Static task
static1
Behavioral task
behavioral1
Sample
84c2444714acfc361fd81546b529d847a69a4fcac735ea7c663778966677d79a.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
84c2444714acfc361fd81546b529d847a69a4fcac735ea7c663778966677d79a.exe
Resource
win10v2004-20220901-en
General
-
Target
84c2444714acfc361fd81546b529d847a69a4fcac735ea7c663778966677d79a
-
Size
228KB
-
MD5
13ddc13257824f83a3527b60fd3ebed0
-
SHA1
fe682aaf36beb18f6fee2ab43726db0108b6d805
-
SHA256
84c2444714acfc361fd81546b529d847a69a4fcac735ea7c663778966677d79a
-
SHA512
48ff6016b74fc622326cb094da9fe3f9cebd2ab574edecaca8123835a0ff295c13bcc4651c2801b4b9a20a19f708cab78d7de3e8ac33e22cb63b2fa4f7812886
-
SSDEEP
6144:8Vv+hZshqM4GMx2DNKqeg1nHgC4l2DjbulRwS/HVLR:8Vv+hZshqMy08qD1Hc4j0uwR
Malware Config
Signatures
Files
-
84c2444714acfc361fd81546b529d847a69a4fcac735ea7c663778966677d79a.exe windows x86
cc89d383b28280a22fe7afbe6d5fc252
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
PostMessageA
GetCapture
DlgDirListA
IsWindowEnabled
CreateCaret
OpenInputDesktop
GetUserObjectInformationW
SetDlgItemTextA
GetCursorPos
AppendMenuA
GetUpdateRgn
TileWindows
GetQueueStatus
EnumDesktopsW
ReleaseCapture
ChangeClipboardChain
SetWindowContextHelpId
GetNextDlgTabItem
PaintDesktop
GetWindowContextHelpId
ShowWindowAsync
GetKeyboardLayoutNameW
SetWinEventHook
GetWindowPlacement
GetDC
shell32
ord526
ord13
gdi32
GetDIBits
GetEnhMetaFilePaletteEntries
PaintRgn
GetStretchBltMode
SetTextJustification
GetNearestColor
GetArcDirection
SetRectRgn
EnumObjects
GetICMProfileW
CloseFigure
SetStretchBltMode
ModifyWorldTransform
GetICMProfileA
SetDCBrushColor
EndPath
SetPixel
GetDeviceCaps
GetDeviceGammaRamp
DeleteEnhMetaFile
WidenPath
Escape
ExtSelectClipRgn
shlwapi
ChrCmpIA
GetMenuPosFromID
ColorHLSToRGB
SHIsLowMemoryMachine
SHSetThreadRef
kernel32
HeapReAlloc
VirtualAlloc
RtlUnwind
HeapAlloc
GetOEMCP
UnhandledExceptionFilter
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
TerminateProcess
VirtualProtect
GetSystemInfo
VirtualQuery
Sleep
ReadFileScatter
GetACP
GetCPInfo
InitializeCriticalSection
LoadLibraryExA
ClearCommError
SetHandleInformation
GetProcessHandleCount
FlushFileBuffers
GlobalCompact
GetCurrentProcess
ReleaseMutex
PrepareTape
CreateJobSet
FreeResource
GetNamedPipeHandleStateA
GetLastError
SetHandleCount
GetStdHandle
LockFileEx
SetProcessPriorityBoost
GetCommandLineA
GetVersionExA
GetStartupInfoA
SetUnhandledExceptionFilter
GetProcAddress
GetModuleHandleA
ExitProcess
WriteFile
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
GetFileType
DeleteCriticalSection
GetModuleHandleW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
InterlockedDecrement
GetCurrentThreadId
HeapDestroy
HeapCreate
VirtualFree
HeapFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LeaveCriticalSection
EnterCriticalSection
OutputDebugStringA
Sections
.text Size: 37KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 28KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 153KB - Virtual size: 152KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ