Static task
static1
Behavioral task
behavioral1
Sample
9935d87dabd199f14a5fd3f65f3b646a283682752f9dd63586feac4e701828c5.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9935d87dabd199f14a5fd3f65f3b646a283682752f9dd63586feac4e701828c5.exe
Resource
win10v2004-20220812-en
General
-
Target
9935d87dabd199f14a5fd3f65f3b646a283682752f9dd63586feac4e701828c5
-
Size
138KB
-
MD5
5adc48d75f1641c9eb26bee9f2dedbc0
-
SHA1
d282b1468f0dc89b391ad2d963e279d2ad3eb51c
-
SHA256
9935d87dabd199f14a5fd3f65f3b646a283682752f9dd63586feac4e701828c5
-
SHA512
b03867f2fd4139d10ba2da773c37b245cbb97adb87003c042daa5bb3b172af9a10d70b9144f0aee4ca759162ea12d3801e5aa8280b0c83f4cd94f6aa3adfedd5
-
SSDEEP
3072:e8ja7ASQoLnL4lxgJAsh4KLSHfnyjnmsDyUCfR:f0QUL6fKLZnms
Malware Config
Signatures
Files
-
9935d87dabd199f14a5fd3f65f3b646a283682752f9dd63586feac4e701828c5.exe windows x86
1a12aeaa76315f9340279f100a33e037
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadLibraryA
LoadResource
LocalFree
LocalLock
LocalReAlloc
LocalSize
LocalUnlock
MapViewOfFile
MulDiv
MultiByteToWideChar
OpenProcess
OpenSemaphoreW
ProcessIdToSessionId
QueryPerformanceCounter
ReadFile
ReleaseSemaphore
SetEndOfFile
InterlockedCompareExchange
SetEvent
SetFilePointer
SetLastError
SetUnhandledExceptionFilter
Sleep
TerminateProcess
TerminateThread
UnhandledExceptionFilter
UnmapViewOfFile
WaitForSingleObject
WideCharToMultiByte
WriteFile
lstrcmpW
lstrcmpiW
lstrcpyW
lstrcpynW
GlobalUnlock
GlobalLock
GlobalFree
GetVersion
GetUserDefaultUILanguage
GetUserDefaultLCID
GetTimeFormatW
GetTickCount
GetSystemTimeAsFileTime
GetSystemInfo
GetStartupInfoA
GetProcAddress
GetModuleHandleW
GetModuleHandleA
GetModuleFileNameW
GetLocaleInfoW
GetLocalTime
GetLastError
GetFileInformationByHandle
GetFileAttributesW
GetDateFormatW
GetCurrentThreadId
GetCurrentProcessId
GetComputerNameW
GetCommandLineW
GetACP
FreeLibrary
FormatMessageW
FoldStringW
FindResourceExW
FindFirstFileW
FindClose
ExpandEnvironmentStringsW
ExitProcess
DeleteFileW
CreateThread
CreateSemaphoreW
CreateFileMappingW
CreateDirectoryW
CompareStringW
CloseHandle
VirtualAlloc
GetCurrentProcess
GlobalAlloc
CreateFileW
GetWindowsDirectoryW
SetErrorMode
lstrcatW
user32
RegisterClassExW
RegisterWindowMessageW
ReleaseDC
ScreenToClient
SendDlgItemMessageW
SendMessageW
SetActiveWindow
SetCursor
SetDlgItemTextW
SetFocus
SetScrollPos
SetWinEventHook
SetWindowLongW
SetWindowPlacement
SetWindowTextW
ShowWindow
TranslateAcceleratorW
TranslateMessage
UnhookWinEvent
UpdateWindow
WinHelpW
wsprintfW
PostQuitMessage
PostMessageW
PeekMessageW
OpenClipboard
MoveWindow
MessageBoxW
MessageBeep
LoadStringW
LoadImageW
LoadIconW
LoadCursorW
LoadAcceleratorsW
IsIconic
IsDialogMessageW
IsClipboardFormatAvailable
InvalidateRect
GetWindowTextW
GetWindowPlacement
GetWindowLongW
GetSystemMetrics
GetSystemMenu
GetSubMenu
GetParent
GetMessageW
GetMenuState
GetMenu
GetKeyboardLayout
GetForegroundWindow
GetFocus
GetDlgItem
GetDlgCtrlID
GetDesktopWindow
GetDC
GetCursorPos
GetClientRect
EndDialog
EnableWindow
EnableMenuItem
DrawTextExW
DispatchMessageW
DialogBoxParamW
DestroyWindow
DefWindowProcW
CreateWindowExW
CreateDialogParamW
CloseClipboard
ChildWindowFromPoint
CheckMenuItem
CharUpperW
CharNextW
CharLowerW
GetSysColor
GetDlgItemTextW
gdi32
EndDoc
TextOutW
StartPage
StartDocW
SetWindowExtEx
SetViewportExtEx
SetMapMode
SetBkMode
SetAbortProc
SelectObject
LPtoDP
GetTextMetricsW
GetTextFaceW
GetTextExtentPointW
GetTextExtentPoint32W
GetStockObject
GetObjectW
GetDeviceCaps
EnumFontsW
AbortDoc
DeleteObject
DeleteDC
CreateFontIndirectW
CreateDCW
EndPage
advapi32
ClearEventLogW
SetSecurityDescriptorDacl
ReportEventW
RegisterEventSourceW
RegSetValueExW
RegQueryValueExW
RegQueryValueExA
RegOpenKeyExW
RegOpenKeyExA
RegDeleteValueW
RegCreateKeyW
RegCreateKeyExW
RegCloseKey
ReadEventLogW
OpenEventLogW
IsTextUnicode
InitializeSecurityDescriptor
GetUserNameW
DeregisterEventSource
CloseEventLog
RegOpenKeyA
shell32
DragQueryFileW
DragFinish
DragAcceptFiles
ShellAboutW
msvcrt
memcpy
_XcptFilter
__getmainargs
__initenv
__p__commode
__p__fmode
__set_app_type
__setusermatherr
_acmdln
_adjust_fdiv
_c_exit
_cexit
_controlfp
_except_handler3
_exit
_initterm
_snwprintf
_vsnwprintf
_wcsicmp
_wgetcwd
_wmakepath
_wsplitpath
_wtoi
_wtol
calloc
exit
free
isdigit
isprint
iswctype
localtime
malloc
realloc
sprintf
strchr
swprintf
swscanf
time
tolower
wcscat
wcscmp
wcscpy
wcslen
wcsncmp
wcsncpy
wprintf
Sections
.text Size: 117KB - Virtual size: 116KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ