Static task
static1
Behavioral task
behavioral1
Sample
d82dc4cf97d2779df8cfe898f68f1ed5b41061dfb49dc27cb4c918c1d86fc434.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d82dc4cf97d2779df8cfe898f68f1ed5b41061dfb49dc27cb4c918c1d86fc434.exe
Resource
win10v2004-20220812-en
General
-
Target
d82dc4cf97d2779df8cfe898f68f1ed5b41061dfb49dc27cb4c918c1d86fc434
-
Size
134KB
-
MD5
a206d372e370d3cdc4fa9067919fecf7
-
SHA1
6e1a67dcd50d64d8f3fd735a16f0d80da4232ca6
-
SHA256
d82dc4cf97d2779df8cfe898f68f1ed5b41061dfb49dc27cb4c918c1d86fc434
-
SHA512
b4604c0f44ce859bff05fecce543b684a7ded1b8178c06865f416b5305075260ee27be18affe35694edda44cc00001331468fa1268782add7c164f50993c63c6
-
SSDEEP
3072:QP3gvKzyxfgE/Fjp51M5K5yUH+khurNqkKHtBl63ihwm59dZ6:QP3gvKA3bry4+kheYkKN70+9d4
Malware Config
Signatures
Files
-
d82dc4cf97d2779df8cfe898f68f1ed5b41061dfb49dc27cb4c918c1d86fc434.exe windows x86
de184af8104f342830e4aa65564ed741
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcessHeap
LoadLibraryA
BuildCommDCBA
HeapAlloc
EnterCriticalSection
GetSystemTimeAsFileTime
InterlockedIncrement
OutputDebugStringW
UnhandledExceptionFilter
lstrcmpiW
CreateMutexW
WideCharToMultiByte
WaitForSingleObject
VirtualFree
GetModuleFileNameW
TerminateProcess
HeapFree
CreateThread
IsDebuggerPresent
SetLastError
SizeofResource
LoadLibraryExW
LeaveCriticalSection
LoadResource
WaitNamedPipeW
SetEvent
FlushInstructionCache
WaitForMultipleObjects
MultiByteToWideChar
CreateEventW
VirtualAlloc
FreeLibrary
GetCurrentProcess
InterlockedCompareExchange
TerminateThread
DeleteCriticalSection
Sleep
lstrlenW
FormatMessageW
LocalFree
GetCurrentThreadId
GetCurrentProcessId
FindResourceW
QueryPerformanceCounter
SetUnhandledExceptionFilter
CloseHandle
InterlockedExchange
ResetEvent
GetModuleHandleW
GetPriorityClass
InitializeCriticalSection
GetVersionExW
InterlockedDecrement
IsProcessorFeaturePresent
RaiseException
GetStartupInfoW
LoadLibraryW
GetVersion
VirtualProtect
LoadLibraryExA
GetProcAddress
GetLastError
GetTickCount
lstrlenA
ReleaseMutex
ExitProcess
user32
GetMessageW
AppendMenuW
CallWindowProcW
SetMenuItemInfoW
GetSysColorBrush
SetMenuDefaultItem
LoadImageW
DestroyMenu
RegisterWindowMessageW
GetMenuItemCount
SetTimer
PostMessageW
FillRect
TrackPopupMenu
GetClassInfoExW
KillTimer
CreateWindowExW
PostQuitMessage
DestroyIcon
GetSysColor
GetSubMenu
DefWindowProcW
LoadMenuW
LoadStringW
DispatchMessageW
SystemParametersInfoW
DrawIconEx
IsWindow
DrawTextW
GetMenuItemInfoW
ReleaseDC
SetForegroundWindow
FindWindowW
LoadCursorW
GetDoubleClickTime
IsMenu
GetDC
SetWindowLongW
CreatePopupMenu
TranslateMessage
RegisterClassExW
UnregisterClassA
GetSystemMetrics
DestroyWindow
DeleteMenu
CharNextW
GetCursorPos
GetWindowLongW
gdi32
SetTextColor
DeleteObject
SelectObject
CreateFontIndirectW
SetBkColor
advapi32
RegQueryValueExW
RegEnumKeyExW
RegDeleteKeyW
RegCreateKeyExW
RegCloseKey
RegDeleteValueW
GetUserNameA
RegEnumValueW
RegOpenKeyExW
RegSetValueExW
RegNotifyChangeKeyValue
RegQueryInfoKeyW
ole32
CoTaskMemRealloc
CoUninitialize
CoTaskMemFree
CoTaskMemAlloc
CoInitialize
CoCreateInstance
oleaut32
VarUI4FromStr
wldap32
ord197
Sections
.text Size: 70KB - Virtual size: 70KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 37KB - Virtual size: 91KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ