQCzs8zNjoVYw:+tSVANo5qshfw6s85Q
Malware Config
Signatures
Files
-
db5ef3b9c7ce47956ba65c5d03dde1e98ea0a5d3ca9fe73f2f383250c5adeae3.exe windows x86
7e4f1ed5f07c839f7cf4e8e60cfdfdd0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
comdlg32
PageSetupDlgW
PrintDlgA
GetOpenFileNameW
advapi32
RegOpenKeyExW
LogonUserW
AbortSystemShutdownW
CryptGenKey
shell32
SHFileOperation
CheckEscapesW
RealShellExecuteExW
user32
SetUserObjectInformationA
SetWindowsHookA
CharUpperBuffW
SetWindowWord
GetMenuStringW
RegisterClassExA
PostQuitMessage
GetKBCodePage
CloseWindowStation
SetForegroundWindow
RegisterClassA
GetUserObjectInformationA
RegisterDeviceNotificationW
MenuItemFromPoint
wsprintfA
BroadcastSystemMessage
CallWindowProcW
DrawIconEx
ToUnicodeEx
SetClipboardViewer
EnumThreadWindows
GetComboBoxInfo
MessageBoxIndirectW
DrawEdge
DdeCreateDataHandle
LoadCursorW
GetWindowModuleFileNameA
ChangeDisplaySettingsExA
PeekMessageA
ChangeMenuA
EnumDisplayDevicesA
SetMenuItemInfoW
kernel32
GetStringTypeA
GetProcAddress
TlsSetValue
GetConsoleOutputCP
SetStdHandle
HeapCreate
LeaveCriticalSection
GetProcessHeap
FlushFileBuffers
Sleep
GetCurrentThreadId
GetCurrentThread
FreeLibrary
TlsFree
IsDebuggerPresent
GetTimeZoneInformation
ReadFile
CompareStringW
GetStdHandle
GetCommandLineA
WideCharToMultiByte
CompareStringA
HeapAlloc
TlsAlloc
IsValidLocale
GetConsoleMode
GetWindowsDirectoryW
CreateFileA
LCMapStringW
GetLastError
TlsGetValue
GetCurrentProcessId
SetLastError
GetSystemTimeAsFileTime
VirtualProtectEx
GetStringTypeW
GetLocaleInfoA
InitializeCriticalSection
GetACP
HeapSize
OpenMutexA
WriteFile
WriteConsoleA
InterlockedIncrement
GetEnvironmentStrings
GetFileType
RtlUnwind
WriteConsoleW
lstrlenA
SetHandleCount
EnterCriticalSection
InterlockedDecrement
DeleteCriticalSection
UnhandledExceptionFilter
GetCPInfo
GetModuleHandleA
IsBadReadPtr
SetConsoleOutputCP
IsValidCodePage
EnumSystemLocalesA
LCMapStringA
FreeEnvironmentStringsA
HeapReAlloc
LoadLibraryA
SetFilePointer
ReleaseSemaphore
GlobalUnlock
CreateMutexA
InterlockedExchange
GetLocaleInfoW
FreeEnvironmentStringsW
GetOEMCP
GetModuleFileNameA
GetTimeFormatA
SetUnhandledExceptionFilter
HeapFree
VirtualFree
MultiByteToWideChar
ExitProcess
GetTickCount
VirtualAlloc
GetDateFormatA
VirtualQuery
GetVersionExA
GetStartupInfoA
SetEnvironmentVariableA
GetCurrentProcess
CloseHandle
SetThreadLocale
GetConsoleCP
GetUserDefaultLCID
GetEnvironmentStringsW
HeapDestroy
TerminateProcess
QueryPerformanceCounter
SetConsoleCtrlHandler
comctl32
InitCommonControlsEx
CreateMappedBitmap
ImageList_Destroy
ImageList_AddMasked
CreateStatusWindowW
CreatePropertySheetPageW
Sections
.text Size: 152KB - Virtual size: 149KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 76KB - Virtual size: 73KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 96KB - Virtual size: 117KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ