Static task
static1
Behavioral task
behavioral1
Sample
23c0a4fd653746a823bb888fec5b3f8187a1a6d88794bb5d5bf6d90fff80da8c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
23c0a4fd653746a823bb888fec5b3f8187a1a6d88794bb5d5bf6d90fff80da8c.exe
Resource
win10v2004-20220812-en
General
-
Target
23c0a4fd653746a823bb888fec5b3f8187a1a6d88794bb5d5bf6d90fff80da8c
-
Size
110KB
-
MD5
701f0fee23e34509f9ecd05093cdfb5e
-
SHA1
7bc65c06ca69f90ed21cdad3c0689f65aa1f22bc
-
SHA256
23c0a4fd653746a823bb888fec5b3f8187a1a6d88794bb5d5bf6d90fff80da8c
-
SHA512
e85a1debad35b9687841804a536de9e74593fd1c9875533991950eb6b0b49806aa578f56a64ca790aca2c4e275445d21e3ab04153f3efd73c77a8a0a2f4b232f
-
SSDEEP
1536:KzKXqyGTQQ626oSUJO6FiBD7cResPlhHOluZ/3oR//SiPY1OzZhJgdBJ5av/m:U5yG0dKQPV7cTPlZOlsSxPGdBJY3m
Malware Config
Signatures
Files
-
23c0a4fd653746a823bb888fec5b3f8187a1a6d88794bb5d5bf6d90fff80da8c.exe windows x86
277705eeabc438018c7ae6af603c7b5d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
oleaut32
VarBstrFromI8
VarBstrFromDisp
VarBstrFromI4
VarBstrFromUI1
VarBstrFromUI2
VarBstrFromR4
VarBstrFromDec
VarBstrFromDate
VarBstrFromUI4
VarBstrFromCy
VarBstrFromI2
VarBstrFromI1
VarBstrFromUI8
VarBstrFromR8
user32
GetClientRect
ShowWindow
InvalidateRect
DefWindowProcW
LoadStringW
SetDlgItemInt
TranslateMessage
GetWindowRect
GetDlgItem
LoadCursorW
CheckRadioButton
GetAsyncKeyState
GetDlgItemInt
CreateDialogParamW
DestroyWindow
IsWindowVisible
SetDlgItemTextW
SetCursor
ReleaseDC
DispatchMessageW
GetDesktopWindow
IsWindow
ClientToScreen
SetWindowLongW
GetDC
IsRectEmpty
EnableWindow
CheckDlgButton
GetWindowLongW
MoveWindow
SendMessageW
PeekMessageW
msls31
LssbGetObjDimSubline
LssbGetNumberDnodesInSubline
LssbGetDurTrailWithPensInSubline
LssbGetVisibleDcpInSubline
LsCompressSubline
LssbGetPlsrunsFromSubline
kernel32
GlobalUnlock
lstrcpyA
lstrcpyW
MulDiv
ReleaseSemaphore
LoadLibraryW
GetCurrentProcess
GetFileAttributesW
GlobalLock
GlobalAlloc
InterlockedExchange
IsBadReadPtr
GetCurrentThread
lstrcpynW
WaitForSingleObject
CreateEventW
WriteFile
InterlockedIncrement
GetDiskFreeSpaceW
GetVersionExW
GetThreadPriority
SetEndOfFile
IsBadWritePtr
LeaveCriticalSection
GlobalHandle
FreeLibrary
GetLastError
SetThreadPriority
HeapFree
ReadFile
VirtualFree
CreateSemaphoreW
GetQueuedCompletionStatus
GetCurrentProcessId
WideCharToMultiByte
QueryPerformanceCounter
CreateThread
DeleteFileW
InterlockedDecrement
GetProcessHeap
GetFileSize
EnterCriticalSection
GlobalMemoryStatus
lstrcmpiW
SetEvent
GetPrivateProfileStringW
HeapAlloc
CloseHandle
WaitForMultipleObjects
lstrlenW
GetProfileIntA
GetSystemInfo
SetFilePointer
lstrlenA
GetModuleFileNameA
GlobalFree
GetTimeZoneInformation
IsBadCodePtr
lstrcmpW
InitializeCriticalSection
DeleteCriticalSection
GetSystemTimeAsFileTime
ResetEvent
MultiByteToWideChar
GetModuleHandleA
CreateFileW
SetUnhandledExceptionFilter
GetTickCount
GetFullPathNameW
GetEnvironmentStringsW
nddeapi
NDdeGetTrustedShareA
NDdeIsValidAppTopicListW
NDdeGetShareSecurityW
NDdeGetTrustedShareW
NDdeGetErrorStringA
NDdeIsValidAppTopicListA
msltus40
DllUnregisterServer
DllRegisterServer
cewmdm
DllRegisterServer
DllGetClassObject
DllCanUnloadNow
DllUnregisterServer
msoeacct
HrCreateAccountManager
DllCanUnloadNow
ValidEmailAddress
DllGetClassObject
GetDllMajorVersion
msnetobj
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
msoert2
AppendTempFileList
Sections
.text Size: 55KB - Virtual size: 54KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 25KB - Virtual size: 125KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 25KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ