Static task
static1
Behavioral task
behavioral1
Sample
dbba55aa269f0f39d2fe2e7538e21cb1be4ed2afadbbbd5861d3a76cf8e14b2e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
dbba55aa269f0f39d2fe2e7538e21cb1be4ed2afadbbbd5861d3a76cf8e14b2e.exe
Resource
win10v2004-20220901-en
General
-
Target
dbba55aa269f0f39d2fe2e7538e21cb1be4ed2afadbbbd5861d3a76cf8e14b2e
-
Size
460KB
-
MD5
667b6dd3822fb9e049223464c2f6c070
-
SHA1
4a31237cf8d58b5061c381b87c1a7db7ad06cb13
-
SHA256
dbba55aa269f0f39d2fe2e7538e21cb1be4ed2afadbbbd5861d3a76cf8e14b2e
-
SHA512
7bd589ac4368704f41425947f44fa9850e0e0fb78ba9ab3d42b2ef0a86931e75f35d047042afe61560ee80d3b6006537bb66af0e695c5d69a048e7d0cfca39de
-
SSDEEP
6144:KTjPstQwITPFUHZkT1mKk2YasOhqnGYnCLzRwPTh9dT4o4Sy/2xh/:8EATqHZkcKk2YBO0kWPDdTyX2L
Malware Config
Signatures
Files
-
dbba55aa269f0f39d2fe2e7538e21cb1be4ed2afadbbbd5861d3a76cf8e14b2e.exe windows x86
b940cb73e079e8cc75ec1351db82a717
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetTimeZoneInformation
CreateFileA
CloseHandle
GetLocaleInfoW
GetUserDefaultLCID
EnumSystemLocalesA
IsValidCodePage
IsValidLocale
GetLocaleInfoA
GetDateFormatA
GetTimeFormatA
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
CompareStringA
WriteConsoleA
InterlockedExchange
GetCPInfo
GetOEMCP
GetACP
VirtualAlloc
HeapReAlloc
InitializeCriticalSection
GetConsoleMode
GetConsoleCP
FlushFileBuffers
SetStdHandle
RtlUnwind
LoadLibraryW
SetConsoleCtrlHandler
OutputDebugStringW
CompareStringW
GetSystemInfo
lstrcpyW
GetModuleHandleA
GetProcAddress
CreateMutexW
GetLastError
GetConsoleOutputCP
GetModuleHandleW
GetCommandLineA
HeapFree
GetVersionExA
HeapAlloc
GetProcessHeap
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RaiseException
DebugBreak
WideCharToMultiByte
MultiByteToWideChar
lstrlenA
LoadLibraryA
EnterCriticalSection
LeaveCriticalSection
GetModuleFileNameW
SetFilePointer
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
HeapValidate
IsBadReadPtr
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
FatalAppExitA
InterlockedIncrement
InterlockedDecrement
ExitProcess
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThread
HeapDestroy
HeapCreate
VirtualFree
WriteFile
VirtualQuery
FreeLibrary
OutputDebugStringA
WriteConsoleW
SetEnvironmentVariableA
user32
wsprintfW
GetForegroundWindow
GetClassNameW
GetWindowThreadProcessId
FindWindowA
SetWindowTextW
SetWindowPos
SetForegroundWindow
SetFocus
GetCursorPos
GetWindowRect
DefWindowProcW
GetDC
SetWindowRgn
ReleaseDC
GetWindowTextA
wsprintfA
SetWindowTextA
LoadImageA
CreateWindowExA
MoveWindow
SendMessageW
SendMessageA
CreateWindowExW
SetTimer
ShowWindow
UpdateWindow
LoadIconW
LoadCursorW
RegisterClassExW
GetMessageW
TranslateMessage
DispatchMessageW
gdi32
GetDeviceCaps
CreateRoundRectRgn
CreateCompatibleDC
SelectObject
BitBlt
DeleteDC
CreateFontIndirectW
CreateFontIndirectA
GetObjectW
Sections
N+L8^[Po Size: - Virtual size: 173KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
xUZZkfE_ Size: 368KB - Virtual size: 367KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
lJ$;pp08 Size: 68KB - Virtual size: 64KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
?[`mn4gv Size: 8KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ou+;BZ7! Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
d*xlM/rR Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ