Static task
static1
Behavioral task
behavioral1
Sample
89dea17d0ade869f886bfc7a1fa637fa394cd583752bd314faaf9a1903e2699a.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
89dea17d0ade869f886bfc7a1fa637fa394cd583752bd314faaf9a1903e2699a.exe
Resource
win10v2004-20220812-en
General
-
Target
89dea17d0ade869f886bfc7a1fa637fa394cd583752bd314faaf9a1903e2699a
-
Size
516KB
-
MD5
014aa45cf5bb0d32680067184eb5555f
-
SHA1
d9f8f3a295abf55b4320d8355013b3550ffe3304
-
SHA256
89dea17d0ade869f886bfc7a1fa637fa394cd583752bd314faaf9a1903e2699a
-
SHA512
5adcdd21dec8b570840ddc3537d2f6f610325ff145ae261bc5856d8a0ae7f1183c2ee900921aa704ddf12e117ed338078f88e1f574b2c151e3440d3bbc03c799
-
SSDEEP
6144:gQ27qS/ZnD2l/f7MCrREiSRLTSF5YmY6IpiSOTajY9pXf1NeXyzLSIGY+nXACcT4:gQCqCZM7MCP/vYmY6IwKjYP1QUPIZ
Malware Config
Signatures
Files
-
89dea17d0ade869f886bfc7a1fa637fa394cd583752bd314faaf9a1903e2699a.exe windows x86
fe24210a86eadf1bb027de5e37c75abf
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
winspool.drv
OpenPrinterA
DocumentPropertiesA
gdi32
GetDCOrgEx
EnumMetaFile
Escape
GetPath
RoundRect
SelectClipPath
OffsetRgn
ArcTo
GetClipBox
PolyDraw
LPtoDP
FlattenPath
EqualRgn
CreateDIBPatternBrushPt
SetStretchBltMode
SetColorAdjustment
PlayMetaFileRecord
PlayMetaFile
GetMapMode
CreateFontIndirectA
SetROP2
CreateDCA
DeleteObject
ExtCreateRegion
SetMapperFlags
SelectClipRgn
SetPixelV
FloodFill
CreateDIBitmap
advapi32
DeleteService
AdjustTokenPrivileges
OpenProcessToken
RegDeleteKeyA
GetUserNameA
EqualSid
GetTokenInformation
OpenThreadToken
RegCloseKey
RegOpenKeyA
RegEnumKeyA
RegOpenKeyExA
FreeSid
RegDeleteValueA
InitializeSecurityDescriptor
RegSetValueExA
RegQueryValueA
CloseServiceHandle
RegQueryValueExA
LookupPrivilegeValueA
RegCreateKeyExA
SetSecurityDescriptorDacl
AllocateAndInitializeSid
shell32
SHGetSpecialFolderLocation
SHGetMalloc
ShellExecuteA
user32
GetMenuCheckMarkDimensions
GetClassNameA
KillTimer
GetWindowLongA
ValidateRect
ShowScrollBar
ReleaseCapture
InvertRect
RegisterClassExA
SetRectEmpty
EnumChildWindows
CallNextHookEx
GetCursorPos
CopyAcceleratorTableA
GetForegroundWindow
GetSystemMetrics
InvalidateRect
GetLastActivePopup
CreateWindowExA
LoadCursorA
GetSysColorBrush
GetMenu
DrawStateA
GetMenuItemID
MapDialogRect
HideCaret
GetKeyboardLayout
RemoveMenu
CopyIcon
GetWindow
DrawFocusRect
IsIconic
SetParent
RegisterClassA
DispatchMessageA
GetKeyboardLayoutList
LoadMenuA
PtInRect
ScreenToClient
PostMessageA
IsDialogMessageA
SetClipboardData
DestroyIcon
GetWindowRect
GetDesktopWindow
ShowWindow
RedrawWindow
MoveWindow
LockWindowUpdate
GetSubMenu
ReleaseDC
SetWindowPos
GetCapture
DestroyAcceleratorTable
MessageBoxA
MessageBeep
LoadBitmapA
CreateDialogIndirectParamA
SetCursor
LoadIconA
LoadAcceleratorsA
IntersectRect
EnumWindows
GetScrollRange
GetDCEx
DefWindowProcA
GetKeyState
BringWindowToTop
InvalidateRgn
GetTopWindow
GetMessagePos
SetActiveWindow
comdlg32
GetOpenFileNameA
GetSaveFileNameA
GetFileTitleA
oleaut32
LoadTypeLi
kernel32
InitializeCriticalSection
GetCurrentProcess
GetLastError
GetModuleFileNameA
SetCurrentDirectoryA
LCMapStringW
MulDiv
GetProcAddress
GetDateFormatA
GetProcessHeap
EnterCriticalSection
GetCurrentProcessId
LocalFileTimeToFileTime
GetStartupInfoA
GetEnvironmentStringsW
SetLastError
GetModuleHandleA
LCMapStringA
LeaveCriticalSection
TlsFree
MultiByteToWideChar
TlsAlloc
FlushFileBuffers
FreeEnvironmentStringsA
GetACP
GetCurrentThreadId
HeapDestroy
GetCurrentDirectoryA
HeapCreate
LoadLibraryA
GetTimeFormatA
HeapReAlloc
CompareStringA
UnhandledExceptionFilter
GetTickCount
SetHandleCount
IsBadCodePtr
GetSystemTimeAsFileTime
TlsSetValue
GetOEMCP
GetTimeZoneInformation
GetVersionExA
ReadFile
MapViewOfFile
DeleteCriticalSection
GetStdHandle
FindClose
WriteFile
GetStringTypeA
SetEnvironmentVariableA
GetCPInfo
WideCharToMultiByte
FileTimeToSystemTime
VirtualFree
DeleteFileW
HeapFree
SizeofResource
SetFilePointer
SetEndOfFile
SystemTimeToFileTime
GetEnvironmentStrings
SetStdHandle
GetFileType
HeapSize
SetUnhandledExceptionFilter
TlsGetValue
RtlUnwind
GetStringTypeW
RaiseException
HeapAlloc
CompareStringW
CreateMutexA
TerminateProcess
lstrlenA
FreeEnvironmentStringsW
GetDriveTypeA
GetCommandLineA
VirtualAlloc
FreeLibrary
InterlockedDecrement
VirtualProtect
CloseHandle
lstrlenW
InterlockedExchange
GetSystemInfo
Sleep
QueryPerformanceCounter
VirtualQuery
ExitProcess
GetLocaleInfoA
comctl32
ImageList_SetBkColor
ImageList_GetIconSize
ImageList_GetImageCount
ImageList_Destroy
ImageList_Add
ord17
InitCommonControlsEx
ImageList_Draw
ImageList_GetIcon
ImageList_ReplaceIcon
ImageList_Create
Sections
.text Size: 84KB - Virtual size: 82KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 260KB - Virtual size: 256KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 64KB - Virtual size: 93KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 104KB - Virtual size: 100KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ