Static task
static1
Behavioral task
behavioral1
Sample
542021936d68fd14bd868845205fe652011c390af1e86b86b4117e6439687d3d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
542021936d68fd14bd868845205fe652011c390af1e86b86b4117e6439687d3d.exe
Resource
win10v2004-20220812-en
General
-
Target
542021936d68fd14bd868845205fe652011c390af1e86b86b4117e6439687d3d
-
Size
216KB
-
MD5
772244c26c27e43087bc53f89ca70bb0
-
SHA1
952284125cadb2f4bc31e43f2ea14bec8c14da76
-
SHA256
542021936d68fd14bd868845205fe652011c390af1e86b86b4117e6439687d3d
-
SHA512
67c1d1841e96cc420daa49040541212704d62c89766957ac338c118219ca07418433dbf3779a0b800e260db994a3304880f31fd9346f071c3264b0d12e326372
-
SSDEEP
3072:ayPrmjY+uoFk7umh3ZOmNqr+3b1KlfwUGYXLzNo8qq56+BZGD2Nt23:1oFuD58KbAbX9oRqnC2Nt23
Malware Config
Signatures
Files
-
542021936d68fd14bd868845205fe652011c390af1e86b86b4117e6439687d3d.exe windows x86
4243935e52a86cd140939b74a8d8d21e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetDlgItem
CharUpperBuffA
ShowScrollBar
GetScrollRange
ExitWindowsEx
LoadImageA
EnumChildWindows
DdeDisconnect
TileWindows
EnumPropsExA
GetSubMenu
DrawTextW
UpdateWindow
urlmon
CoInternetParseUrl
URLDownloadToFileA
FindMediaTypeClass
shell32
DragAcceptFiles
DragFinish
ShellExecuteW
DragQueryPoint
FindExecutableW
ExtractIconExW
ShellExecuteA
Shell_NotifyIconA
ole32
OleSave
CoInitializeSecurity
CoImpersonateClient
StgSetTimes
CoDosDateTimeToFileTime
SetConvertStg
CoGetClassObject
wininet
FindFirstUrlCacheEntryW
InternetLockRequestFile
CreateUrlCacheEntryW
InternetOpenA
InternetConnectW
GopherOpenFileA
SetUrlCacheEntryGroup
gdi32
CreateDIBPatternBrushPt
CombineRgn
CopyEnhMetaFileA
ColorCorrectPalette
BeginPath
opengl32
glTexGeni
glNormal3s
glRasterPos2dv
glEvalCoord2f
glPushMatrix
glIndexsv
glColor3iv
dbghelp
StackWalk64
SymUnloadModule64
UnmapDebugInformation
FindFileInPath
ImageDirectoryEntryToDataEx
SymGetLineFromName64
crypt32
CertEnumSystemStore
CryptQueryObject
CryptSignMessageWithKey
CryptMsgOpenToDecode
CryptSetOIDFunctionValue
CertStrToNameA
CryptMsgSignCTL
mpr
WNetAddConnectionW
WNetDisconnectDialog
WNetAddConnection2A
WNetCancelConnection2A
WNetCancelConnectionA
WNetOpenEnumA
WNetGetResourceParentW
kernel32
HeapReAlloc
HeapAlloc
RtlUnwind
LCMapStringW
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
HeapCreate
GetFileType
SetHandleCount
GetEnvironmentStringsW
WideCharToMultiByte
FreeEnvironmentStringsW
GetModuleFileNameW
GetStdHandle
WriteFile
ExitProcess
MultiByteToWideChar
GetStringTypeW
GetConsoleMode
EnumSystemLocalesA
GetLocaleInfoA
GetLocaleInfoW
GetUserDefaultLCID
Sleep
IsValidCodePage
GetOEMCP
LoadLibraryW
ReadFile
GetModuleFileNameA
GetConsoleCP
GetACP
HeapFree
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
GetProcAddress
GetLastError
GetCurrentThreadId
SetLastError
GetModuleHandleW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
FlushFileBuffers
HeapSize
SetFilePointer
SetStdHandle
WriteConsoleW
CreateFileW
IsValidLocale
SetEvent
GetCurrentProcess
TerminateProcess
DecodePointer
EncodePointer
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCPInfo
CreateThread
CreateEventA
CloseHandle
CreateWaitableTimerA
SetConsoleTitleW
GetStringTypeA
OpenMutexW
EnumCalendarInfoExA
SearchPathW
InterlockedDecrement
InterlockedIncrement
GetSystemTimeAsFileTime
GetCommandLineA
HeapSetInformation
GetStartupInfoW
IsProcessorFeaturePresent
EnterCriticalSection
LeaveCriticalSection
Sections
.text Size: 59KB - Virtual size: 59KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 4.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 134KB - Virtual size: 133KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ