Static task
static1
Behavioral task
behavioral1
Sample
af632b344e9866b248c05d5070cd644c484665f0fad522eff7bec184130bbd29.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
af632b344e9866b248c05d5070cd644c484665f0fad522eff7bec184130bbd29.exe
Resource
win10v2004-20220812-en
General
-
Target
af632b344e9866b248c05d5070cd644c484665f0fad522eff7bec184130bbd29
-
Size
207KB
-
MD5
40ebac063954279ed279158e867ad53b
-
SHA1
8c9f95d07fda659267b31c6074194fa1018a861f
-
SHA256
af632b344e9866b248c05d5070cd644c484665f0fad522eff7bec184130bbd29
-
SHA512
f344fd6b87bdaaebda68097bf434e446f4c04150936aaa5e1d44cc39b5a4f8885845874ccf9ef244e6d8f8073b0da58f19d9f473fe238b6b9931b8014904894d
-
SSDEEP
6144:6x6FU1ciicpoXuhJG8Doek8T8IBnsEUVvc:64K65cPhJxDYw8ksEUNc
Malware Config
Signatures
Files
-
af632b344e9866b248c05d5070cd644c484665f0fad522eff7bec184130bbd29.exe windows x86
ff25993db4e48d85fc5d18295f3c96fd
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetThreadPriority
HeapFree
GetLocaleInfoA
SetEndOfFile
lstrcmpiW
IsBadWritePtr
CloseHandle
MultiByteToWideChar
ReadFile
InterlockedExchange
GetPrivateProfileStringW
GetFileAttributesW
GetFullPathNameW
CreateEventW
lstrcpyA
GetCurrentProcess
SetThreadPriority
GlobalUnlock
SetEvent
lstrlenW
HeapAlloc
lstrcpyW
SetLastError
lstrcmpW
GlobalHandle
GetFileSize
InterlockedIncrement
WaitForMultipleObjects
IsBadReadPtr
WideCharToMultiByte
QueryPerformanceCounter
GlobalFindAtomA
VirtualFree
GetLastError
GetCurrentProcessId
WaitForSingleObject
InitializeCriticalSection
ReleaseSemaphore
GetSystemTimeAsFileTime
GetProcessHeap
DeleteCriticalSection
lstrcpynW
LoadLibraryW
CreateFileW
GetQueuedCompletionStatus
FreeLibrary
EnterCriticalSection
GetDiskFreeSpaceW
SetUnhandledExceptionFilter
GetACP
GetVersionExW
GlobalFree
GlobalLock
GetCurrentThread
CreateSemaphoreW
GlobalAlloc
IsBadCodePtr
ResetEvent
InterlockedDecrement
WriteFile
SetFilePointer
LeaveCriticalSection
MulDiv
GetProfileIntA
lstrlenA
GetProcAddress
GlobalMemoryStatus
GetTickCount
GetModuleFileNameA
CreateThread
oleaut32
VarBstrFromI2
VarBstrFromUI4
VarBstrFromUI8
VarBstrFromUI1
VarBstrFromDec
VarBstrFromDisp
VarBstrFromI8
VarBstrFromR8
VarBstrFromI1
VarBstrFromDate
VarBstrFromR4
VarBstrFromUI2
VarBstrFromCy
VarBstrFromI4
user32
IsWindow
IsRectEmpty
SendMessageW
EnableWindow
GetWindowLongW
ShowWindow
SetDlgItemTextW
ClientToScreen
GetDlgItem
DestroyWindow
LoadCursorW
CheckRadioButton
TranslateMessage
SetDlgItemInt
IsWindowVisible
CheckDlgButton
GetDC
GetAsyncKeyState
LoadStringW
DispatchMessageW
InvalidateRect
GetClientRect
ReleaseDC
CreateDialogParamW
GetDesktopWindow
SetWindowLongW
GetDlgItemInt
SetCursor
GetWindowRect
MoveWindow
DefWindowProcW
PeekMessageW
msls31
LssbGetNumberDnodesInSubline
LssbGetVisibleDcpInSubline
LssbGetDurTrailWithPensInSubline
LssbGetObjDimSubline
LsCompressSubline
LssbGetPlsrunsFromSubline
Sections
.text Size: 82KB - Virtual size: 81KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 117KB - Virtual size: 116KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 6.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ