Static task
static1
Behavioral task
behavioral1
Sample
83d1e99b1d63fc25161287f50a6cab8bbb3b051943913845f6200d4c32bd36c1.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
83d1e99b1d63fc25161287f50a6cab8bbb3b051943913845f6200d4c32bd36c1.exe
Resource
win10v2004-20220901-en
General
-
Target
83d1e99b1d63fc25161287f50a6cab8bbb3b051943913845f6200d4c32bd36c1
-
Size
368KB
-
MD5
06e4d82c3eb7aeaf307c996696be4807
-
SHA1
6ff16a052156ab7f70bd6f6aacbe3fe2f5836dd1
-
SHA256
83d1e99b1d63fc25161287f50a6cab8bbb3b051943913845f6200d4c32bd36c1
-
SHA512
e89efbd8fce319825ee3bb910f94281a0404a9a23b9a6be313adb1148e2882dc069659fac16b31cc78bfde5b27cbfa6fa75e6467081a76795804ea22f69c7f6d
-
SSDEEP
6144:FeCKgK2sJhDc3VbskNsj8xyBI1ViuulS8HFo:F4gK2A1c3VQkwKNZYo
Malware Config
Signatures
Files
-
83d1e99b1d63fc25161287f50a6cab8bbb3b051943913845f6200d4c32bd36c1.exe windows x86
559862bd03fbd0195c76fd8dc310599b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
DrawStatusTextA
InitCommonControlsEx
ImageList_DragLeave
ImageList_LoadImageA
ImageList_LoadImage
CreateToolbarEx
ImageList_SetOverlayImage
wininet
InternetUnlockRequestFile
DeleteUrlCacheEntryA
DetectAutoProxyUrl
InternetWriteFile
GopherCreateLocatorA
IsUrlCacheEntryExpiredW
InternetTimeToSystemTimeW
comdlg32
ChooseFontW
FindTextW
ReplaceTextA
user32
MessageBoxExA
LoadStringA
GetKeyNameTextW
RegisterWindowMessageW
SetScrollInfo
ArrangeIconicWindows
CloseWindow
RegisterClassA
DdePostAdvise
IsMenu
GetUserObjectSecurity
GetClassInfoA
OemKeyScan
UnionRect
GetClipboardViewer
SetDlgItemTextW
DdeReconnect
DestroyWindow
DefWindowProcA
DlgDirSelectExW
CloseDesktop
SetWindowPlacement
DlgDirListComboBoxW
DeleteMenu
RemoveMenu
GetTabbedTextExtentA
RealGetWindowClass
GetKeyboardLayoutNameA
CreateIconIndirect
DlgDirListComboBoxA
SetWindowsHookExW
CheckDlgButton
RegisterClassExA
ReplyMessage
OemToCharBuffA
ShowWindow
DdeFreeDataHandle
MessageBoxA
CreateWindowExW
TranslateMDISysAccel
TrackPopupMenu
DestroyMenu
DdeCmpStringHandles
TileChildWindows
kernel32
GetFileAttributesA
InterlockedCompareExchange
OpenSemaphoreA
ReadConsoleOutputW
HeapReAlloc
GetProcAddress
WriteConsoleA
IsValidLocale
VirtualAlloc
FindNextFileA
GetStartupInfoA
GetCommandLineA
WriteFile
FileTimeToLocalFileTime
CreateFileA
LocalReAlloc
HeapFree
ResumeThread
GetLocaleInfoA
HeapCreate
GlobalGetAtomNameW
InterlockedDecrement
LCMapStringA
FreeEnvironmentStringsA
GetStringTypeW
CompareStringW
CreateMutexW
GetStartupInfoW
SetUnhandledExceptionFilter
GetCurrentProcessId
GetDriveTypeA
VirtualQuery
VirtualFree
IsValidCodePage
GetTickCount
CreateMutexA
TlsAlloc
GetProcessHeap
TerminateProcess
ConnectNamedPipe
GetCurrentThread
TlsFree
GetEnvironmentStringsW
EnumTimeFormatsA
GetFileTime
FileTimeToDosDateTime
ExitProcess
HeapAlloc
GetDiskFreeSpaceW
SetThreadLocale
GetCurrentProcess
GetCPInfo
HeapSize
InterlockedExchange
IsDebuggerPresent
GetDateFormatA
OpenMutexA
GetStdHandle
TlsGetValue
GetTimeZoneInformation
HeapDestroy
GetPrivateProfileIntW
LoadLibraryA
GetVersion
FindNextChangeNotification
EnumSystemCodePagesA
WideCharToMultiByte
LeaveCriticalSection
SetEnvironmentVariableA
SetConsoleCtrlHandler
LocalAlloc
CreateSemaphoreA
lstrlen
Sleep
GetCommandLineW
SetHandleCount
LockFileEx
TlsSetValue
GetSystemTimeAsFileTime
RtlUnwind
SetLastError
GetConsoleOutputCP
FreeEnvironmentStringsW
LCMapStringW
SetFilePointer
FindResourceExA
GetACP
GetCurrentThreadId
GetConsoleTitleW
GlobalFix
GetConsoleCP
UnhandledExceptionFilter
MoveFileExW
GetPrivateProfileStructA
DosDateTimeToFileTime
MultiByteToWideChar
CompareStringA
WritePrivateProfileStructA
FindResourceA
GetOEMCP
FillConsoleOutputCharacterW
EnumSystemLocalesA
SetStdHandle
GetConsoleMode
DeleteCriticalSection
OpenWaitableTimerW
FlushFileBuffers
GetFileType
GetEnvironmentStrings
GetUserDefaultLCID
CreateFileMappingA
GetModuleHandleA
GetModuleFileNameA
InitializeCriticalSection
LocalFree
FindResourceW
WriteConsoleInputA
GetStringTypeA
WriteConsoleW
CreateProcessW
ReadFile
CreateFileMappingW
QueryPerformanceCounter
WaitForSingleObjectEx
GetTimeFormatA
CloseHandle
FreeLibrary
OpenSemaphoreW
LockFile
InterlockedIncrement
WritePrivateProfileStringW
EnterCriticalSection
GetLocaleInfoW
WaitNamedPipeW
GetVersionExA
GetModuleFileNameW
GetLastError
Sections
.text Size: 164KB - Virtual size: 161KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 80KB - Virtual size: 77KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 92KB - Virtual size: 96KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ