Static task
static1
Behavioral task
behavioral1
Sample
032be66997876526d3447294171d30ddd70967be2411aa00c1f6e2e9d27fe075.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
032be66997876526d3447294171d30ddd70967be2411aa00c1f6e2e9d27fe075.exe
Resource
win10v2004-20220812-en
General
-
Target
032be66997876526d3447294171d30ddd70967be2411aa00c1f6e2e9d27fe075
-
Size
144KB
-
MD5
02ef213ddacc82d97b6e4c404186c8a0
-
SHA1
504e260587c9eeeb80479ade5d75c1d3ebc187ff
-
SHA256
032be66997876526d3447294171d30ddd70967be2411aa00c1f6e2e9d27fe075
-
SHA512
bf64ac69b701b6fbf0eb0a8e69676c6002c47b205a7f11d916136476063bedcbe6fff25b0beedb61aaae1d3e3ab8e3fc174ac6950bbe31b74a21abe194601f15
-
SSDEEP
3072:Q7AuRt70hKbC63VfmHl+JbrwGymi2LiKbrd6qr4XhPHGo:Q7/70hwOHsJbrFyXMjcxn
Malware Config
Signatures
Files
-
032be66997876526d3447294171d30ddd70967be2411aa00c1f6e2e9d27fe075.exe windows x86
d16b27ee330fa8fa5baf08bfc4bab188
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msi
ord149
gdi32
SetBkColor
SetRectRgn
CreateRoundRectRgn
CreatePatternBrush
StretchBlt
CreatePenIndirect
Escape
PtVisible
GetTextColor
GetTextExtentPoint32W
CreateBrushIndirect
CombineRgn
ExtTextOutW
GetDCOrgEx
EndPage
SetBrushOrgEx
GetStockObject
RoundRect
SelectClipRgn
GetSystemPaletteEntries
Rectangle
PolylineTo
ScaleWindowExtEx
PatBlt
DeleteDC
OffsetViewportOrgEx
GetBkColor
EndDoc
ExcludeClipRect
GetStretchBltMode
CreateBitmap
UnrealizeObject
ScaleViewportExtEx
CreateCompatibleBitmap
DeleteEnhMetaFile
RestoreDC
GetCurrentPositionEx
GetTextMetricsA
CreatePalette
CreateFontW
CreateFontIndirectW
SetROP2
LPtoDP
GetDeviceCaps
GetDIBits
CreateDCA
StretchDIBits
GetMapMode
GetBitmapBits
GetWindowOrgEx
SetStretchBltMode
ExtCreatePen
SetTextAlign
CreateDIBSection
SelectPalette
SetViewportExtEx
shlwapi
PathGetCharTypeA
kernel32
RaiseException
CompareStringW
CompareStringA
GetTimeZoneInformation
GetCommandLineA
GetEnvironmentStrings
GetVersionExA
GetModuleHandleW
lstrcmpA
VirtualAlloc
GetPriorityClass
HeapReAlloc
WaitForMultipleObjects
MultiByteToWideChar
WideCharToMultiByte
GetFileType
ExitProcess
CreateFileA
FormatMessageW
FindClose
FreeEnvironmentStringsW
SetEvent
LeaveCriticalSection
FileTimeToSystemTime
TlsAlloc
QueryPerformanceCounter
SetFilePointer
SetEnvironmentVariableA
GetACP
GetStringTypeW
TlsSetValue
InterlockedDecrement
DeleteCriticalSection
InitializeCriticalSection
HeapAlloc
GetModuleFileNameA
lstrlenW
TerminateProcess
GetVersionExW
LocalFree
WriteFile
InterlockedCompareExchange
LoadLibraryA
GetModuleFileNameW
CreateDirectoryW
FlushFileBuffers
GetCommandLineW
GetFileSize
TryEnterCriticalSection
GetTickCount
SetErrorMode
EnterCriticalSection
TlsGetValue
CloseHandle
Sleep
FreeLibraryAndExitThread
WaitForSingleObjectEx
GetOEMCP
GetProcessHeap
InterlockedExchange
FindResourceW
ReadFile
SetHandleCount
HeapFree
CreateFileW
CreateEventW
LCMapStringW
CreateThread
GetCurrentProcess
GetEnvironmentStringsW
InterlockedIncrement
GetCurrentThread
GetStartupInfoW
GetProcAddress
GetModuleHandleA
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetLastError
GetStartupInfoA
TlsFree
SetLastError
GetCurrentThreadId
HeapDestroy
HeapCreate
VirtualFree
GetCurrentProcessId
GetSystemTimeAsFileTime
FatalAppExitA
SetUnhandledExceptionFilter
IsDebuggerPresent
SetConsoleCtrlHandler
FreeLibrary
GetCPInfo
RtlUnwind
HeapSize
GetLocaleInfoA
GetLocaleInfoW
GetTimeFormatA
GetDateFormatA
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
GetStringTypeA
LCMapStringA
Sections
.text Size: 112KB - Virtual size: 111KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.sxdata Size: 4KB - Virtual size: 116B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ