Static task
static1
Behavioral task
behavioral1
Sample
d721c211c77cb6bc757f798a96c6a1dcb62dcaaf6194c3e09f28107a9c080256.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
d721c211c77cb6bc757f798a96c6a1dcb62dcaaf6194c3e09f28107a9c080256.exe
Resource
win10v2004-20220812-en
General
-
Target
d721c211c77cb6bc757f798a96c6a1dcb62dcaaf6194c3e09f28107a9c080256
-
Size
69KB
-
MD5
a10d83493cab1757a5a64073001e6f70
-
SHA1
f9db85ee71a423b0e7409d00f59464191ad4a48c
-
SHA256
d721c211c77cb6bc757f798a96c6a1dcb62dcaaf6194c3e09f28107a9c080256
-
SHA512
1e477d32ef339cdac1ff0844d5045251536eb65c91e2ad894aa529bb6afd598953ce2d69220f82a395621a462c05e5543aebc6dc7e9f90cff3c7f1b33a08cef2
-
SSDEEP
1536:AtBgBB1GqxXxjdq2Ki5O6UksoB9xWK33mjz/t4A9GKMvZNP9eJ5a:I4jGqxFAji5lUkJ3v3sj36ZPQ5a
Malware Config
Signatures
Files
-
d721c211c77cb6bc757f798a96c6a1dcb62dcaaf6194c3e09f28107a9c080256.exe windows x86
6e5570950c60b0cfee90863219bb6bcc
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
GlobalFree
CreateDirectoryW
LoadLibraryExW
lstrcatW
OpenProcess
lstrcpynW
SetFileAttributesW
WritePrivateProfileStringW
CreateThread
GetFileAttributesW
GetFileSize
SetFilePointer
GetFullPathNameW
CopyFileW
lstrlenW
lstrcmpW
lstrcmpiW
lstrcpynA
GetDiskFreeSpaceW
lstrcpyA
WideCharToMultiByte
SetCurrentDirectoryW
GetExitCodeProcess
FindFirstFileW
GetModuleFileNameW
CreateFileW
GlobalLock
SearchPathW
ReadFile
FreeLibrary
SetFileTime
GetVersion
FindClose
MulDiv
GetWindowsDirectoryW
GetModuleHandleA
MoveFileW
GetCommandLineW
GetShortPathNameW
WriteFile
SetErrorMode
CreateProcessW
MultiByteToWideChar
GlobalAlloc
GetPrivateProfileStringW
DeleteFileW
GetVersionExW
GetTempFileNameW
GetModuleHandleW
WaitForSingleObject
GetSystemDirectoryW
Sleep
FindNextFileW
GlobalUnlock
ExpandEnvironmentStringsW
GetLastError
lstrcmpiA
CloseHandle
CompareFileTime
GetVersionExA
VirtualProtect
LoadLibraryExA
AddAtomA
LoadLibraryA
GetProcAddress
SetLastError
LoadLibraryW
GetProcessHeap
GetCurrentProcess
lstrlenA
lstrcmpA
RemoveDirectoryW
ExitProcess
user32
GetSystemMenu
ScreenToClient
SetCursor
DialogBoxParamW
EnableWindow
CheckDlgButton
GetWindowRect
IsWindow
CloseClipboard
EnableMenuItem
SystemParametersInfoW
SetClassLongW
wsprintfW
CharNextW
GetMessagePos
LoadBitmapW
SetDlgItemTextW
CharPrevW
CreateDialogParamW
ShowWindow
GetAsyncKeyState
LoadCursorW
GetSystemMetrics
GetDC
TrackPopupMenu
SetWindowPos
PostQuitMessage
GetSysColor
CharUpperW
SetWindowTextW
CreateWindowExW
DispatchMessageW
PeekMessageW
SetWindowLongW
SetForegroundWindow
GetWindowLongW
GetDlgItem
CallWindowProcW
DestroyWindow
SendMessageTimeoutW
IsDlgButtonChecked
OpenClipboard
IsWindowEnabled
SetTimer
CharNextA
SetClipboardData
AppendMenuW
wsprintfA
wvsprintfW
MessageBoxIndirectW
LoadImageW
GetDlgItemTextW
GetClassInfoW
RegisterClassW
ExitWindowsEx
EmptyClipboard
CreatePopupMenu
IsWindowVisible
EndDialog
gdi32
SetBkMode
GetDeviceCaps
SetBkColor
CreateFontIndirectW
CreateBrushIndirect
SelectObject
SetTextColor
DeleteObject
advapi32
RegEnumKeyW
RegQueryValueExW
RegCreateKeyExW
RegDeleteKeyW
RegEnumValueW
RegOpenKeyExW
RegDeleteValueW
RegCloseKey
shell32
SHGetFileInfoW
SHFileOperationW
SHGetSpecialFolderLocation
SHBrowseForFolderW
ShellExecuteW
SHGetPathFromIDListW
comctl32
ImageList_Destroy
ImageList_AddMasked
ImageList_Create
ord17
setupapi
SetupAddToSourceListA
Sections
CODE Size: 56KB - Virtual size: 55KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ