Static task
static1
Behavioral task
behavioral1
Sample
220d3dbeba236e5594a80aab3a4c87d4167cd55364741273a03b2eefb68296d2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
220d3dbeba236e5594a80aab3a4c87d4167cd55364741273a03b2eefb68296d2.exe
Resource
win10v2004-20220812-en
General
-
Target
220d3dbeba236e5594a80aab3a4c87d4167cd55364741273a03b2eefb68296d2
-
Size
429KB
-
MD5
02f09387bc9838462711f4d2111294b0
-
SHA1
f73ea5acd74ea7d3985745e6ae8514df3a343656
-
SHA256
220d3dbeba236e5594a80aab3a4c87d4167cd55364741273a03b2eefb68296d2
-
SHA512
c042744a4d7a81a8d3ff318b3bec7aa91c631f2e9630544469ebbbad8e4a093960872e2296653d8d7c4d0be9140d95a5544bcc56671a474468265e581e92c22b
-
SSDEEP
6144:BkuY3RT4omzyjrC3v0eYWULyJsFAypLFGR3d8eAPaG3lczHTAK0UPiURS+itH1I:BkuYBsomzq3LBpLFqnAPaG1w3FQHO
Malware Config
Signatures
Files
-
220d3dbeba236e5594a80aab3a4c87d4167cd55364741273a03b2eefb68296d2.exe windows x86
56badb1234aa4f5a0931189a8bd794da
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
comctl32
ImageList_Add
ImageList_Create
ImageList_Destroy
InitCommonControlsEx
_TrackMouseEvent
comdlg32
ChooseColorW
ChooseFontW
GetOpenFileNameA
GetOpenFileNameW
GetSaveFileNameA
GetSaveFileNameW
PrintDlgW
gdi32
AbortDoc
BitBlt
CreateCompatibleBitmap
CreateCompatibleDC
CreateDIBSection
CreateFontIndirectW
CreateFontW
CreatePatternBrush
CreateSolidBrush
DeleteDC
DeleteObject
EndDoc
EndPage
GetCharABCWidthsW
GetCharWidth32W
GetClipBox
GetDeviceCaps
GetObjectW
GetStockObject
GetTextFaceW
GetTextMetricsW
RestoreDC
SaveDC
SelectObject
SetBkColor
SetBkMode
SetDIBits
SetMapMode
SetStretchBltMode
SetTextColor
StartDocW
StartPage
StretchBlt
kernel32
CloseHandle
CreatePipe
CreateProcessA
CreateProcessW
CreateSemaphoreA
CreateThread
CreateToolhelp32Snapshot
DeleteCriticalSection
DuplicateHandle
EnterCriticalSection
ExitProcess
FlushFileBuffers
FreeLibrary
GetCurrentProcess
GetCurrentProcessId
GetCurrentThread
GetCurrentThreadId
GetExitCodeProcess
GetExitCodeThread
GetFileAttributesA
GetFileAttributesW
GetFullPathNameA
GetFullPathNameW
GetLastError
GetModuleFileNameA
GetModuleFileNameW
GetModuleHandleA
GetModuleHandleW
GetProcAddress
GetThreadContext
GetVersionExA
GlobalAlloc
GlobalFree
GlobalLock
GlobalSize
GlobalUnlock
InitializeCriticalSection
InterlockedDecrement
InterlockedIncrement
LeaveCriticalSection
LoadLibraryA
LoadLibraryW
OpenProcess
PeekNamedPipe
Process32First
Process32Next
ReadFile
ReleaseSemaphore
ResumeThread
SetLastError
SetUnhandledExceptionFilter
Sleep
SuspendThread
TerminateProcess
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
VirtualProtect
VirtualQuery
WaitForSingleObject
WideCharToMultiByte
WriteFile
msvcrt
_putenv
_write
__getmainargs
__mb_cur_max
__p__environ
__p__fmode
__set_app_type
_cexit
_chdir
_chmod
_errno
_filbuf
_findclose
_findfirst
_findnext
_fullpath
_getcwd
_iob
_isctype
_mkdir
_onexit
_osver
_pctype
_putws
_rmdir
_setmode
_stat
_wchdir
_wchmod
_wfindfirst
_wfindnext
_wfopen
_wfullpath
_wgetcwd
_wgetenv
_winmajor
_wmkdir
_wputenv
_wremove
_wrename
_wrmdir
_wstat
abort
atexit
atof
calloc
cosh
exit
fclose
fflush
fgets
fopen
fputc
fputs
fputws
fread
free
fseek
ftell
fwrite
getenv
getwchar
localtime
malloc
memcmp
memcpy
memmove
memset
pow
printf
puts
realloc
remove
rename
signal
sinh
sprintf
strcat
strchr
strcmp
strcpy
strftime
strlen
strncmp
strrchr
tanh
time
toupper
vfprintf
wcscat
wcscpy
wcslen
wcsrchr
msimg32
AlphaBlend
ole32
IIDFromString
OleCreate
OleInitialize
OleSetContainedObject
oleaut32
SysAllocString
SysAllocStringLen
SysFreeString
shell32
DragAcceptFiles
DragFinish
DragQueryFileW
DragQueryPoint
SHBrowseForFolderA
SHBrowseForFolderW
SHGetPathFromIDListA
SHGetPathFromIDListW
ShellExecuteA
ShellExecuteW
user32
AdjustWindowRectEx
AppendMenuW
BeginDeferWindowPos
CallNextHookEx
CallWindowProcW
CheckMenuItem
ClientToScreen
CloseClipboard
CopyImage
CopyRect
CreateIconIndirect
CreateMenu
CreatePopupMenu
CreateWindowExW
DefDlgProcW
DefWindowProcW
DeferWindowPos
DestroyIcon
DestroyMenu
DestroyWindow
DispatchMessageA
DrawFocusRect
DrawFrameControl
DrawMenuBar
DrawTextW
EmptyClipboard
EnableMenuItem
EnableWindow
EndDeferWindowPos
EnumChildWindows
FillRect
FrameRect
GetActiveWindow
GetClassLongW
GetClassNameW
GetClientRect
GetClipboardData
GetCursor
GetCursorPos
GetDC
GetDesktopWindow
GetFocus
GetForegroundWindow
GetKeyState
GetMenu
GetMenuItemCount
GetParent
GetScrollPos
GetSysColor
GetSystemMetrics
GetUpdateRect
GetWindowInfo
GetWindowLongA
GetWindowLongW
GetWindowRect
GetWindowTextLengthW
GetWindowTextW
GetWindowThreadProcessId
InflateRect
InvalidateRect
IsClipboardFormatAvailable
IsDialogMessageA
IsIconic
IsRectEmpty
IsZoomed
LoadCursorW
LoadIconW
MessageBoxA
MessageBoxW
MoveWindow
MsgWaitForMultipleObjects
OffsetRect
OpenClipboard
PeekMessageA
PostMessageW
PostThreadMessageA
RedrawWindow
RegisterClassW
ReleaseCapture
ReleaseDC
ScreenToClient
SendMessageA
SendMessageW
SetCapture
SetClipboardData
SetCursor
SetCursorPos
SetFocus
SetMenu
SetMenuInfo
SetMenuItemBitmaps
SetMenuItemInfoW
SetScrollPos
SetWindowLongW
SetWindowPos
SetWindowTextW
SetWindowsHookExA
SetWindowsHookExW
ShowCursor
ShowWindow
TrackPopupMenu
TranslateMessage
UnhookWindowsHookEx
ValidateRect
winmm
timeBeginPeriod
timeEndPeriod
timeGetTime
wsock32
WSACleanup
WSAStartup
__WSAFDIsSet
accept
bind
closesocket
connect
gethostbyaddr
gethostbyname
getpeername
getsockname
getsockopt
htonl
htons
listen
ntohl
ntohs
recv
recvfrom
select
send
sendto
setsockopt
shutdown
socket
Sections
.text Size: 81KB - Virtual size: 81KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
code Size: 144KB - Virtual size: 143KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
.data Size: 27KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
data Size: 89KB - Virtual size: 89KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_WRITE
.rdata Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.eh_fram Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 40KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 32B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 36KB - Virtual size: 37KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE