Static task
static1
Behavioral task
behavioral1
Sample
67759394d68f0aacb072346d3767484905c6f31f9590688686dbdf8d2562b343.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
67759394d68f0aacb072346d3767484905c6f31f9590688686dbdf8d2562b343.exe
Resource
win10v2004-20220901-en
General
-
Target
67759394d68f0aacb072346d3767484905c6f31f9590688686dbdf8d2562b343
-
Size
45KB
-
MD5
6ce9ff5c209044f93890a5b2a1ee7260
-
SHA1
b4add0a98b6fa58bd38b569423415da7bdb9f8f2
-
SHA256
67759394d68f0aacb072346d3767484905c6f31f9590688686dbdf8d2562b343
-
SHA512
595437e5ab49aaad3141fde11fdccd9f5fdb3ac2d421cf1928695ca82a651570c3f36cfbad1d55bfe0b1b2feee16fc05b28450cb74ef27ad8020efe2230e5f60
-
SSDEEP
768:w0UXsEMGvsr3aGtxeybD2zjetuJSi4EwCpxATJPPU0neDt:wj8EMG0r39tAWD27JSi4OpeOt
Malware Config
Signatures
Files
-
67759394d68f0aacb072346d3767484905c6f31f9590688686dbdf8d2562b343.exe windows x86
648caaf4e0148c099f46083c13f000fe
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
SHDeleteKeyW
StrCpyNW
StrTrimW
StrChrW
StrCmpNIW
SHGetValueW
SHRegGetValueW
PathIsURLW
StrDupW
StrCatBuffW
PathAppendW
SHEnumValueW
PathRemoveExtensionW
PathFileExistsW
PathRemoveBlanksW
PathIsDirectoryW
PathFindExtensionW
StrCmpIW
StrRChrW
wnsprintfW
StrCmpNIA
StrCatBuffA
PathCombineW
UrlCombineW
StrCSpnA
StrToIntW
PathFindFileNameW
StrNCatW
StrFormatByteSizeA
StrFormatByteSizeW
wnsprintfA
PathRemoveBackslashA
StrCmpW
StrSpnA
UrlCompareW
StrToIntExW
PathStripPathW
user32
CheckDlgButton
GetClientRect
SetTimer
GetWindowRect
GetDlgItem
RemoveMenu
CreatePopupMenu
ShowWindow
MessageBeep
GetParent
GetDlgItemInt
SetCursor
CharPrevA
EnableWindow
GetSubMenu
GetDesktopWindow
IsWindow
MsgWaitForMultipleObjects
LoadStringA
KillTimer
GetForegroundWindow
SetDlgItemTextA
CheckRadioButton
GetSysColor
IsDlgButtonChecked
SetMenuDefaultItem
GetSystemMetrics
EndDialog
DestroyIcon
GetMenuItemCount
SetWindowPos
DestroyWindow
TranslateMessage
ReleaseDC
GetDC
EnableMenuItem
SetDlgItemInt
kernel32
LoadLibraryExA
FileTimeToSystemTime
InterlockedDecrement
CreateEventA
WriteFile
GetFileSize
MultiByteToWideChar
RaiseException
QueryPerformanceCounter
GetModuleHandleA
FormatMessageA
WideCharToMultiByte
LoadLibraryW
ReadFile
DeleteFileA
GlobalUnlock
GetSystemDefaultLCID
DeleteCriticalSection
GetTimeZoneInformation
GetTempPathA
lstrcpynA
CompareFileTime
SetLastError
GetProcAddress
LocalFileTimeToFileTime
CreateThread
LocalAlloc
CloseHandle
GlobalLock
LocalFree
GetLocalTime
lstrlenW
InterlockedIncrement
lstrcpynW
GetCPInfo
GetUserDefaultLCID
SystemTimeToFileTime
DeviceIoControl
CreateFileA
GetSystemTimeAsFileTime
FreeLibrary
SetUnhandledExceptionFilter
WaitForSingleObject
GetLocaleInfoW
GetEnvironmentStringsA
GetCurrentProcess
lstrcmpA
CompareStringA
InitializeCriticalSectionAndSpinCount
GetACP
GetLastError
GetTempFileNameA
SetEvent
EnterCriticalSection
LeaveCriticalSection
lstrcmpiA
GetCurrentProcessId
InterlockedExchange
GetSystemTime
lstrlenA
LocalReAlloc
GetVersionExA
msvcrt
__set_app_type
malloc
_initterm
_except_handler3
__getmainargs
free
_adjust_fdiv
exit
__p__commode
advapi32
RegOpenKeyExA
RegCloseKey
RegQueryValueExA
RegEnumKeyA
gdi32
GetDeviceCaps
Sections
.text Size: 34KB - Virtual size: 33KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ