Static task
static1
Behavioral task
behavioral1
Sample
d0683a437072b74b57c03c81704d839efd6b29611120994658ad7994f44608c3.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d0683a437072b74b57c03c81704d839efd6b29611120994658ad7994f44608c3.exe
Resource
win10v2004-20220901-en
General
-
Target
d0683a437072b74b57c03c81704d839efd6b29611120994658ad7994f44608c3
-
Size
81KB
-
MD5
642d85915adfd40515080e3eb0c7fa30
-
SHA1
cb063f213dd37b5e22242f4c8b1ae8ce8dad115e
-
SHA256
d0683a437072b74b57c03c81704d839efd6b29611120994658ad7994f44608c3
-
SHA512
2d3437bd2f06a01baa59bcc7105ca540e9bd491d6a5992e3dc8bde28c02441d9cefc7f0fb02dfb9c3d061ddb856539a6bbdbc7b5ed8f98cf88fdb2402c74180b
-
SSDEEP
1536:iWEhGsWPJdLeBbA2a9Dpbm9kmySxhVYWG/Tex94Icx3/58uO5E8p3:xEhroL2boVboZdxwWrx9038P5X
Malware Config
Signatures
Files
-
d0683a437072b74b57c03c81704d839efd6b29611120994658ad7994f44608c3.exe windows x86
9969dfbb52ffd80990e172c98ad62f71
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
user32
SetWindowTextA
GetScrollPos
EnableMenuItem
FrameRect
GetSubMenu
EnumWindows
SetWindowPos
UnhookWindowsHookEx
GetSysColorBrush
PostQuitMessage
EqualRect
GetSysColor
GetMessageA
kernel32
GetACP
RtlUnwind
FileTimeToSystemTime
InterlockedExchange
GetFileAttributesA
VirtualAllocEx
GetCurrentProcessId
GetSystemTime
ExitProcess
GetThreadLocale
GetStartupInfoA
GetTempPathA
SetUnhandledExceptionFilter
QueryPerformanceCounter
GetOEMCP
GetTimeZoneInformation
gdi32
FillRgn
SetViewportExtEx
ExcludeClipRect
DPtoLP
SelectClipPath
GetMapMode
CopyEnhMetaFileA
CreateCompatibleBitmap
CreateICW
ole32
CoInitialize
DoDragDrop
StringFromGUID2
CoTaskMemRealloc
CoInitializeSecurity
CoRevokeClassObject
CoCreateInstance
StgOpenStorage
OleRun
advapi32
AdjustTokenPrivileges
RegCreateKeyExW
GetUserNameA
QueryServiceStatus
RegQueryValueExW
GetSecurityDescriptorDacl
RegCreateKeyA
CryptHashData
FreeSid
CheckTokenMembership
msvcrt
_CIpow
fflush
signal
__getmainargs
puts
fprintf
__setusermatherr
strcspn
_mbscmp
_fdopen
_strdup
strlen
raise
__initenv
_lock
iswspace
_flsbuf
strncpy
comctl32
InitCommonControls
CreatePropertySheetPageA
ImageList_GetBkColor
ImageList_GetIcon
ImageList_SetIconSize
ImageList_LoadImageA
ImageList_GetIconSize
ImageList_Write
ImageList_LoadImageW
ImageList_Destroy
ImageList_DragEnter
ImageList_ReplaceIcon
ImageList_DrawEx
shell32
SHGetPathFromIDList
DoEnvironmentSubstW
ShellExecuteW
SHBrowseForFolderA
ExtractIconExW
ExtractIconW
CommandLineToArgvW
ShellExecuteEx
DragQueryFileW
DragAcceptFiles
DragQueryFileA
oleaut32
VariantCopy
SafeArrayPtrOfIndex
SafeArrayGetUBound
SysReAllocStringLen
SafeArrayUnaccessData
SafeArrayRedim
SafeArrayCreate
SafeArrayPutElement
Sections
.text Size: 34KB - Virtual size: 34KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 39KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 34KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
quhhzgb Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE