Static task
static1
Behavioral task
behavioral1
Sample
cd35f65c787aa1c0efff6aeaaf540112c0f43bf56c5a55b2ad06f6a981c8a763.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
cd35f65c787aa1c0efff6aeaaf540112c0f43bf56c5a55b2ad06f6a981c8a763.exe
Resource
win10v2004-20220812-en
General
-
Target
cd35f65c787aa1c0efff6aeaaf540112c0f43bf56c5a55b2ad06f6a981c8a763
-
Size
108KB
-
MD5
a0a63e1324f6296c3070e4ca03a50340
-
SHA1
2ab64c36a66c8c63df90620b756fc98ec08f8f8d
-
SHA256
cd35f65c787aa1c0efff6aeaaf540112c0f43bf56c5a55b2ad06f6a981c8a763
-
SHA512
af9acea0116da7780799543c55a835091d9fa334d7e0d521381e3809b2fc151cfd244f473d07fa0f22eda0e735f1ea4d3b5e847123cc4086853e670bb2a803fa
-
SSDEEP
1536:iK3wdc/RsE9aZxuKVp0J/e5vXu1jtsT3t/7ZLmEUSEOgYJG:iK3wwRuufYoJkzZLtcY
Malware Config
Signatures
Files
-
cd35f65c787aa1c0efff6aeaaf540112c0f43bf56c5a55b2ad06f6a981c8a763.exe windows x86
09461f33a22bf0ce3d911bf16957c0e5
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateThread
TerminateProcess
GetVersionExA
GetFileType
GetModuleFileNameW
MultiByteToWideChar
TlsGetValue
SetFilePointerEx
lstrlenW
CreateFileA
HeapDestroy
InitializeCriticalSection
InterlockedCompareExchange
HeapAlloc
TlsAlloc
FreeLibrary
WaitForSingleObject
TlsSetValue
RaiseException
DeleteCriticalSection
WideCharToMultiByte
GetVersionExW
LCMapStringW
ReadFile
CreateEventW
GetTickCount
RtlUnwind
IsValidCodePage
GetCPInfo
GetLocaleInfoW
LoadLibraryW
SetConsoleCtrlHandler
FatalAppExitA
IsProcessorFeaturePresent
GetSystemTimeAsFileTime
HeapCreate
SetLastError
TlsFree
InitializeCriticalSectionAndSpinCount
GetProcAddress
DecodePointer
EncodePointer
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
HeapSetInformation
GetCommandLineA
LocalFree
GetStringTypeW
SetFilePointer
SetEvent
CloseHandle
LeaveCriticalSection
FlushFileBuffers
Sleep
HeapReAlloc
GetFileSize
HeapSize
GetModuleFileNameA
GetModuleHandleW
EnterCriticalSection
GetStdHandle
GetCommandLineW
FindClose
GetLastError
FreeLibraryAndExitThread
TryEnterCriticalSection
InterlockedExchange
SetHandleCount
FormatMessageW
ExitProcess
GetEnvironmentStringsW
FreeEnvironmentStringsW
CreateFileW
WriteFile
GetACP
GetOEMCP
HeapFree
VirtualAlloc
GetCurrentThreadId
InterlockedDecrement
GetStartupInfoW
GetCurrentProcessId
GetModuleHandleA
InterlockedIncrement
GetStartupInfoA
QueryPerformanceCounter
GetCurrentProcess
CompareFileTime
GetProcessHeap
GetCurrentThread
user32
SetWindowPos
GetMenuStringA
GetOpenClipboardWindow
CallNextHookEx
CreateWindowExW
PeekMessageW
GetWindowPlacement
ReleaseCapture
SetWindowLongW
CopyRect
CloseClipboard
SetCursorPos
SetClipboardData
GetSysColorBrush
CheckMenuItem
CreateWindowExA
ScrollWindowEx
ChildWindowFromPoint
OffsetRect
DrawTextA
GetSystemMenu
GetWindowRect
wsprintfA
SetCursor
EmptyClipboard
DestroyWindow
EnableWindow
ShowWindow
ShowWindowAsync
GetWindowLongW
PtInRect
UnhookWindowsHookEx
CharNextA
GetMenuItemInfoW
MessageBoxW
GetDlgItemTextA
DispatchMessageA
SetActiveWindow
GetMessageW
CharNextW
MessageBeep
GetSystemMetrics
GetWindowTextA
SetWindowTextA
DrawIcon
PostMessageW
GetParent
MoveWindow
SetFocus
GetKeyState
PostMessageA
FillRect
GetWindowInfo
ReleaseDC
PostQuitMessage
IsWindowVisible
EnableMenuItem
CreatePopupMenu
GetMenuDefaultItem
DialogBoxParamA
GetWindowTextW
IsWindowUnicode
SendMessageW
gdi32
CreateBitmap
ExtCreatePen
ExtSelectClipRgn
CreateRectRgnIndirect
CreateSolidBrush
RestoreDC
MoveToEx
GetDeviceCaps
GetTextExtentPoint32W
SetWindowOrgEx
CreatePenIndirect
SetViewportOrgEx
SelectObject
SetStretchBltMode
GetStretchBltMode
RectVisible
SetBkColor
CreateCompatibleBitmap
CreateFontIndirectW
ExtTextOutW
SelectClipRgn
BitBlt
SetBkMode
CreateDIBitmap
LineTo
StretchBlt
PatBlt
GetObjectA
DeleteObject
CreateCompatibleDC
ExtTextOutA
GetObjectW
Rectangle
CreateDIBSection
SetMapMode
SaveDC
RealizePalette
CreatePalette
DeleteDC
GetClipBox
SelectPalette
GetStockObject
ole32
OleQueryCreateFromData
msi
ord50
Sections
.text Size: 60KB - Virtual size: 56KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 40KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ