?buildPreference@@YGEUsimulatecorW@@@Z
Static task
static1
Behavioral task
behavioral1
Sample
0d2aa6eed4a4da48d6a53dd16d6c074931f267b1170a9b8fe8e61556576b6f4e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0d2aa6eed4a4da48d6a53dd16d6c074931f267b1170a9b8fe8e61556576b6f4e.exe
Resource
win10v2004-20220812-en
General
-
Target
0d2aa6eed4a4da48d6a53dd16d6c074931f267b1170a9b8fe8e61556576b6f4e
-
Size
155KB
-
MD5
62d3b147747d9f8ec3867e113b42bbf0
-
SHA1
97ec5b98e9f47b9111916d49b636e8877f2d640e
-
SHA256
0d2aa6eed4a4da48d6a53dd16d6c074931f267b1170a9b8fe8e61556576b6f4e
-
SHA512
747930c646c9474e2fababd7f66d22e01a78400065ccd71124e47139a60f32f385bcf20291254b461307afa3bde6c352cdd4b71582e2b8677019a90abb8d4238
-
SSDEEP
3072:hRYOoXvXRo2IWj5S0xaTe1juNUfVplk5fgQ6h9AnjHQgwjUBX:kJXPl/0Wf65f+9IUgwj
Malware Config
Signatures
Files
-
0d2aa6eed4a4da48d6a53dd16d6c074931f267b1170a9b8fe8e61556576b6f4e.exe windows x86
bdd72bdbf18064893e560e16f690f1d8
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
ImageList_Write
CreatePropertySheetPageA
ImageList_LoadImageW
ImageList_AddMasked
ImageList_Remove
DestroyPropertySheetPage
ImageList_ReplaceIcon
ImageList_GetIcon
CreateStatusWindowW
PropertySheetW
CreatePropertySheetPageW
PropertySheetA
ImageList_Create
ImageList_GetIconSize
ImageList_Draw
ImageList_Destroy
ImageList_Read
ImageList_SetIconSize
InitCommonControlsEx
ImageList_GetImageCount
CreateToolbarEx
comdlg32
ChooseFontW
GetOpenFileNameW
GetSaveFileNameW
PrintDlgW
PrintDlgExW
ChooseColorW
CommDlgExtendedError
FindTextW
PageSetupDlgW
ReplaceTextW
GetFileTitleW
GetOpenFileNameA
GetSaveFileNameA
msvcrt
isalpha
kernel32
EnumResourceLanguagesA
GetComputerNameA
IsBadWritePtr
CreateNamedPipeA
CancelIo
GlobalFindAtomW
DeleteFileW
LoadLibraryExW
GetBinaryTypeA
CreatePipe
GetVersionExW
GetStartupInfoA
FileTimeToSystemTime
AddAtomW
SetTimerQueueTimer
GetStartupInfoW
HeapLock
GetCommModemStatus
DisconnectNamedPipe
UnlockFile
CreateMailslotW
GetSystemTimeAsFileTime
CopyFileA
GlobalFree
FlushViewOfFile
MultiByteToWideChar
ReleaseMutex
GlobalMemoryStatus
GetSystemTimeAdjustment
SetCommTimeouts
IsBadStringPtrW
GetComputerNameW
GetFileAttributesA
GetWindowsDirectoryA
GetWindowsDirectoryW
lstrcmpiW
GetUserDefaultLangID
GetCommState
ResumeThread
SetErrorMode
MoveFileA
CreateNamedPipeW
TryEnterCriticalSection
DeviceIoControl
FreeLibrary
FindFirstFileW
LockResource
DeleteCriticalSection
HeapWalk
LoadLibraryA
GlobalAddAtomA
GlobalAddAtomW
GetDateFormatW
QueryPerformanceCounter
CreateFileA
SetupComm
GetExitCodeThread
SetEvent
GetHandleInformation
CloseHandle
LoadResource
GetTempFileNameA
DuplicateHandle
GlobalMemoryStatusEx
GlobalAlloc
GetCurrentDirectoryW
CompareStringW
GetCommTimeouts
OpenEventW
TlsSetValue
OpenFileMappingA
CreateDirectoryA
CreateThread
FindCloseChangeNotification
IsDBCSLeadByte
VirtualFree
CreateFileMappingA
GlobalDeleteAtom
SetCurrentDirectoryW
HeapCreate
GetFileAttributesExA
GetProcAddress
LCMapStringA
LocalAlloc
FindResourceExA
HeapValidate
SizeofResource
DeleteFileA
UnhandledExceptionFilter
lstrcatA
CompareStringA
lstrlenA
GetComputerNameExW
RemoveDirectoryA
GetComputerNameExA
GetUserDefaultUILanguage
SleepEx
MapViewOfFile
TerminateThread
HeapSize
Sleep
SetThreadContext
FoldStringW
OpenFile
CompareFileTime
UnmapViewOfFile
DefineDosDeviceW
GetFileType
CreateFileMappingW
QueryDosDeviceW
CreateEventA
lstrcpyW
CallNamedPipeW
CreateDirectoryW
WinExec
GetThreadLocale
GetBinaryTypeW
GlobalUnlock
lstrcpynA
LocalFree
GetModuleFileNameW
VerifyVersionInfoW
CreateRemoteThread
GetNumberFormatA
GetTimeFormatW
GetThreadPriority
LeaveCriticalSection
SetThreadExecutionState
FindNextFileA
VirtualQuery
lstrcatW
FindFirstFileA
GetSystemDirectoryA
DeleteAtom
FlushFileBuffers
GetStdHandle
lstrcpyA
GetLocalTime
HeapAlloc
GetTimeZoneInformation
GlobalLock
ReleaseSemaphore
SetCommMask
FileTimeToLocalFileTime
GetTempPathA
SetLastError
SetMailslotInfo
SetSystemTimeAdjustment
GetLastError
SearchPathW
GlobalFlags
GlobalSize
LocalSize
SetFileAttributesW
SetThreadLocale
GetStringTypeExW
WaitForSingleObjectEx
GlobalHandle
VirtualProtect
RegisterWaitForSingleObject
SystemTimeToFileTime
InitializeCriticalSection
IsBadReadPtr
CreateEventW
GetLocaleInfoW
GetSystemWindowsDirectoryW
GetSystemDirectoryW
SetCommBreak
MoveFileExW
CreateWaitableTimerW
GetTempPathW
SetThreadPriority
GetCommandLineA
GetFullPathNameA
SuspendThread
CreateSemaphoreA
user32
GetScrollPos
GetDesktopWindow
Exports
Exports
Sections
.text Size: 49KB - Virtual size: 48KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.cont Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.cond Size: 512B - Virtual size: 128B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.cone Size: 1024B - Virtual size: 1000B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 512B - Virtual size: 117B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 27KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.cons Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 44KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ