Static task
static1
Behavioral task
behavioral1
Sample
cd36510cac5772e208baf19c306b3231896b088fa585d0f0ef4e5565d37aba9a.exe
Resource
win7-20220901-en
General
-
Target
cd36510cac5772e208baf19c306b3231896b088fa585d0f0ef4e5565d37aba9a
-
Size
441KB
-
MD5
6993d343d4b1428b001cf6b12c43ba00
-
SHA1
004cb374df828645f6db35bcf7b88a701fcb29fa
-
SHA256
cd36510cac5772e208baf19c306b3231896b088fa585d0f0ef4e5565d37aba9a
-
SHA512
5f745630361702d10e9c690673f8fd4e0b5e6bc1b8b45a6b29e1175a2e4458dee4078459ec5cf5a9c0c2745c8f125cfcb7252a4dd9fffb06b37b163416a6c689
-
SSDEEP
6144:LHOTYdrRvqmd50ImDQZda9+U1VUE2gS3zzqIcxS9OdKMdTWldfyojDuUlldr5Z1H:LHTvq25lmDQAVyzzqIwC5yeDuUlljCgN
Malware Config
Signatures
Files
-
cd36510cac5772e208baf19c306b3231896b088fa585d0f0ef4e5565d37aba9a.exe windows x86
9d9b66ba8bb75a566a046d70d8be5eac
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
kernel32
LocalReAlloc
TlsFree
InterlockedIncrement
ReadFile
SetFilePointer
SetEndOfFile
GetThreadLocale
lstrcmpW
GlobalFindAtomA
GlobalGetAtomNameA
SetErrorMode
GetCPInfo
GetOEMCP
RtlUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RaiseException
ExitProcess
HeapReAlloc
TlsSetValue
GetTimeFormatA
GetDateFormatA
GetSystemTimeAsFileTime
HeapSize
SetStdHandle
GetFileType
GetACP
LCMapStringA
LCMapStringW
GetStdHandle
VirtualFree
HeapDestroy
HeapCreate
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetTimeZoneInformation
GetStringTypeA
GetStringTypeW
GetConsoleCP
GetConsoleMode
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEnvironmentVariableA
TlsAlloc
GlobalHandle
GlobalReAlloc
TlsGetValue
InterlockedDecrement
GetModuleFileNameW
GlobalFlags
GetCurrentProcessId
GlobalUnlock
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesA
GlobalLock
OpenMutexA
CreateMutexA
GetUserDefaultLangID
FormatMessageA
TerminateProcess
CreateDirectoryA
FlushFileBuffers
GlobalAlloc
GlobalFree
HeapFree
GetProcessHeap
HeapAlloc
GetFileTime
CompareFileTime
WritePrivateProfileStringA
lstrcmpA
GetDriveTypeA
LocalAlloc
LocalFree
Sleep
SetLastError
GetVersionExA
GetSystemDirectoryA
GetShortPathNameA
GetTempPathA
GetLocaleInfoA
GetSystemDefaultLangID
InitializeCriticalSection
GetFileSize
DeleteCriticalSection
QueryPerformanceCounter
QueryPerformanceFrequency
WriteFile
OutputDebugStringA
CreateFileA
GetEnvironmentVariableA
CompareStringW
CompareStringA
GetVersion
InterlockedExchange
GetStartupInfoA
CreateProcessA
WaitForSingleObject
GetExitCodeProcess
GetCommandLineA
WideCharToMultiByte
FindResourceA
LoadResource
LockResource
SizeofResource
GetWindowsDirectoryA
FindFirstFileA
FindNextFileA
FindClose
CloseHandle
GetPrivateProfileStringA
GetCurrentDirectoryA
lstrlenA
GetProcAddress
GetCurrentProcess
FreeLibrary
LoadLibraryA
GlobalAddAtomA
GlobalDeleteAtom
GetCurrentThreadId
GetTickCount
GetLastError
EnterCriticalSection
LeaveCriticalSection
GetModuleHandleA
GetModuleFileNameA
GetFullPathNameA
GetFileAttributesA
MultiByteToWideChar
VirtualAlloc
user32
UnregisterClassA
DestroyMenu
LoadCursorA
GetSysColorBrush
LoadIconA
WinHelpA
GetCapture
GetClassLongA
SetPropA
GetPropA
RemovePropA
GetForegroundWindow
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetForegroundWindow
GetClientRect
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
DefWindowProcA
CallWindowProcA
SystemParametersInfoA
IsIconic
GetWindowPlacement
CopyRect
SetWindowPos
ShowWindow
GetDlgItem
AdjustWindowRectEx
GetWindow
GetDlgCtrlID
GetWindowRect
GetClassNameA
PtInRect
GetWindowTextA
GetMenuItemID
GetMenuItemCount
GetSubMenu
GetLastActivePopup
IsWindowEnabled
EnableWindow
SetCursor
SetWindowsHookExA
CallNextHookEx
GetMessageA
GetActiveWindow
IsWindowVisible
GetKeyState
GetCursorPos
ValidateRect
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
GetFocus
GetParent
ModifyMenuA
GetMenuState
EnableMenuItem
CheckMenuItem
GetSysColor
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
MessageBoxA
IsWindow
MsgWaitForMultipleObjects
PostQuitMessage
GetWindowThreadProcessId
SetWindowTextA
GetSystemMetrics
WaitForInputIdle
GetWindowLongA
GetDC
SetWindowLongA
ReleaseDC
PeekMessageA
TranslateMessage
DispatchMessageA
PostMessageA
SendMessageA
RegisterWindowMessageA
UnhookWindowsHookEx
GetMenu
gdi32
DeleteObject
GetClipBox
GetStockObject
CreateBitmap
DeleteDC
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetDeviceCaps
SetMapMode
SetTextColor
SetBkColor
RestoreDC
SaveDC
winspool.drv
DocumentPropertiesA
OpenPrinterA
ClosePrinter
advapi32
RegQueryValueA
RegEnumKeyA
RegCloseKey
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
RegCreateKeyExA
RegOpenKeyA
RegDeleteKeyA
RegSetValueExA
RegOpenKeyExA
RegQueryValueExA
shlwapi
PathFindFileNameA
PathFindExtensionA
oleaut32
VariantClear
VariantInit
VariantChangeType
Sections
.text Size: 236KB - Virtual size: 232KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 60KB - Virtual size: 57KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 12KB - Virtual size: 89KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 124KB - Virtual size: 124KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE