Static task
static1
Behavioral task
behavioral1
Sample
83a80a0ef6e08193e57b8320ac2fd152014e9b26aa8f8ee3e117ff363aad4fd2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
83a80a0ef6e08193e57b8320ac2fd152014e9b26aa8f8ee3e117ff363aad4fd2.exe
Resource
win10v2004-20220812-en
General
-
Target
83a80a0ef6e08193e57b8320ac2fd152014e9b26aa8f8ee3e117ff363aad4fd2
-
Size
396KB
-
MD5
01ee76f4a48a3a2e179340592cf1e030
-
SHA1
7ba724478e72a3fc90c0c7f733ea2e22de7fbc6e
-
SHA256
83a80a0ef6e08193e57b8320ac2fd152014e9b26aa8f8ee3e117ff363aad4fd2
-
SHA512
93e06b2e1d8442c4d97197a9c9ddd60c6b187b7c66e84e55138b0ad0ddd69f23374ed71ea81db1ef45e5b3da35c9a2d2f022a4f1e1532ff44aefa2aeb916f0e4
-
SSDEEP
6144:vQ6ULGjs8WVJxUHvOeJnXCQfq95BSsQLH5Adb:vZULGErxUHvHQDBSsPdb
Malware Config
Signatures
Files
-
83a80a0ef6e08193e57b8320ac2fd152014e9b26aa8f8ee3e117ff363aad4fd2.exe windows x86
269a5ccd46f4cd67979e4763c767ccf6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ExitProcess
HeapReAlloc
TerminateProcess
HeapSize
HeapDestroy
HeapCreate
VirtualFree
IsBadWritePtr
SetHandleCount
GetStdHandle
GetFileType
GetStringTypeA
GetStringTypeW
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetCommandLineA
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
SetUnhandledExceptionFilter
LCMapStringA
LCMapStringW
IsBadReadPtr
IsBadCodePtr
SetStdHandle
GetStartupInfoA
VirtualQuery
GetSystemInfo
VirtualAlloc
VirtualProtect
HeapFree
HeapAlloc
RtlUnwind
SetErrorMode
CreateFileA
GetCurrentProcess
SetEndOfFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
WritePrivateProfileStringA
RaiseException
GetOEMCP
GetCPInfo
InterlockedIncrement
GlobalFlags
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
TlsGetValue
GlobalHandle
GlobalReAlloc
LocalAlloc
CloseHandle
WaitForSingleObject
GetCurrentThread
lstrcmpA
ConvertDefaultLocale
EnumResourceLanguagesA
lstrcpyA
InterlockedDecrement
SetLastError
MulDiv
GlobalLock
GlobalUnlock
FormatMessageA
LocalFree
FreeResource
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
LoadLibraryA
FreeLibrary
lstrcatA
lstrcmpW
lstrcpynA
GetModuleHandleA
GetProcAddress
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
GlobalAlloc
GlobalFree
lstrlenA
lstrcmpiA
GetVersion
GetLastError
MultiByteToWideChar
GetModuleFileNameA
WideCharToMultiByte
FindResourceA
LoadResource
LockResource
SizeofResource
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
GetEnvironmentStringsW
InterlockedExchange
user32
PostQuitMessage
wsprintfA
GetDesktopWindow
CreateDialogIndirectParamA
EndDialog
GetCursorPos
SetMenuItemBitmaps
ModifyMenuA
EnableMenuItem
CheckMenuItem
GetMenuCheckMarkDimensions
EndPaint
BeginPaint
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
IsWindowEnabled
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
GetMenuState
RegisterWindowMessageA
WinHelpA
GetCapture
CreateWindowExA
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassInfoExA
GetClassNameA
SetPropA
GetPropA
RemovePropA
SendDlgItemMessageA
GetFocus
IsWindow
SetFocus
GetWindowTextLengthA
GetForegroundWindow
SetActiveWindow
DispatchMessageA
GetDlgItem
GetTopWindow
DestroyWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
PeekMessageA
MapWindowPoints
MessageBoxA
GetKeyState
SetForegroundWindow
IsWindowVisible
UpdateWindow
GetMenu
GetMenuItemID
GetMenuItemCount
AdjustWindowRectEx
ScreenToClient
GetClassInfoA
RegisterClassA
UnregisterClassA
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
SetWindowLongA
SetWindowPos
SystemParametersInfoA
IsIconic
GetWindowPlacement
PtInRect
GetWindow
DdeClientTransaction
DdeGetLastError
DdeInitializeA
DdeCreateStringHandleA
DdeConnect
DdeGetData
DdeNameService
DdeFreeStringHandle
DdeUninitialize
DdeDisconnect
GetSystemMetrics
LoadIconA
LoadCursorA
GetSysColorBrush
FlashWindow
KillTimer
SetTimer
DrawIcon
LoadBitmapA
LoadImageA
GetSysColor
GetSubMenu
TrackPopupMenuEx
PostMessageA
SetCursor
DestroyCursor
GetMessageA
TranslateMessage
ValidateRect
GetWindowTextA
DestroyMenu
GetWindowLongA
EnableWindow
WindowFromPoint
GetParent
GetNextDlgTabItem
GetActiveWindow
InvalidateRect
ClientToScreen
GetClientRect
GetWindowRect
SendMessageA
DrawFocusRect
FrameRect
FillRect
OffsetRect
InflateRect
CopyRect
GetDC
ReleaseDC
DrawStateA
DestroyIcon
GetLastActivePopup
gdi32
MoveToEx
LineTo
SetMapMode
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
DeleteObject
SetBkMode
RestoreDC
SaveDC
GetDeviceCaps
GetClipBox
CreateSolidBrush
CreatePen
CreateDIBitmap
CreateCompatibleBitmap
GetObjectA
CreateBitmap
CreateCompatibleDC
SelectObject
SetBkColor
BitBlt
SetTextColor
DeleteDC
GetStockObject
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
RegOpenKeyA
RegQueryValueExA
RegOpenKeyExA
RegDeleteKeyA
RegEnumKeyA
RegQueryValueA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
shell32
ShellExecuteExA
comctl32
_TrackMouseEvent
ord17
ImageList_Destroy
shlwapi
PathFindFileNameA
PathFindExtensionA
oleaut32
VariantClear
VariantChangeType
VariantInit
winmm
PlaySoundA
Sections
.text Size: 144KB - Virtual size: 142KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 36KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 275KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 204KB - Virtual size: 201KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ