Static task
static1
Behavioral task
behavioral1
Sample
67ee655809dccd150f0f0b45701614d125d92e96b25373d300732523b5d41e80.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
67ee655809dccd150f0f0b45701614d125d92e96b25373d300732523b5d41e80.exe
Resource
win10v2004-20220901-en
General
-
Target
67ee655809dccd150f0f0b45701614d125d92e96b25373d300732523b5d41e80
-
Size
169KB
-
MD5
a0aa8d4724a729e2accfedcd92005470
-
SHA1
a671452148514f84dcff501bdf8131296545eeca
-
SHA256
67ee655809dccd150f0f0b45701614d125d92e96b25373d300732523b5d41e80
-
SHA512
f466e5a2b1bad2ca5193d12b7b67b4325d10aa9ffb8cfc08a180e0fb64cb3131bd403102c6fb8197925b72854bcac1d3c8c2a71278cd500bf4bbfd0676b22d18
-
SSDEEP
3072:G7oC/1oeGSImNOPtgIZ6f7gTZ20tZV/7eJDmeGhlnwvnb88fbTMA4Uepu0wupgK:G7oCyeR7gtHZyWZ20Z7MmPh6zbTMA4dZ
Malware Config
Signatures
Files
-
67ee655809dccd150f0f0b45701614d125d92e96b25373d300732523b5d41e80.exe windows x86
7d1d665a8f407fa3d119eaf41b7e90de
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
ReadConsoleOutputCharacterW
GetProcessHeap
SetEndOfFile
WriteConsoleW
ReadFile
GetStringTypeW
LCMapStringW
HeapReAlloc
HeapSize
FlushFileBuffers
GetConsoleMode
GetConsoleCP
SetFilePointer
MultiByteToWideChar
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
Sleep
GetSystemTimeAsFileTime
GetCurrentProcessId
GetLastError
HeapCreate
GetEnvironmentStringsW
WideCharToMultiByte
FreeEnvironmentStringsW
GetModuleFileNameA
GetModuleFileNameW
InterlockedDecrement
GetCurrentThreadId
SetLastError
InterlockedIncrement
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
LoadLibraryW
SetStdHandle
RtlUnwind
IsProcessorFeaturePresent
HeapFree
EncodePointer
DeleteCriticalSection
GetFileType
GetStdHandle
GlobalUnlock
lstrcatA
WriteFile
GetTickCount
GlobalLock
GlobalSize
HeapAlloc
lstrlenA
AllocConsole
QueryPerformanceCounter
CreateFileA
InitializeCriticalSectionAndSpinCount
SetHandleCount
LeaveCriticalSection
EnterCriticalSection
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
DuplicateHandle
GetCurrentProcess
GetProcAddress
GetModuleHandleW
ExitProcess
DecodePointer
GetCommandLineA
HeapSetInformation
GetStartupInfoW
RaiseException
CreateFileW
user32
SetRect
DestroyWindow
GetMessageA
CloseClipboard
GetClassNameA
GetUpdateRgn
RemovePropW
GetWindowRect
SendDlgItemMessageA
IsIconic
LoadIconA
GetClipboardFormatNameA
FindWindowW
SetFocus
SendMessageA
EnumClipboardFormats
BeginPaint
EnumWindows
CreateIconIndirect
GetDC
TranslateMessage
LoadAcceleratorsW
GetForegroundWindow
CheckMenuItem
GetWindowTextA
ScrollDC
GetMenu
SetWindowLongA
GetScrollInfo
MessageBoxA
InvalidateRect
GetWindowLongA
GetClipboardData
ReleaseDC
EnableMenuItem
TranslateAcceleratorA
GetDlgItem
EndDialog
GetCaretPos
EnumChildWindows
ShowWindow
IsWindow
CreateWindowExW
DispatchMessageA
OpenClipboard
IsWindowVisible
SetWindowTextA
MapWindowPoints
UpdateWindow
LoadCursorA
GetPropW
DefWindowProcW
gdi32
LineTo
SetBkMode
DeleteObject
SelectObject
CreateRectRgn
CreatePen
GetStockObject
MoveToEx
comdlg32
GetFileTitleA
shell32
DragQueryFileA
ole32
CreateBindCtx
msimg32
GradientFill
rpcrt4
NdrOleAllocate
Sections
.text Size: 84KB - Virtual size: 84KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 43KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 40KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ