Static task
static1
Behavioral task
behavioral1
Sample
86bdfc9cb81f8379fb13b8aec8f116e325d102634474c6ca0fa24ee8bd410467.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
86bdfc9cb81f8379fb13b8aec8f116e325d102634474c6ca0fa24ee8bd410467.exe
Resource
win10v2004-20220812-en
General
-
Target
86bdfc9cb81f8379fb13b8aec8f116e325d102634474c6ca0fa24ee8bd410467
-
Size
740KB
-
MD5
7451b3ede4d9512bc5cd125522ac8361
-
SHA1
e0acb7826e3d0b9083cefa6cb08108e9c27ba4d2
-
SHA256
86bdfc9cb81f8379fb13b8aec8f116e325d102634474c6ca0fa24ee8bd410467
-
SHA512
fed3c2a9364652f1290e4cebecfcc79adb146428cf1980c393c7ced68920125ea4f60a37212904fb1b7cab5475478f201312b5d86ed1e47c6c046b3c1fc97c7b
-
SSDEEP
12288:CQqr3+0t0edIpxESbU2VfhVepQCYzynT4csd3KafCPrtQT:CFr37XdIpgOfXDS4csJKj5QT
Malware Config
Signatures
Files
-
86bdfc9cb81f8379fb13b8aec8f116e325d102634474c6ca0fa24ee8bd410467.exe windows x86
52b65ecdd5f50a1929c895681b2ce03e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
ord155
SHGetPathFromIDListA
SHBrowseForFolderA
shlwapi
PathFindExtensionA
PathFindFileNameA
PathIsUNCA
oleaut32
LoadTypeLi
ole32
OleInitialize
OleGetClipboard
OleLockRunning
CreateStreamOnHGlobal
CreateILockBytesOnHGlobal
CoTaskMemAlloc
CLSIDFromString
StgCreateDocfileOnILockBytes
CreateOleAdviseHolder
wininet
InternetQueryDataAvailable
InternetReadFile
InternetSetFilePointer
InternetCloseHandle
InternetOpenA
winspool.drv
ClosePrinter
DocumentPropertiesW
OpenPrinterW
gdi32
GetViewportExtEx
SetBkMode
SetBoundsRect
CreateDIBPatternBrushPt
GetDeviceCaps
SetMapperFlags
PtInRegion
SetColorAdjustment
GetPath
ArcTo
MaskBlt
SetStretchBltMode
ScaleViewportExtEx
GetBitmapBits
CreateCompatibleBitmap
GetTextExtentPoint32A
PlayMetaFileRecord
FlattenPath
SetPixelV
CreateDIBitmap
TextOutA
CreateHatchBrush
ScaleWindowExtEx
Escape
PolyDraw
SetROP2
GetOutlineTextMetricsA
ExtCreatePen
GetCurrentObject
GetFontData
RectVisible
CreatePalette
SetBrushOrgEx
EnumMetaFile
SetMapMode
CopyMetaFileA
advapi32
RegCloseKey
OpenProcessToken
GetTokenInformation
RegOpenKeyExA
RegQueryValueA
RegDeleteKeyA
RegEnumKeyA
RegQueryValueExA
comdlg32
ChooseColorA
CommDlgExtendedError
GetFileTitleA
GetSaveFileNameA
PageSetupDlgA
GetOpenFileNameA
PrintDlgA
kernel32
LoadResource
SetUnhandledExceptionFilter
LoadLibraryA
TlsAlloc
InitializeCriticalSection
UnmapViewOfFile
GetEnvironmentStrings
GetCurrentThreadId
HeapReAlloc
LoadLibraryW
GetDateFormatA
GetThreadLocale
GetEnvironmentStringsW
GetTimeFormatA
GetCurrentProcess
GlobalReAlloc
GetFileType
LCMapStringW
GetModuleFileNameA
GetSystemInfo
UnhandledExceptionFilter
GetACP
GetCurrentProcessId
RtlUnwind
HeapDestroy
ResumeThread
HeapCreate
HeapSize
ResetEvent
FreeEnvironmentStringsW
WideCharToMultiByte
RaiseException
IsBadCodePtr
GetCommandLineA
SetFilePointer
TlsSetValue
GetLocaleInfoA
FindClose
TlsGetValue
GetModuleHandleW
GetDriveTypeA
LCMapStringA
SetStdHandle
GetStringTypeW
GetCommandLineW
TlsFree
QueryPerformanceCounter
VirtualQuery
GetOEMCP
CompareStringA
CreateProcessW
CloseHandle
DeleteCriticalSection
GetSystemTimeAsFileTime
InterlockedExchange
VirtualAlloc
SetLastError
WriteFile
ExitProcess
MultiByteToWideChar
GetTickCount
WaitForSingleObject
CreateFileW
ReadFile
EnterCriticalSection
TerminateProcess
GetStartupInfoW
SetHandleCount
GetTimeZoneInformation
GetStdHandle
GetStringTypeA
GetProcAddress
LeaveCriticalSection
SetEnvironmentVariableA
GetModuleFileNameW
GetModuleHandleA
CreateMutexW
CompareStringW
GetLastError
HeapFree
HeapAlloc
FlushFileBuffers
GetStartupInfoA
VirtualFree
SizeofResource
GetCPInfo
MoveFileW
FreeEnvironmentStringsA
VirtualProtect
GetVersionExA
winmm
mmioCreateChunk
mixerClose
mixerGetLineControlsA
mmioClose
mixerOpen
mmioOpenA
mixerSetControlDetails
mixerGetControlDetailsA
timeEndPeriod
waveInStop
mixerGetLineInfoA
waveInMessage
user32
LoadBitmapW
MessageBoxW
ShowWindow
RegisterClassExW
DestroyWindow
LoadStringW
DefWindowProcW
LoadCursorW
CreateWindowExW
RegisterClassW
Sections
.text Size: 84KB - Virtual size: 82KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 472KB - Virtual size: 470KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 112KB - Virtual size: 119KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 68KB - Virtual size: 65KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ