Static task
static1
Behavioral task
behavioral1
Sample
d523963e82ea28e07100231b4d9a20932dac10d13d84d9d0ee6817fb0cf40473.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d523963e82ea28e07100231b4d9a20932dac10d13d84d9d0ee6817fb0cf40473.exe
Resource
win10v2004-20220812-en
General
-
Target
d523963e82ea28e07100231b4d9a20932dac10d13d84d9d0ee6817fb0cf40473
-
Size
295KB
-
MD5
857cf011d27c9262f3c6e14a9923f1f6
-
SHA1
d8504f9f9943ad3803fdab9f93f13376662ee074
-
SHA256
d523963e82ea28e07100231b4d9a20932dac10d13d84d9d0ee6817fb0cf40473
-
SHA512
b7636a46c4426631a64a52a05af112704a3e0f1b8099112cb2c0d6eb65f35b38825a9c2472ab5bbe277884ab1653cadbb3876948e5b6bd55b0e29beb045299d4
-
SSDEEP
6144:XL6+cmUL3gKpxIHmg27F5O84oEBjg23dTg9uwRsa:XL6+ly3xIj27FV4bRMya
Malware Config
Signatures
Files
-
d523963e82ea28e07100231b4d9a20932dac10d13d84d9d0ee6817fb0cf40473.exe windows x86
39fd9c4ede4cf67364b61bd6ee17355a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetExitCodeProcess
GetLastError
CreatePipe
ReadFile
PeekNamedPipe
WaitForSingleObject
GlobalFree
GlobalUnlock
GlobalHandle
GetCommandLineW
GetCommandLineA
LoadLibraryW
GetModuleHandleW
GetVersionExA
GetCurrentProcess
GetCurrentThread
GetProcAddress
FindClose
FindNextFileA
FindFirstFileA
GetModuleFileNameA
CreateThread
GetEnvironmentVariableA
SetEndOfFile
SetFilePointer
UnmapViewOfFile
CreateProcessA
GetStdHandle
GetFileSize
CreateFileA
lstrcatA
GetWindowsDirectoryA
GetShortPathNameA
CreateDirectoryA
DeleteFileA
SleepEx
GetTempFileNameA
GetFileAttributesA
GetTempPathA
GetDiskFreeSpaceA
WideCharToMultiByte
SetEnvironmentVariableA
GetDriveTypeA
GetLogicalDriveStringsA
RemoveDirectoryA
SetFileAttributesA
GetTickCount
ResumeThread
SetPriorityClass
SetThreadPriority
MoveFileExA
LocalFree
FormatMessageA
Sleep
CreateFileMappingA
MapViewOfFile
SetConsoleCtrlHandler
GetModuleHandleA
SetCurrentDirectoryA
GetOEMCP
GetACP
GetStringTypeW
GetStringTypeA
GetUserDefaultLCID
EnumSystemLocalesA
GetLocaleInfoA
IsValidCodePage
IsValidLocale
GetCPInfo
SetStdHandle
IsBadCodePtr
IsBadReadPtr
IsBadWritePtr
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
LoadLibraryA
GetTimeZoneInformation
GetStartupInfoA
CloseHandle
GetVersion
FreeEnvironmentStringsA
UnhandledExceptionFilter
FreeEnvironmentStringsW
LCMapStringA
MultiByteToWideChar
LCMapStringW
HeapReAlloc
TerminateProcess
HeapSize
SetHandleCount
WriteFile
GetFileType
SetUnhandledExceptionFilter
FatalAppExitA
FlushFileBuffers
EnterCriticalSection
DeleteCriticalSection
CompareStringW
CompareStringA
GetLocaleInfoW
RtlUnwind
RaiseException
InterlockedDecrement
InterlockedIncrement
GetCurrentDirectoryA
GetEnvironmentStrings
GetEnvironmentStringsW
TlsSetValue
LeaveCriticalSection
ExitProcess
HeapAlloc
HeapFree
GetCurrentThreadId
TlsAlloc
TlsFree
SetLastError
TlsGetValue
InitializeCriticalSection
user32
DispatchMessageW
ExitWindowsEx
DispatchMessageA
TranslateMessage
GetWindowRect
LoadStringA
wsprintfA
MoveWindow
GetParent
GetSystemMetrics
DestroyWindow
DefWindowProcA
DefWindowProcW
CreateWindowExA
UpdateWindow
LoadIconA
LoadCursorA
RegisterClassExA
KillTimer
PostMessageA
SetWindowTextA
GetWindowTextA
MessageBoxA
IsWindowVisible
EnableWindow
SetTimer
ShowWindow
GetDlgItem
SendMessageA
SetDlgItemTextA
GetMessageA
GetMessageW
IsDialogMessageA
CreateDialogParamA
PostQuitMessage
IsWindow
advapi32
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
shell32
SHGetMalloc
SHBrowseForFolderA
SHGetPathFromIDListA
CommandLineToArgvW
ole32
CoInitialize
CoUninitialize
Sections
.text Size: 132KB - Virtual size: 129KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 116KB - Virtual size: 115KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ