Static task
static1
Behavioral task
behavioral1
Sample
d8e579b8e596307bc0c5744fa18ac6815a227060309e0bb5bcbd3e31d0105853.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d8e579b8e596307bc0c5744fa18ac6815a227060309e0bb5bcbd3e31d0105853.exe
Resource
win10v2004-20220812-en
General
-
Target
d8e579b8e596307bc0c5744fa18ac6815a227060309e0bb5bcbd3e31d0105853
-
Size
270KB
-
MD5
62e47f1a11e9b547345f683f0af177b0
-
SHA1
ad3360eb5bea0ec8efa33e407e63343660d1cf67
-
SHA256
d8e579b8e596307bc0c5744fa18ac6815a227060309e0bb5bcbd3e31d0105853
-
SHA512
94fa86361aeca8e9484a7922c67bae4f7d3991a58efa1cfc9f2489c20befd7bdae8a895039f804db340e09cf86193b6b73e0fd92b4e0f8eb3c1f04f7f79c5df5
-
SSDEEP
6144:2kCSjrzTAmeN5j5wYbKCI2SVTBnozUsGdSsQLH5AdE:2SH3mZC2SVKGdSsPdE
Malware Config
Signatures
Files
-
d8e579b8e596307bc0c5744fa18ac6815a227060309e0bb5bcbd3e31d0105853.exe windows x86
da8ab0e915daa50943d4de86a58f3b50
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLocalTime
ExitProcess
TerminateProcess
GetSystemTime
GetDriveTypeA
HeapAlloc
RaiseException
HeapReAlloc
HeapFree
HeapSize
GetOEMCP
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetStdHandle
HeapDestroy
GetCPInfo
GetACP
GetCommandLineA
GetTimeZoneInformation
GetModuleHandleA
SetEndOfFile
GetStringTypeW
IsBadReadPtr
IsBadWritePtr
IsBadCodePtr
LCMapStringA
LCMapStringW
SetStdHandle
GetLocaleInfoA
GetLocaleInfoW
CompareStringA
CompareStringW
SetEnvironmentVariableA
WinExec
FindFirstFileA
FindNextFileA
FindClose
GetCurrentProcess
RtlUnwind
FileTimeToLocalFileTime
FileTimeToSystemTime
SetErrorMode
GetProcessVersion
GetVersion
WritePrivateProfileStringA
TlsGetValue
LocalReAlloc
TlsSetValue
EnterCriticalSection
GlobalReAlloc
LeaveCriticalSection
GlobalHandle
DeleteCriticalSection
TlsAlloc
InitializeCriticalSection
LocalAlloc
SetLastError
GlobalFlags
GetFileTime
GetFileSize
lstrcmpiA
GetFullPathNameA
lstrcpynA
GetVolumeInformationA
LoadLibraryA
lstrcpyA
GetLastError
GetProcAddress
FreeLibrary
VirtualAlloc
UnlockFile
MultiByteToWideChar
LockFile
WaitForSingleObject
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
CreateFileA
DuplicateHandle
LocalFree
lstrcatA
WideCharToMultiByte
lstrlenA
InterlockedDecrement
InterlockedIncrement
CloseHandle
GlobalAlloc
GlobalDeleteAtom
lstrcmpA
GetCurrentThread
GetCurrentThreadId
GlobalLock
GlobalUnlock
GlobalFree
SetUnhandledExceptionFilter
GetStringTypeA
HeapCreate
VirtualFree
GetStartupInfoA
GetTempPathA
RemoveDirectoryA
SetCurrentDirectoryA
CreateDirectoryA
GetCurrentDirectoryA
GetDiskFreeSpaceA
GetLogicalDrives
GetModuleFileNameA
GetShortPathNameA
CreateProcessA
DeleteFileA
SetFileAttributesA
CopyFileA
GetFileAttributesA
MoveFileExA
GetWindowsDirectoryA
GetSystemDirectoryA
GetVersionExA
user32
GetClassNameA
PtInRect
ClientToScreen
ShowWindow
ReleaseDC
GetDC
TabbedTextOutA
DrawTextA
GrayStringA
LoadCursorA
GetSysColorBrush
LoadStringA
DestroyMenu
ScreenToClient
SetWindowTextA
GetTopWindow
GetCapture
WinHelpA
wsprintfA
GetClassInfoA
RegisterClassA
GetMenuItemCount
GetSubMenu
GetMenuItemID
GetMenu
GetWindowTextA
GetDlgCtrlID
GetClientRect
SetPropA
UnhookWindowsHookEx
GetForegroundWindow
GetPropA
RemovePropA
CallWindowProcA
GetMessageTime
GetWindow
SetWindowLongA
SetWindowPos
RegisterWindowMessageA
CharLowerA
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetMessageA
GetKeyState
CallNextHookEx
ValidateRect
IsWindowVisible
GetCursorPos
SetWindowsHookExA
MessageBoxA
SetCursor
PostMessageA
PostQuitMessage
GetNextDlgTabItem
EndDialog
GetActiveWindow
GetSystemMetrics
DestroyWindow
GetParent
GetWindowLongA
GetDlgItem
IsWindowEnabled
ExitWindowsEx
SendMessageA
PeekMessageA
TranslateMessage
DispatchMessageA
CharUpperA
LoadIconA
SystemParametersInfoA
MapWindowPoints
GetSysColor
SetFocus
AdjustWindowRectEx
GetMessagePos
DefWindowProcA
CreateWindowExA
EnableWindow
GetLastActivePopup
GetWindowRect
SetForegroundWindow
WindowFromPoint
UnregisterClassA
gdi32
CreateScalableFontResourceA
CreateBitmap
SetTextColor
SetBkColor
GetObjectA
DeleteObject
GetDeviceCaps
GetStockObject
SelectObject
DeleteDC
SaveDC
RestoreDC
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
GetClipBox
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
AddFontResourceA
RemoveFontResourceA
comdlg32
GetFileTitleA
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
advapi32
RegDeleteKeyA
InitiateSystemShutdownA
OpenSCManagerA
CloseServiceHandle
RegEnumValueA
RegDeleteValueA
RegQueryInfoKeyA
RegCloseKey
RegSetValueExA
RegQueryValueExA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegOpenKeyExA
RegEnumKeyExA
RegCreateKeyExA
shell32
ShellExecuteA
comctl32
ImageList_Destroy
ord17
ole32
CoCreateInstance
CoInitialize
CoUninitialize
Sections
.text Size: 146KB - Virtual size: 146KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 27KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 13KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 57KB - Virtual size: 57KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ