Static task
static1
Behavioral task
behavioral1
Sample
dde1961fccae7ce9e5301316360524779e13f26fd62243e4f2085f9eca01e033.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
dde1961fccae7ce9e5301316360524779e13f26fd62243e4f2085f9eca01e033.exe
Resource
win10v2004-20220901-en
General
-
Target
dde1961fccae7ce9e5301316360524779e13f26fd62243e4f2085f9eca01e033
-
Size
768KB
-
MD5
4d75b8fce4032bec6bc20915b804a150
-
SHA1
a3da0155a7331db57951396170fac822c76b049e
-
SHA256
dde1961fccae7ce9e5301316360524779e13f26fd62243e4f2085f9eca01e033
-
SHA512
09c33c8a5c26fc9aa082af0d328940ac82379c31364550a8c080cb846c52a22888e5da46f794688ab55ebbd145539770be1fc39fdbc27adfb02b1728b0102762
-
SSDEEP
12288:Qsltj3a2SC2hH7GtQyinwcdG9crhSvOXtQw+m1vUmPhJzUs:Qslt6F7GtQ09crhSvYQw+zCX
Malware Config
Signatures
Files
-
dde1961fccae7ce9e5301316360524779e13f26fd62243e4f2085f9eca01e033.exe windows x86
32c65f56875ca46129e35d041ccdb991
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapAlloc
HeapFree
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
RtlUnwind
GetStartupInfoA
GetCommandLineA
ExitProcess
HeapReAlloc
TerminateProcess
HeapSize
HeapDestroy
HeapCreate
VirtualFree
IsBadWritePtr
LCMapStringA
LCMapStringW
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetFileType
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
SetStdHandle
GetFileAttributesA
SetErrorMode
GetVolumeInformationA
GetCurrentProcess
GetLogicalDrives
Sleep
GetDriveTypeA
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
GetPrivateProfileStringA
WritePrivateProfileStringA
GetOEMCP
GetCPInfo
GlobalFlags
InterlockedIncrement
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
TlsGetValue
EnterCriticalSection
GlobalHandle
GlobalReAlloc
LeaveCriticalSection
LocalAlloc
GetCurrentThread
lstrcmpA
ConvertDefaultLocale
EnumResourceLanguagesA
lstrcpyA
GetModuleFileNameA
FreeResource
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
LoadLibraryA
FreeLibrary
lstrcatA
lstrcmpW
GetModuleHandleA
GetProcAddress
InterlockedDecrement
SetLastError
GlobalFree
MulDiv
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageA
lstrcpynA
LocalFree
CreateProcessA
WaitForSingleObject
GetExitCodeProcess
CloseHandle
DeleteCriticalSection
InitializeCriticalSection
RaiseException
CreateMutexA
InterlockedExchange
lstrlenA
lstrcmpiA
GetVersion
FindResourceA
LoadResource
LockResource
SizeofResource
GetLastError
WideCharToMultiByte
MultiByteToWideChar
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
SetHandleCount
user32
SetPropA
GetPropA
RemovePropA
SendDlgItemMessageA
GetFocus
SetFocus
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
SetActiveWindow
DispatchMessageA
BeginDeferWindowPos
EndDeferWindowPos
GetDlgItem
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
PeekMessageA
MapWindowPoints
MessageBoxA
GetKeyState
IsWindowVisible
UpdateWindow
GetClientRect
GetMenu
PostMessageA
AdjustWindowRectEx
DeferWindowPos
GetClassInfoA
GetClassNameA
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
GetWindowLongA
SetWindowLongA
SetWindowPos
GetMenuCheckMarkDimensions
SystemParametersInfoA
GetWindowPlacement
GetWindowRect
GetSystemMetrics
CopyRect
PtInRect
GetWindow
GetSysColor
EndPaint
BeginPaint
ReleaseDC
IsWindow
SendMessageA
GetParent
EnableWindow
GetDC
ClientToScreen
ScreenToClient
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
UnhookWindowsHookEx
GetMenuState
GetMenuItemID
GetClassInfoExA
GetClassLongA
CallNextHookEx
GetMenuItemCount
SetWindowsHookExA
CreateWindowExA
GetCapture
WinHelpA
LoadBitmapA
LoadCursorA
LoadIconA
ShowWindowAsync
IsIconic
SetForegroundWindow
FindWindowA
RegisterClassA
MapDialogRect
KillTimer
SetTimer
DefDlgProcA
SetWindowRgn
UnregisterClassA
RegisterWindowMessageA
GetSubMenu
CheckMenuItem
EnableMenuItem
ModifyMenuA
SetMenuItemBitmaps
IsWindowEnabled
EndDialog
GetNextDlgTabItem
wsprintfA
DestroyMenu
GetSysColorBrush
GetMessageA
TranslateMessage
GetCursorPos
ValidateRect
SetCursor
PostQuitMessage
ShowWindow
SetWindowTextA
IsDialogMessageA
GetDesktopWindow
GetActiveWindow
CreateDialogIndirectParamA
gdi32
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
SelectObject
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
DeleteDC
CreateBitmap
GetClipBox
SetMapMode
SetTextColor
DeleteObject
SetBkColor
RestoreDC
SaveDC
GetDeviceCaps
CreateRectRgn
GetObjectA
GetStockObject
CreateFontIndirectA
comdlg32
GetOpenFileNameA
GetSaveFileNameA
winspool.drv
DocumentPropertiesA
OpenPrinterA
ClosePrinter
advapi32
OpenProcessToken
DuplicateToken
AllocateAndInitializeSid
InitializeSecurityDescriptor
GetLengthSid
InitializeAcl
AddAccessAllowedAce
SetSecurityDescriptorDacl
SetSecurityDescriptorGroup
SetSecurityDescriptorOwner
IsValidSecurityDescriptor
AccessCheck
FreeSid
RegQueryValueA
RegEnumKeyA
RegDeleteKeyA
RegQueryValueExA
RegOpenKeyA
RegSetValueExA
RegOpenKeyExA
RegCreateKeyExA
RegCloseKey
OpenThreadToken
shell32
SHGetFileInfoA
comctl32
ord17
shlwapi
PathFindExtensionA
PathFindFileNameA
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
ole32
CoInitialize
CoUninitialize
GetRunningObjectTable
CreateClassMoniker
oleaut32
VariantInit
VariantChangeType
VariantClear
Sections
.text Size: 120KB - Virtual size: 119KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 36KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 600KB - Virtual size: 2.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE