Static task
static1
Behavioral task
behavioral1
Sample
367d63fcef5f7fe9eda6d99c3a7a351e69a9944ab03f91ea983fa6cae63bdfbf.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
367d63fcef5f7fe9eda6d99c3a7a351e69a9944ab03f91ea983fa6cae63bdfbf.exe
Resource
win10v2004-20220901-en
General
-
Target
367d63fcef5f7fe9eda6d99c3a7a351e69a9944ab03f91ea983fa6cae63bdfbf
-
Size
476KB
-
MD5
907d0a8ca44f7940a0bdaf99e32b56b9
-
SHA1
c4b6c91d11c8d2cd1d18cbec190480822caff709
-
SHA256
367d63fcef5f7fe9eda6d99c3a7a351e69a9944ab03f91ea983fa6cae63bdfbf
-
SHA512
afc10edf82e2f190569838e0f8142dbf426e5d4a82e4ef7d77d5328d1823ef84c9b9e8080ddf98de440bc2ee88abcd042e9f04ece9a489ced5a3725ad3f1324e
-
SSDEEP
6144:RcdnnN4tzUrTZyf5hFjpJAncEuzaS3wf4o+1FNp/bTD8c/BjSh:OlU61mVFGnEeSAfvUFb/bUUq
Malware Config
Signatures
Files
-
367d63fcef5f7fe9eda6d99c3a7a351e69a9944ab03f91ea983fa6cae63bdfbf.exe windows x86
8d6f86298e7658f577f47d5f7c9d26c0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapFree
HeapAlloc
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
GetStartupInfoA
GetCommandLineA
HeapReAlloc
ExitProcess
RtlUnwind
HeapSize
TerminateProcess
HeapDestroy
HeapCreate
VirtualFree
IsBadWritePtr
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
SetUnhandledExceptionFilter
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
SetStdHandle
FlushFileBuffers
SetFilePointer
WriteFile
GetOEMCP
GetCPInfo
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
FreeLibrary
lstrcatA
lstrcmpW
GetProcAddress
GetCurrentThreadId
lstrcpyA
GlobalFlags
InterlockedIncrement
InterlockedDecrement
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
TlsGetValue
EnterCriticalSection
GlobalHandle
GlobalReAlloc
LeaveCriticalSection
LocalAlloc
GetModuleFileNameA
lstrcmpA
GlobalFree
FindResourceA
LockResource
SizeofResource
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageA
LocalFree
SetLastError
lstrcpynA
GetSystemTime
GetVersion
CloseHandle
GetVersionExA
DeleteCriticalSection
GetModuleHandleA
DeviceIoControl
LoadLibraryA
VirtualProtectEx
GetThreadLocale
lstrcmpiA
GetLastError
InterlockedExchange
RaiseException
MultiByteToWideChar
GetACP
GetVolumeInformationA
WideCharToMultiByte
OpenProcess
InitializeCriticalSection
GetDateFormatA
SetTapeParameters
OpenSemaphoreA
QueryPerformanceCounter
GetCurrentProcess
LoadResource
GetLocaleInfoA
lstrlenA
GetNativeSystemInfo
CreateFileA
user32
SystemParametersInfoA
IsIconic
GetWindowPlacement
CopyRect
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
SetWindowsHookExA
GetKeyState
ValidateRect
SetWindowPos
SetWindowLongA
GetDlgItem
ClientToScreen
GetWindow
GetDlgCtrlID
PtInRect
GetFocus
GetClassNameA
GetSystemMetrics
GetDC
GetSysColor
UnhookWindowsHookEx
SendMessageA
MessageBoxA
GetParent
GetLastActivePopup
IsWindowEnabled
EnableWindow
GetWindowTextA
GetMenuState
CallWindowProcA
GetMenuItemID
GetMenuItemCount
GetSubMenu
EndPaint
GetMessageA
GetWindowRect
PostQuitMessage
GetClassInfoExA
LoadBitmapA
LoadIconA
CallNextHookEx
GetClientRect
ExitWindowsEx
BeginPaint
EnumWindows
GetDoubleClickTime
GetIconInfo
IsDialogMessageA
TranslateMessage
RegisterClassA
EndDeferWindowPos
LoadCursorA
InflateRect
GetForegroundWindow
CreateDialogIndirectParamA
IntersectRect
UnregisterClassA
GetWindowLongA
CreateWindowExA
ReleaseDC
DefWindowProcA
SendMessageTimeoutA
GetDesktopWindow
CheckDlgButton
ShowWindow
CreatePopupMenu
GetSysColorBrush
DispatchMessageA
SetWindowTextA
GetClassInfoA
UpdateWindow
DialogBoxIndirectParamA
DestroyMenu
SetMenuItemBitmaps
ModifyMenuA
EnableMenuItem
CheckMenuItem
GetMenuCheckMarkDimensions
RegisterWindowMessageA
WinHelpA
GetCapture
GetClassLongA
SetPropA
GetPropA
RemovePropA
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetForegroundWindow
GetMenu
PostMessageA
AdjustWindowRectEx
PeekMessageA
gdi32
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
SelectObject
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
DeleteDC
GetClipBox
SetMapMode
RestoreDC
SaveDC
DeleteObject
GetDeviceCaps
SetTextColor
SetBkColor
SetAbortProc
CreateBitmap
SetRectRgn
CombineRgn
AbortDoc
GetTextMetricsA
EndDoc
GetStockObject
StretchDIBits
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
GetSidSubAuthority
GetLengthSid
InitializeSid
GetSidLengthRequired
IsValidSid
CopySid
comctl32
ord17
ole32
CoInitialize
OleUninitialize
OleInitialize
CLSIDFromString
CoUninitialize
CoCreateInstance
oleaut32
VariantClear
VariantChangeType
VariantInit
oleacc
LresultFromObject
CreateStdAccessibleObject
Sections
.text Size: 216KB - Virtual size: 212KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 100KB - Virtual size: 99KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 880KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 148KB - Virtual size: 146KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ