Static task
static1
Behavioral task
behavioral1
Sample
d5016549f4e9854666b89e28a4bc2f25a877b41a889499fe564111e1259a28f2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d5016549f4e9854666b89e28a4bc2f25a877b41a889499fe564111e1259a28f2.exe
Resource
win10v2004-20220812-en
General
-
Target
d5016549f4e9854666b89e28a4bc2f25a877b41a889499fe564111e1259a28f2
-
Size
4.1MB
-
MD5
f19f5e17726c447ac963c89738cb4eac
-
SHA1
5df8edb7a23899747646b806e81b34255a151e25
-
SHA256
d5016549f4e9854666b89e28a4bc2f25a877b41a889499fe564111e1259a28f2
-
SHA512
e3c32f645689b85efe4ffd7a22147f186f2ce67bcf6dac68a5c143a9e0446d0549e665a017776c9b8fa543a711c536f982de6deeca5fdb1233dac1567d21f875
-
SSDEEP
24576:1djz4JAJaE1cTOCbXcyEes0rTA1wEH7H2WBXQMURIn:1DCjcyThTA1ZbDB1U
Malware Config
Signatures
Files
-
d5016549f4e9854666b89e28a4bc2f25a877b41a889499fe564111e1259a28f2.exe windows x86
4792371ad2c0f693cec966fdab65c8c5
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetThreadLocale
GlobalFlags
GetCPInfo
GetOEMCP
SetFilePointer
FlushFileBuffers
LockFile
UnlockFile
SetEndOfFile
DuplicateHandle
GetCurrentProcess
GetVolumeInformationA
SetErrorMode
GetFileSizeEx
HeapAlloc
HeapFree
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapReAlloc
GetCommandLineA
GetStartupInfoA
ExitThread
GetSystemTimeAsFileTime
RtlUnwind
RaiseException
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
TlsFree
HeapSize
GetACP
IsValidCodePage
LCMapStringA
LCMapStringW
VirtualFree
HeapCreate
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetConsoleCP
GetConsoleMode
InitializeCriticalSectionAndSpinCount
GetStringTypeA
GetStringTypeW
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetProcessHeap
CompareStringW
SetEnvironmentVariableA
LocalReAlloc
TlsSetValue
TlsAlloc
GlobalHandle
GlobalReAlloc
TlsGetValue
LocalAlloc
InterlockedIncrement
GetModuleHandleW
WritePrivateProfileStringA
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
InterlockedExchange
lstrcmpA
InterlockedDecrement
GetModuleFileNameW
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
CompareStringA
lstrcmpW
GetCurrentProcessId
FreeResource
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageA
LocalFree
MulDiv
CreateFileW
SetThreadPriority
ResumeThread
QueryPerformanceCounter
DeleteCriticalSection
FileTimeToLocalFileTime
FileTimeToSystemTime
GetTimeZoneInformation
InitializeCriticalSection
QueryPerformanceFrequency
GetSystemTime
CreateEventA
ResetEvent
LeaveCriticalSection
EnterCriticalSection
TerminateProcess
OpenProcess
Process32Next
Process32First
CreateToolhelp32Snapshot
CreateThread
GetModuleFileNameA
GetModuleHandleA
GetLastError
SetLastError
GetVersion
WinExec
lstrlenA
lstrcatA
lstrcpyA
GetWindowsDirectoryA
GetTickCount
GetVersionExA
GetProcAddress
LoadLibraryA
FreeLibrary
DeviceIoControl
FindClose
FindFirstFileA
MultiByteToWideChar
SetFilePointerEx
ReadFile
GetFileSize
GetFileTime
GetFileAttributesA
WaitForSingleObject
SetVolumeMountPointA
GetVolumeNameForVolumeMountPointA
DefineDosDeviceA
GetLogicalDrives
GetDriveTypeA
GetLogicalDriveStringsA
Sleep
CopyFileA
GetFullPathNameA
WriteFile
CloseHandle
CreateFileA
FindResourceA
LoadResource
LockResource
SizeofResource
ExitProcess
WideCharToMultiByte
user32
GetNextDlgGroupItem
CharUpperA
RegisterClipboardFormatA
PostThreadMessageA
UnregisterClassA
GetSysColorBrush
SetWindowContextHelpId
MapDialogRect
PostQuitMessage
DestroyMenu
WindowFromPoint
GetMessageA
TranslateMessage
GetCursorPos
ValidateRect
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
CheckMenuItem
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
RegisterWindowMessageA
SendDlgItemMessageA
WinHelpA
IsChild
GetCapture
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassNameA
SetPropA
GetPropA
RemovePropA
GetFocus
SetFocus
GetWindowTextLengthA
GetWindowTextA
GetForegroundWindow
DispatchMessageA
UnhookWindowsHookEx
InvalidateRgn
GetMessagePos
PeekMessageA
MapWindowPoints
TrackPopupMenu
GetKeyState
SetMenu
SetForegroundWindow
IsWindowVisible
UpdateWindow
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
EqualRect
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
GetMenu
SetWindowPos
IntersectRect
SystemParametersInfoA
GetWindowPlacement
GetWindow
GetWindowThreadProcessId
GetLastActivePopup
MessageBoxA
EndPaint
BeginPaint
GetWindowDC
ScreenToClient
GrayStringA
DrawTextExA
EnableWindow
SendMessageA
LoadBitmapA
GetClientRect
TabbedTextOutA
GetDesktopWindow
GetActiveWindow
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
GetWindowLongA
GetDlgItem
IsWindowEnabled
GetNextDlgTabItem
EndDialog
GetMenuState
GetMenuStringA
IsRectEmpty
CopyAcceleratorTableA
CharNextA
SetRect
KillTimer
GetMessageTime
PtInRect
InvalidateRect
PostMessageA
FillRect
OffsetRect
GetSysColor
MessageBeep
ReleaseCapture
RedrawWindow
SetCapture
SetCursor
SetWindowLongA
IsWindow
GetWindowRect
GetParent
GetDC
ReleaseDC
InflateRect
LoadCursorA
CopyIcon
DrawTextA
LoadMenuA
CopyRect
DrawStateA
GetMenuItemCount
GetMenuItemID
ModifyMenuA
GetSubMenu
SetWindowRgn
LoadIconA
GetSystemMenu
AppendMenuA
IsIconic
GetSystemMetrics
DrawIcon
ClientToScreen
SetTimer
EnableMenuItem
GetTopWindow
gdi32
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
ExtSelectClipRgn
CreateBitmap
OffsetViewportOrgEx
CreateRectRgnIndirect
GetMapMode
GetBkColor
GetTextColor
GetRgnBox
Escape
SetViewportOrgEx
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetWindowExtEx
GetViewportExtEx
CreateCompatibleDC
MoveToEx
LineTo
GetClipBox
SetMapMode
SetTextColor
SetBkMode
SetBkColor
RestoreDC
SaveDC
GetDeviceCaps
DeleteDC
CreateDIBSection
CreateRoundRectRgn
Rectangle
DeleteObject
CreatePen
GetTextExtentPoint32A
GetObjectA
GetStockObject
GetTextMetricsA
CreateFontA
SelectObject
CreateFontIndirectA
CreateSolidBrush
BitBlt
comdlg32
GetFileTitleA
winspool.drv
DocumentPropertiesA
ClosePrinter
OpenPrinterA
advapi32
RegSetValueExA
RegOpenKeyA
RegEnumKeyA
RegDeleteKeyA
RegOpenKeyExA
RegCreateKeyExA
RegQueryValueA
RegEnumKeyExA
RegCloseKey
RegQueryValueExA
shell32
ShellExecuteA
comctl32
InitCommonControlsEx
shlwapi
PathFindFileNameA
PathRemoveFileSpecW
PathStripToRootA
PathAppendA
PathFindExtensionA
PathIsUNCA
oledlg
ord8
ole32
CoRevokeClassObject
OleInitialize
CoFreeUnusedLibraries
OleUninitialize
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoGetClassObject
CoInitializeEx
CoCreateInstance
OleIsCurrentClipboard
CLSIDFromString
CLSIDFromProgID
CoTaskMemAlloc
CoTaskMemFree
OleFlushClipboard
CoRegisterMessageFilter
CoUninitialize
oleaut32
SysStringLen
SysFreeString
SysAllocStringByteLen
VariantClear
VariantChangeType
VariantInit
SysAllocStringLen
VariantCopy
SafeArrayDestroy
VariantTimeToSystemTime
SystemTimeToVariantTime
OleCreateFontIndirect
SysAllocString
Sections
.text Size: 402KB - Virtual size: 401KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 107KB - Virtual size: 106KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 15KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3.5MB - Virtual size: 3.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 52KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ