Static task
static1
Behavioral task
behavioral1
Sample
84122c5935a5629b1488b86fd91e6172ef837e638c96fecc39ce11e081f011b9.exe
Resource
win7-20220901-en
General
-
Target
84122c5935a5629b1488b86fd91e6172ef837e638c96fecc39ce11e081f011b9
-
Size
324KB
-
MD5
742403448700b70277fec53e409d930b
-
SHA1
c44a6848cf090645e976c466d8a9a27827cac1c7
-
SHA256
84122c5935a5629b1488b86fd91e6172ef837e638c96fecc39ce11e081f011b9
-
SHA512
723e17db4488d517c97aff018ef25dacedc5aa1b4b392aea1af9cb756068f2b9b47ac590a4146c861690127d2faf9574240ab6fe62164edb7efe9d3bf957f943
-
SSDEEP
6144:tAxH4qmgWyy+Y6uZ4g/VqhxNH/HR9cqasnxnw:4Yx+0W
Malware Config
Signatures
Files
-
84122c5935a5629b1488b86fd91e6172ef837e638c96fecc39ce11e081f011b9.exe windows x86
86de517740de529b6cc353f6262a0510
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetEndOfFile
GetCurrentProcess
CreateFileA
HeapAlloc
HeapFree
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapReAlloc
RaiseException
VirtualAlloc
RtlUnwind
GetCommandLineA
GetProcessHeap
GetStartupInfoA
HeapSize
ExitProcess
HeapDestroy
HeapCreate
GetStdHandle
SetHandleCount
GetFileType
GetConsoleCP
GetConsoleMode
Sleep
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
GetACP
IsValidCodePage
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetStdHandle
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
GetLocaleInfoW
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
GetOEMCP
GetCPInfo
GetLocaleInfoA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
lstrcmpW
GetVersionExA
GetThreadLocale
GlobalGetAtomNameA
GlobalFlags
lstrcmpA
GetCurrentThreadId
CloseHandle
InterlockedIncrement
FreeLibrary
InterlockedDecrement
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
GetCurrentProcessId
GetModuleFileNameA
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageA
LocalFree
FindResourceA
LoadResource
LockResource
SizeofResource
SetLastError
lstrlenA
CompareStringA
SetTapeParameters
LoadLibraryA
GetModuleHandleA
GetProcAddress
FileTimeToSystemTime
CreateEventA
ReleaseMutex
CreateMutexA
OpenMutexA
DeleteFileA
CreateFileW
FindFirstChangeNotificationA
ResetEvent
GetEnvironmentVariableA
GetShortPathNameA
PeekNamedPipe
DuplicateHandle
GetCurrentThread
GetVersion
GetLastError
WideCharToMultiByte
MultiByteToWideChar
VirtualFree
InterlockedExchange
user32
GetMessageTime
GetMessagePos
MapWindowPoints
SetForegroundWindow
GetClientRect
GetMenu
PostMessageA
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
CopyRect
DefWindowProcA
CallWindowProcA
SetWindowLongA
SetWindowPos
SystemParametersInfoA
IsIconic
GetWindowPlacement
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
ModifyMenuA
EnableMenuItem
CheckMenuItem
GetFocus
GetWindow
GetDlgCtrlID
DestroyWindow
GetClassNameA
PtInRect
GetWindowTextA
SetWindowTextA
UnregisterClassA
SetWindowsHookExA
CallNextHookEx
DispatchMessageA
GetKeyState
PeekMessageA
ValidateRect
LoadCursorA
GetSystemMetrics
GetDC
ReleaseDC
GetSysColor
GetSysColorBrush
UnhookWindowsHookEx
GetWindowThreadProcessId
SendMessageA
GetParent
GetWindowLongA
GetLastActivePopup
IsWindowEnabled
EnableWindow
MessageBoxA
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
GetTopWindow
GetDlgItem
GetForegroundWindow
GetWindowRect
PostQuitMessage
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
DestroyMenu
RegisterWindowMessageA
LoadIconA
WinHelpA
GetCapture
GetClassLongA
SetPropA
GetPropA
RemovePropA
ClientToScreen
IsWindow
gdi32
ExtTextOutA
SaveDC
RestoreDC
SetMapMode
PtVisible
SetBkColor
TextOutA
Escape
SelectObject
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
DeleteDC
GetStockObject
SetTextColor
GetClipBox
CreateBitmap
DeleteObject
SetAbortProc
AbortDoc
SetRectRgn
CombineRgn
RectVisible
GetDeviceCaps
EndDoc
winspool.drv
DocumentPropertiesA
OpenPrinterA
ClosePrinter
oleaut32
VariantClear
VariantChangeType
VariantInit
oleacc
CreateStdAccessibleObject
LresultFromObject
winscard
SCardCancel
SCardConnectA
SCardControl
SCardDisconnect
SCardEndTransaction
SCardEstablishContext
SCardBeginTransaction
SCardForgetReaderGroupA
SCardGetAttrib
SCardGetStatusChangeA
SCardIntroduceReaderA
SCardIntroduceReaderGroupA
SCardIsValidContext
SCardAddReaderToGroupA
SCardAccessStartedEvent
SCardForgetReaderA
SCardListReaderGroupsA
SCardListReadersA
SCardSetAttrib
SCardRemoveReaderFromGroupA
SCardReleaseStartedEvent
SCardReleaseContext
SCardReconnect
SCardLocateCardsByATRA
SCardLocateCardsA
Sections
.text Size: 151KB - Virtual size: 151KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 72KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 27KB - Virtual size: 88KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.xsdata Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 38KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 21KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ