Static task
static1
Behavioral task
behavioral1
Sample
85d3b3da9a6df14e4e6feef6904d9431e42bd38c0372b583e2cd6e7a9bb8dbec.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
85d3b3da9a6df14e4e6feef6904d9431e42bd38c0372b583e2cd6e7a9bb8dbec.exe
Resource
win10v2004-20220901-en
General
-
Target
85d3b3da9a6df14e4e6feef6904d9431e42bd38c0372b583e2cd6e7a9bb8dbec
-
Size
472KB
-
MD5
6a4aa9b0872703dd6bf9d660263053b0
-
SHA1
9773bcbf51f9aa62213fc0bdbcbc3856bd21a893
-
SHA256
85d3b3da9a6df14e4e6feef6904d9431e42bd38c0372b583e2cd6e7a9bb8dbec
-
SHA512
8b64d5247143636d191b0514e36a7e05a8daa77631c540ef799a7b07e1b6898846bb93f4034100a357491c59ad92ba5ef7437033d480a17596f0aef780414cf2
-
SSDEEP
12288:WQaa3pYOIVi/ArudSY9o9JesSYJY753Ap:WQa1OIVDKdX4/ea
Malware Config
Signatures
Files
-
85d3b3da9a6df14e4e6feef6904d9431e42bd38c0372b583e2cd6e7a9bb8dbec.exe windows x86
c4e3c33e7ea686166116a88a40854f22
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
OffsetWindowOrgEx
ExtCreatePen
LineTo
PatBlt
EndPath
SetBkColor
PlayEnhMetaFile
CreateBrushIndirect
PolyDraw
GetObjectA
Pie
PolyBezier
EqualRgn
SetPolyFillMode
GetTextColor
GetArcDirection
ExtFloodFill
FlattenPath
CreateBitmap
CreateFontA
SetBrushOrgEx
DeleteDC
SaveDC
EndDoc
GetBoundsRect
Polyline
SetMapperFlags
PolyPolygon
ResetDCA
GetTextFaceA
GetPolyFillMode
SetPaletteEntries
DeleteObject
GetPath
GetObjectType
StartDocA
GetBitmapBits
GetClipRgn
CreateDIBitmap
SetTextAlign
CreateRectRgnIndirect
CreateHatchBrush
CreateEllipticRgnIndirect
ScaleViewportExtEx
SetPixelV
Escape
PolylineTo
SetBitmapDimensionEx
GetBitmapDimensionEx
GetNearestPaletteIndex
CreatePalette
BeginPath
GetTextExtentPointA
GetFontData
GetROP2
FrameRgn
CreateDIBPatternBrushPt
Arc
GetTextMetricsA
SetWindowExtEx
EndPage
SelectClipPath
AbortDoc
GetPaletteEntries
CreatePenIndirect
CreateBitmapIndirect
GetTextExtentPoint32A
GetStockObject
OffsetRgn
GetBkMode
GetViewportExtEx
ExtSelectClipRgn
GetWindowOrgEx
RectVisible
Ellipse
SetMapMode
ScaleWindowExtEx
CopyMetaFileA
ExcludeClipRect
SetStretchBltMode
GetCharABCWidthsA
CreateRoundRectRgn
CreateSolidBrush
Polygon
TextOutA
ArcTo
StrokeAndFillPath
GetPixel
LPtoDP
PlayMetaFileRecord
GetCharWidthA
PlayMetaFile
PtVisible
SetArcDirection
GetRgnBox
EnumMetaFile
StretchBlt
CreateDCA
CreatePolygonRgn
CreateFontIndirectA
GetStretchBltMode
GetRegionData
SetViewportExtEx
GetWindowExtEx
SetPixel
CreatePatternBrush
SelectObject
SetViewportOrgEx
GetBkColor
SetWindowOrgEx
SetTextCharacterExtra
GetDeviceCaps
CreateCompatibleDC
FloodFill
OffsetViewportOrgEx
GetGlyphOutlineA
FillPath
CombineRgn
SelectPalette
StartPage
CreateCompatibleBitmap
RestoreDC
PtInRegion
SetColorAdjustment
MaskBlt
SetBoundsRect
ExtTextOutA
CreateRectRgn
advapi32
RegQueryValueA
RegEnumKeyA
RegSetValueExA
RegDeleteKeyA
RegCloseKey
RegEnumValueA
RegEnumKeyExA
OpenProcessToken
FreeSid
LookupPrivilegeValueA
RegOpenKeyExA
GetUserNameA
kernel32
GetLastError
DeleteCriticalSection
TlsGetValue
SetFilePointer
VirtualFree
GetFileType
InterlockedDecrement
FreeEnvironmentStringsA
GetOEMCP
GetTickCount
GetStdHandle
GetProcAddress
GetModuleFileNameA
GetCurrentProcess
UnhandledExceptionFilter
QueryPerformanceCounter
GetACP
GetStringTypeA
ReadFile
GetCurrentThreadId
GetCommandLineA
ExitProcess
TerminateProcess
SetLastError
GetModuleHandleA
GetVersion
GetEnvironmentStrings
GetTimeZoneInformation
SetStdHandle
LeaveCriticalSection
SetEnvironmentVariableA
FreeEnvironmentStringsW
SetUnhandledExceptionFilter
HeapCreate
WriteFile
InterlockedIncrement
TlsAlloc
FlushFileBuffers
RtlUnwind
IsBadCodePtr
EnterCriticalSection
CompareStringA
GetSystemTime
WideCharToMultiByte
GetStringTypeW
HeapAlloc
GetStartupInfoA
LoadLibraryA
CompareStringW
InitializeCriticalSection
RaiseException
VirtualQuery
HeapFree
GetEnvironmentStringsW
MultiByteToWideChar
InterlockedExchange
CreateMutexA
SetHandleCount
LCMapStringW
GetLocalTime
TlsSetValue
LCMapStringA
GetCPInfo
CloseHandle
HeapDestroy
HeapReAlloc
VirtualAlloc
GetCurrentProcessId
GetSystemTimeAsFileTime
user32
GetSystemMetrics
GetAsyncKeyState
ShowWindow
LoadStringA
RegisterClassExA
GetSysColorBrush
LoadAcceleratorsA
GetMessageTime
DestroyWindow
UpdateWindow
LoadCursorA
CopyRect
LoadBitmapA
RegisterClassA
IsClipboardFormatAvailable
MoveWindow
IsWindow
GetNextDlgTabItem
GetSysColor
InvalidateRect
SendMessageTimeoutA
DefWindowProcA
GetMenu
PostQuitMessage
OpenClipboard
GetClientRect
DrawIcon
DestroyIcon
SetDlgItemTextA
RemoveMenu
IsRectEmpty
GrayStringA
SetForegroundWindow
ExitWindowsEx
OffsetRect
WindowFromPoint
RegisterWindowMessageA
GetDC
SetWindowRgn
LoadIconA
SetWindowTextA
SetParent
SendMessageA
SystemParametersInfoA
GetKeyState
DestroyCursor
SetMenuItemBitmaps
GetActiveWindow
MessageBoxA
CreateWindowExA
UnionRect
CheckRadioButton
IsIconic
DispatchMessageA
GetParent
KillTimer
SetCursor
EmptyClipboard
GetScrollInfo
AppendMenuA
wsprintfA
RemovePropA
shell32
DragFinish
ShellExecuteExA
Sections
.text Size: 68KB - Virtual size: 67KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 260KB - Virtual size: 259KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 72KB - Virtual size: 100KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 68KB - Virtual size: 65KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ