Static task
static1
Behavioral task
behavioral1
Sample
dfea2d506eb1469b749227ed815e6c043543e0c1e36a4084bd68b00c1e296f4b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
dfea2d506eb1469b749227ed815e6c043543e0c1e36a4084bd68b00c1e296f4b.exe
Resource
win10v2004-20220812-en
General
-
Target
dfea2d506eb1469b749227ed815e6c043543e0c1e36a4084bd68b00c1e296f4b
-
Size
124KB
-
MD5
6b16b223d605a2ec41f60c320375f490
-
SHA1
6ad9653d48060ce48df026c2b77114b99eefd61d
-
SHA256
dfea2d506eb1469b749227ed815e6c043543e0c1e36a4084bd68b00c1e296f4b
-
SHA512
bcbbef78262910cb790b73f2366a2a2e37c819e2af3901253ca5caad7a0720be75c2ef04b53623687cdbbcff2b91baf73bac869f077584993e232828cfc29c11
-
SSDEEP
3072:FVMEnC+YsIIsVHyckMDIO/yBiXJNgZQx5:FVMtfs7sVHVZz/Kif
Malware Config
Signatures
Files
-
dfea2d506eb1469b749227ed815e6c043543e0c1e36a4084bd68b00c1e296f4b.exe windows x86
2af8cc4e8178222d07a85503b066539b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
IsRectEmpty
SetForegroundWindow
GetWindowDC
SetFocus
GetWindowInfo
kernel32
IsValidLocale
GlobalAlloc
WaitForSingleObject
FindFirstFileW
QueryPerformanceCounter
SetSystemTimeAdjustment
SetUnhandledExceptionFilter
GetFileAttributesW
GetModuleHandleA
GetCurrentProcessId
HeapAlloc
WideCharToMultiByte
ExpandEnvironmentStringsW
FreeLibrary
GetDriveTypeW
InterlockedIncrement
OpenEventW
DeleteFileW
GetStartupInfoA
SetCurrentDirectoryW
GetTickCount
GetModuleFileNameW
lstrcmpW
InterlockedExchange
CreateMutexW
CreateFileW
FindClose
LoadLibraryW
GetTempPathW
CloseHandle
GetPrivateProfileSectionW
GetProcAddress
GetCurrentProcess
GetProcessHeap
MultiByteToWideChar
DeviceIoControl
GetWindowsDirectoryW
GetVersionExA
GetPrivateProfileIntW
GetSystemDefaultUILanguage
GlobalFree
LocalAlloc
lstrcmpiW
GetCurrentDirectoryW
OpenMutexW
FormatMessageW
FatalExit
GetCurrentThreadId
GetDateFormatW
CreateDirectoryW
TerminateProcess
GetCommandLineW
LocalReAlloc
GetLogicalDriveStringsW
CopyFileW
CreateProcessW
ReleaseMutex
lstrlenA
GetSystemDirectoryW
WriteFile
GetDiskFreeSpaceExW
InterlockedDecrement
Sleep
FindNextFileW
GetPrivateProfileStringW
ReadFile
LoadLibraryA
GetSystemTimeAsFileTime
lstrlenW
GetTimeFormatW
HeapFree
SetFilePointer
RaiseException
GetVolumeInformationW
GetLastError
QueryDosDeviceW
UnhandledExceptionFilter
GetFullPathNameW
LocalFree
GetExitCodeProcess
SetLastError
oleaut32
VariantClear
SysStringLen
VariantCopyInd
SysAllocStringLen
msvcrt
difftime
_ismbcprint
_mbsnbset
comctl32
PropertySheetA
shlwapi
StrCmpLogicalW
PathIsRelativeW
PathIsNetworkPathA
shell32
ShellExecuteA
SHBrowseForFolderA
SHGetPathFromIDListA
Sections
.text Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata Size: 107KB - Virtual size: 119KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ