Static task
static1
Behavioral task
behavioral1
Sample
dba6055834561d3cea2746fced2a528279fe983342bdba56cd665f7c13836ec8.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
dba6055834561d3cea2746fced2a528279fe983342bdba56cd665f7c13836ec8.exe
Resource
win10v2004-20220812-en
General
-
Target
dba6055834561d3cea2746fced2a528279fe983342bdba56cd665f7c13836ec8
-
Size
304KB
-
MD5
643f88771acd72910bb321bcffa54a60
-
SHA1
cfe4587827e0fc0ade7678cade0a9f7c4e407e0b
-
SHA256
dba6055834561d3cea2746fced2a528279fe983342bdba56cd665f7c13836ec8
-
SHA512
2f32adaaf6225beaf310768d0efda07bc4cd7062dc57790f20eac78c558279d88f2fd5801c173bbf558855ddbc56a1b156d66acfa286c96ad6d357183bbc6b17
-
SSDEEP
6144:nhvY6dCBSGaQonb6txSPNbhvj7KvXhsY33BRjxL81iEg8SpB:n26dhIomtibrufh1nxiK8Y
Malware Config
Signatures
Files
-
dba6055834561d3cea2746fced2a528279fe983342bdba56cd665f7c13836ec8.exe windows x86
e3870aa28324c6ac5ffc2d7613330bcd
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualQuery
HeapCreate
GetCurrentProcess
EnterCriticalSection
GetTimeZoneInformation
GetExitCodeThread
GetCurrentProcessId
HeapFree
TerminateProcess
FindClose
VirtualProtect
CompareStringW
GetStringTypeA
GetCPInfo
GetSystemTimeAsFileTime
FlushFileBuffers
CreateFileW
GetTimeFormatA
VirtualAlloc
GetACP
WriteFile
HeapAlloc
LCMapStringW
GetLocalTime
IsBadWritePtr
GetTickCount
GetModuleFileNameA
GetOEMCP
GetThreadPriority
InterlockedExchange
LocalFileTimeToFileTime
GetEnvironmentStringsW
lstrlenW
HeapDestroy
RaiseException
GlobalUnlock
HeapReAlloc
GetVersionExA
ReadFile
GetFileAttributesA
WideCharToMultiByte
GetLocaleInfoW
GetSystemInfo
GetShortPathNameA
DeleteCriticalSection
GlobalLock
ExitProcess
LeaveCriticalSection
VirtualFree
SetUnhandledExceptionFilter
InitializeCriticalSection
MulDiv
GetProcAddress
CloseHandle
GetDateFormatA
GetLocaleInfoA
TlsAlloc
RtlUnwind
lstrcpyA
GetCommandLineA
MultiByteToWideChar
SetEnvironmentVariableA
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetStdHandle
TlsFree
LCMapStringA
SetHandleCount
SetStdHandle
GetLastError
HeapSize
GetFileType
CreateMutexA
TlsSetValue
SetLastError
SetFilePointer
LoadLibraryA
GetCurrentThreadId
TlsGetValue
GetStartupInfoA
GetEnvironmentStrings
GetStringTypeW
QueryPerformanceCounter
CompareStringA
FreeEnvironmentStringsW
IsBadCodePtr
GetModuleHandleA
gdi32
GetTextColor
SaveDC
TextOutA
MoveToEx
GetNearestPaletteIndex
GetNearestColor
CreatePolygonRgn
GetROP2
CombineRgn
CreateFontA
CreateCompatibleDC
CreateRectRgn
SetViewportOrgEx
CreatePalette
GetTextExtentPoint32A
StartDocA
GetViewportOrgEx
RestoreDC
Arc
CopyMetaFileA
CreateEllipticRgn
SetWindowExtEx
StretchDIBits
GetCurrentPositionEx
CreateHatchBrush
EnumFontFamiliesExA
SelectClipRgn
SetBkColor
GetBkMode
IntersectClipRect
ExtCreateRegion
FloodFill
GetCharWidthA
GetPixel
SetTextCharacterExtra
RoundRect
GetStockObject
ExtFloodFill
comdlg32
GetOpenFileNameA
GetFileTitleA
comctl32
ImageList_Draw
InitCommonControlsEx
ImageList_ReplaceIcon
ord17
_TrackMouseEvent
mfc42
ord1576
ole32
CoFreeUnusedLibraries
OleCreate
CoRevokeClassObject
RevokeDragDrop
OleInitialize
OleUninitialize
CoDisconnectObject
StringFromCLSID
OleTranslateAccelerator
OleFlushClipboard
StringFromGUID2
CreateBindCtx
CoRegisterClassObject
OleRegGetUserType
WriteClassStg
ReleaseStgMedium
CoRegisterMessageFilter
CoGetMalloc
OleCreateMenuDescriptor
CoGetClassObject
OleCreateFromFile
OleGetIconOfClass
CreateStreamOnHGlobal
OleLoad
OleCreateStaticFromData
OleCreateLinkFromData
IsAccelerator
WriteClassStm
OleIsCurrentClipboard
CoTaskMemFree
CLSIDFromString
OleGetClipboard
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
OleSave
CreateILockBytesOnHGlobal
StgCreateDocfile
OleCreateLinkToFile
CoLockObjectExternal
GetHGlobalFromILockBytes
CoCreateInstance
StgIsStorageFile
CreateOleAdviseHolder
OleSetMenuDescriptor
OleDestroyMenuDescriptor
CreateItemMoniker
user32
DeleteMenu
CharNextA
RegisterClassA
UnregisterClassA
SetForegroundWindow
GetNextDlgTabItem
AdjustWindowRectEx
HideCaret
GetScrollRange
GetWindowLongA
PostThreadMessageA
AppendMenuA
ScreenToClient
FrameRect
PostMessageA
WinHelpA
EndPaint
SetActiveWindow
EqualRect
EnableWindow
ReleaseCapture
SetWindowTextA
GetSysColorBrush
UnhookWindowsHookEx
SystemParametersInfoA
DrawIcon
IntersectRect
DefWindowProcA
SetClassLongA
GetClientRect
GetWindowThreadProcessId
GetPropA
GetMenuItemCount
IsMenu
GetActiveWindow
IsClipboardFormatAvailable
ReleaseDC
GetSystemMenu
GetMessagePos
ClientToScreen
InflateRect
GetMenuState
IsDlgButtonChecked
InsertMenuA
RegisterWindowMessageA
TabbedTextOutA
WindowFromPoint
SetScrollRange
CloseClipboard
DeferWindowPos
MapDialogRect
GetKeyState
GetDC
SetWindowsHookExA
IsDialogMessageA
SetFocus
IsChild
GetClassInfoExA
GetForegroundWindow
GetMessageA
LockWindowUpdate
SetWindowLongA
GetWindowDC
SetRect
TrackPopupMenu
MessageBeep
CopyRect
ShowWindow
MessageBoxA
GetNextDlgGroupItem
SetCapture
DrawTextA
OpenClipboard
GetWindowTextA
CreateWindowExA
LoadBitmapA
SetPropA
SetWindowRgn
ShowOwnedPopups
PeekMessageA
GetSysColor
SetMenuItemBitmaps
GetLastActivePopup
wsprintfA
SetWindowPos
SetDlgItemTextA
TranslateMessage
DrawEdge
SetRectEmpty
GetWindow
DrawFocusRect
GetDesktopWindow
InvalidateRect
GetClassInfoA
OffsetRect
CreatePopupMenu
LoadCursorA
ModifyMenuA
FillRect
LoadAcceleratorsA
BeginPaint
GetSubMenu
DestroyCaret
DrawIconEx
DestroyIcon
DestroyAcceleratorTable
CharUpperA
LoadStringA
GrayStringA
GetWindowTextLengthA
RemoveMenu
UnpackDDElParam
GetCursorPos
GetDlgItem
GetKeyboardState
RegisterClassExA
GetCaretPos
SendMessageA
MapWindowPoints
ToAsciiEx
IsWindowVisible
EndDialog
DestroyWindow
GetDCEx
PtInRect
LoadIconA
MoveWindow
CheckMenuItem
IsWindow
TranslateAcceleratorA
Sections
.text Size: 72KB - Virtual size: 72KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 90KB - Virtual size: 90KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 54KB - Virtual size: 69KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 85KB - Virtual size: 85KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ