Static task
static1
Behavioral task
behavioral1
Sample
d20246a2c8c476dea36e99deed7f0370af8ebf6ec259a97ca54149fd1702c473.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
d20246a2c8c476dea36e99deed7f0370af8ebf6ec259a97ca54149fd1702c473.exe
Resource
win10v2004-20220812-en
General
-
Target
d20246a2c8c476dea36e99deed7f0370af8ebf6ec259a97ca54149fd1702c473
-
Size
184KB
-
MD5
6decf60e926e75d01ead79a76493b826
-
SHA1
1cd6d1e84f5e219700d8a551c12bdcfc12fa7b3f
-
SHA256
d20246a2c8c476dea36e99deed7f0370af8ebf6ec259a97ca54149fd1702c473
-
SHA512
f414dc6b78695560526af847c09dadf89531b0c0136910ddc207bd2f6d03d2ddf7f1dbc4896a7f225c14f50a4a2adcdaf7cd037fe10f774e3b340a6090f331d6
-
SSDEEP
3072:we5nGiF89bFNBumSm/95fidEQy+DP4Xsk1NHykwzoI7h+aS1GI:UiK99ump/9Cy+DAXf1xyrzo0naGI
Malware Config
Signatures
Files
-
d20246a2c8c476dea36e99deed7f0370af8ebf6ec259a97ca54149fd1702c473.exe windows x86
9b24ec0420fa4c3bda934898a87dfe92
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mfc42
ord1601
ord861
ord1175
ord2764
ord535
ord2582
ord4402
ord3370
ord3640
ord693
ord341
ord654
ord4243
ord3626
ord3663
ord384
ord1641
ord2414
ord2379
ord3910
ord2864
ord6905
ord4284
ord3301
ord6888
ord6675
ord3721
ord795
ord4275
ord5875
ord6199
ord3874
ord858
ord6197
ord2859
ord3619
ord2086
ord941
ord537
ord939
ord1908
ord1690
ord2528
ord5288
ord2054
ord4431
ord771
ord1008
ord496
ord4259
ord4439
ord1200
ord4715
ord2818
ord1907
ord5161
ord5162
ord5261
ord4905
ord4742
ord4948
ord4358
ord4377
ord4854
ord5287
ord4835
ord2915
ord823
ord6648
ord1727
ord6215
ord1768
ord6380
ord489
ord2358
ord4258
ord4976
ord665
ord1979
ord5442
ord3318
ord5186
ord924
ord354
ord1168
ord5849
ord2881
ord4204
ord2642
ord2817
ord686
ord2301
ord6907
ord6007
ord3998
ord6055
ord2862
ord2098
ord3698
ord765
ord6385
ord4274
ord6375
ord4486
ord2554
ord2512
ord5731
ord3922
ord1089
ord5199
ord2396
ord3346
ord5300
ord5302
ord4079
ord4698
ord5307
ord5289
ord5714
ord4622
ord3738
ord561
ord815
ord2621
ord1134
ord2725
ord755
ord470
ord6453
ord2648
ord4441
ord4837
ord3798
ord5280
ord4353
ord6374
ord5163
ord2385
ord5241
ord4407
ord1775
ord4078
ord6052
ord2514
ord4998
ord4853
ord4376
ord5265
ord3719
ord4424
ord6334
ord4160
ord4224
ord3092
ord2370
ord2289
ord540
ord860
ord800
ord4710
ord4234
ord2302
ord2360
ord2290
ord825
ord324
ord567
ord641
ord793
ord3597
ord4425
ord4627
ord4080
ord3079
ord3825
ord3831
ord3830
ord2976
ord3081
ord2985
ord3262
ord3136
ord4465
ord3259
ord3147
ord2982
ord5277
ord2124
ord2446
ord6376
ord3610
ord656
ord5065
ord3402
ord5290
ord1776
ord3749
ord768
ord2055
ord2860
ord5160
ord3996
ord1576
msvcrt
_controlfp
_except_handler3
_onexit
_setmbcp
__CxxFrameHandler
_mbscmp
_makepath
_splitpath
_memicmp
exit
__dllonexit
__set_app_type
_exit
_XcptFilter
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
kernel32
GetStartupInfoA
SetFilePointer
ReadFile
CreateEventA
WinExec
ExitProcess
GetDriveTypeA
CreateDirectoryA
RemoveDirectoryA
lstrlenA
lstrcpyA
MultiByteToWideChar
GetCurrentThreadId
GetCurrentProcessId
GetFileAttributesA
SetFileAttributesA
CopyFileA
GetSystemDirectoryA
GetModuleFileNameA
GetFullPathNameA
FindFirstFileA
FindClose
GetLastError
GlobalAlloc
GlobalFree
GetCurrentProcess
GetVersionExA
GetProcAddress
WriteFile
DeleteFileA
IsBadWritePtr
IsBadReadPtr
DeviceIoControl
LoadLibraryA
CreateFileA
GetVersion
CloseHandle
FreeLibrary
GetModuleHandleA
user32
RegisterWindowMessageA
ExitWindowsEx
SendMessageA
GetClientRect
SetWindowLongA
CallWindowProcA
GetWindowLongA
MessageBoxA
GetSystemMetrics
IsIconic
GetDC
ReleaseDC
InvalidateRect
IsWindow
ScreenToClient
GetWindowRect
DrawIcon
SetCursor
SystemParametersInfoA
ReleaseCapture
KillTimer
SetTimer
UpdateWindow
ClientToScreen
GetDesktopWindow
PostMessageA
GetParent
EnableWindow
WindowFromPoint
gdi32
GetStockObject
CreateFontIndirectA
advapi32
RegCreateKeyA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
FreeSid
EqualSid
AllocateAndInitializeSid
GetTokenInformation
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
RegSetValueExA
RegDeleteKeyA
RegEnumKeyA
shell32
SHGetSpecialFolderLocation
SHBrowseForFolderA
SHGetPathFromIDListA
ShellExecuteA
comctl32
ImageList_DragEnter
ImageList_DragLeave
ImageList_DragMove
ImageList_EndDrag
ImageList_DragShowNolock
ole32
CoCreateInstance
CoUninitialize
CLSIDFromProgID
CoGetClassObject
CoInitialize
oleaut32
SysFreeString
VariantInit
SysAllocStringLen
Sections
.text Size: 60KB - Virtual size: 57KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 64KB - Virtual size: 150KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 40KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ