Static task
static1
Behavioral task
behavioral1
Sample
306f254bc96f551856ae5a91ba1099b89b375cbf7041117d9438b282bed78f63.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
306f254bc96f551856ae5a91ba1099b89b375cbf7041117d9438b282bed78f63.exe
Resource
win10v2004-20220901-en
General
-
Target
306f254bc96f551856ae5a91ba1099b89b375cbf7041117d9438b282bed78f63
-
Size
332KB
-
MD5
4106f76d39cbf54ea964a95887541b70
-
SHA1
d24f2c1872dba05b0165a27240817910afa1fdc0
-
SHA256
306f254bc96f551856ae5a91ba1099b89b375cbf7041117d9438b282bed78f63
-
SHA512
5ef228ea1c30cb253ceee674f697f6c303ec499dc32dbe80207c0fc815c32ec247c6367de0d511a6895a9b15249c9546ce40232c893ba0e152a1aa0bec09b9a1
-
SSDEEP
6144:8GrvIHORfEYS3hgYQMwrsUPMf4yTS80TdSA0ly5Ek0fxwD:zrQ0fl4QMKJyKRSA08HqwD
Malware Config
Signatures
Files
-
306f254bc96f551856ae5a91ba1099b89b375cbf7041117d9438b282bed78f63.exe windows x86
8f85c24caa8365f1d138b72adf4562d3
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
wininet
InternetSetOptionExW
user32
RegisterClassExA
GetKeyboardType
IsWindowVisible
GetUpdateRect
SetUserObjectInformationW
MessageBoxA
CreatePopupMenu
CreateWindowExW
DestroyWindow
DdeAccessData
ShowWindow
GetClassLongA
GetScrollInfo
CreateAcceleratorTableA
SetWindowsHookW
DdeClientTransaction
GetSysColorBrush
OffsetRect
PackDDElParam
GetActiveWindow
RegisterClassW
RegisterClassA
GetClipboardData
EnumDisplayMonitors
GetCaretBlinkTime
DispatchMessageA
GetClipboardSequenceNumber
DefWindowProcA
PeekMessageA
GetScrollRange
comdlg32
ChooseFontW
PrintDlgA
PageSetupDlgA
FindTextW
comctl32
ImageList_Copy
CreateStatusWindowW
ImageList_LoadImage
ImageList_SetOverlayImage
InitMUILanguage
DrawStatusTextW
ImageList_Replace
MakeDragList
ImageList_AddIcon
ImageList_GetIconSize
ImageList_Write
InitCommonControlsEx
ImageList_GetImageInfo
CreateStatusWindowA
shell32
ExtractIconExW
advapi32
RegFlushKey
LookupAccountSidW
RegReplaceKeyW
CryptCreateHash
CryptSetProviderExW
RegDeleteKeyA
RegQueryInfoKeyW
RegOpenKeyA
RegQueryValueW
RegNotifyChangeKeyValue
InitiateSystemShutdownW
RegDeleteKeyW
LookupPrivilegeValueW
RegSetValueExW
CryptEncrypt
CryptEnumProvidersA
RevertToSelf
CryptReleaseContext
LookupPrivilegeNameA
CryptDestroyHash
RegQueryInfoKeyA
RegConnectRegistryA
CryptGetDefaultProviderW
kernel32
TerminateProcess
TlsAlloc
HeapDestroy
GetProcessHeaps
GetOEMCP
GetCurrentProcess
CompareStringW
FreeEnvironmentStringsW
LocalCompact
CreateMutexA
EnterCriticalSection
HeapCreate
GetProcAddress
GetModuleHandleW
GetEnvironmentStrings
OpenWaitableTimerA
SetStdHandle
GetCompressedFileSizeA
EnumSystemCodePagesW
GetTickCount
SetEnvironmentVariableA
FreeEnvironmentStringsA
DeleteFileA
CreateFileMappingW
GetProfileSectionW
GetStringTypeW
WritePrivateProfileSectionA
AddAtomA
TlsGetValue
GetCurrencyFormatW
GetPrivateProfileStructW
EnumDateFormatsW
ExitProcess
QueryPerformanceCounter
GetModuleFileNameA
HeapAlloc
GetLocalTime
MultiByteToWideChar
GetCurrentProcessId
TlsSetValue
GetSystemTimeAsFileTime
GetEnvironmentStringsW
OpenMutexA
HeapReAlloc
GetCurrentThread
GetSystemTime
CommConfigDialogW
InitializeCriticalSection
GetVersion
lstrcpyW
LCMapStringW
GetModuleHandleA
GetShortPathNameA
GetCommandLineA
GetStringTypeA
GetProcessHeap
GetStartupInfoA
ReadFile
DeleteCriticalSection
InterlockedDecrement
LeaveCriticalSection
lstrcpyA
GetACP
SetConsoleWindowInfo
SystemTimeToFileTime
GetStartupInfoW
CompareStringA
HeapFree
GetTimeZoneInformation
WideCharToMultiByte
IsBadWritePtr
SetLastError
EnumResourceTypesA
WaitCommEvent
ExitThread
CreateMailslotW
LocalFree
SetLocaleInfoW
SetFilePointer
GetExitCodeProcess
GetConsoleCP
RtlUnwind
LocalHandle
CloseHandle
lstrcmpi
VirtualAlloc
GetFileType
GetLastError
ReadConsoleInputW
GetComputerNameA
GetCurrentThreadId
LCMapStringA
LoadLibraryA
VirtualQuery
VirtualFree
GetStdHandle
TlsFree
FlushFileBuffers
GetCPInfo
InterlockedIncrement
InterlockedExchange
UnhandledExceptionFilter
FlushConsoleInputBuffer
GetUserDefaultLCID
SetHandleCount
WriteFile
Sections
.text Size: 124KB - Virtual size: 120KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 96KB - Virtual size: 93KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 92KB - Virtual size: 118KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ