Static task
static1
Behavioral task
behavioral1
Sample
61290dfcc1f4b9bf2ff888b0c458b7f863412e58e7cdc90b0299fa409a750620.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
61290dfcc1f4b9bf2ff888b0c458b7f863412e58e7cdc90b0299fa409a750620.exe
Resource
win10v2004-20220812-en
General
-
Target
61290dfcc1f4b9bf2ff888b0c458b7f863412e58e7cdc90b0299fa409a750620
-
Size
211KB
-
MD5
91b24e60e28e3c19966d35eb38b4e230
-
SHA1
f3e42f64d0e3b6dac8e303f79033fac681d420ca
-
SHA256
61290dfcc1f4b9bf2ff888b0c458b7f863412e58e7cdc90b0299fa409a750620
-
SHA512
ae7901e2cd0414746c6d5aed4e706f1d3189d8777be611f61f24d7d2c2c3598d3bfb7f5342553db378accb89cec262ec6ed725cd10af8e6e6092c43f1809787b
-
SSDEEP
6144:MV9ToZbApClEYtc2//OofwB+LVWGkphqvEmn:MibgYtb/PF3cKEQ
Malware Config
Signatures
Files
-
61290dfcc1f4b9bf2ff888b0c458b7f863412e58e7cdc90b0299fa409a750620.exe windows x86
7b370f1c21a587bf21fdeddd796759a3
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
SetCursor
GetDlgItem
CheckDlgButton
LoadStringW
DefWindowProcW
IsRectEmpty
IsWindowVisible
SetDlgItemInt
DispatchMessageW
MoveWindow
DestroyWindow
ClientToScreen
TranslateMessage
InvalidateRect
GetDesktopWindow
SetWindowLongW
GetClientRect
GetWindowRect
SetDlgItemTextW
CreateDialogParamW
GetWindowLongW
CheckRadioButton
ReleaseDC
EnableWindow
GetAsyncKeyState
GetDlgItemInt
SendMessageW
IsWindow
LoadCursorW
PeekMessageW
GetDC
ShowWindow
oleaut32
VarBstrFromDisp
VarBstrFromUI4
VarBstrFromI4
VarBstrFromR8
VarBstrFromDate
VarBstrFromCy
VarBstrFromUI2
VarBstrFromUI8
VarBstrFromI8
VarBstrFromDec
VarBstrFromI2
VarBstrFromUI1
VarBstrFromI1
VarBstrFromR4
kernel32
IsBadWritePtr
WriteFile
CreateEventW
HeapFree
GlobalFindAtomA
GetCurrentThread
EnterCriticalSection
GetTickCount
GetCurrentProcess
GetQueuedCompletionStatus
GetProcAddress
SetLastError
SetThreadPriority
WideCharToMultiByte
lstrcpyW
SetFilePointer
LeaveCriticalSection
lstrcmpW
InitializeCriticalSection
InterlockedExchange
GlobalUnlock
ReleaseSemaphore
GetSystemTimeAsFileTime
MultiByteToWideChar
GetFileAttributesW
GetLocaleInfoA
GetACP
WaitForSingleObject
SetEvent
IsBadReadPtr
CreateThread
GlobalLock
LoadLibraryW
QueryPerformanceCounter
GlobalAlloc
WaitForMultipleObjects
CreateFileW
ReadFile
SetUnhandledExceptionFilter
IsBadCodePtr
SetEndOfFile
lstrcmpiW
GetFileSize
GlobalHandle
GetCurrentProcessId
GetFullPathNameW
GetProfileIntA
FreeLibrary
GetPrivateProfileStringW
DeleteCriticalSection
InterlockedDecrement
GetLastError
GetDiskFreeSpaceW
GetProcessHeap
ResetEvent
GetModuleFileNameA
GetVersionExW
lstrcpynW
GlobalMemoryStatus
CreateSemaphoreW
lstrlenW
HeapAlloc
InterlockedIncrement
VirtualFree
MulDiv
lstrlenA
lstrcpyA
GlobalFree
CloseHandle
GetThreadPriority
msoeacct
HrCreateAccountManager
DllCanUnloadNow
ValidEmailAddress
DllGetClassObject
GetDllMajorVersion
msls31
LssbGetObjDimSubline
LssbGetDurTrailWithPensInSubline
LssbGetNumberDnodesInSubline
LssbGetPlsrunsFromSubline
LsCompressSubline
LssbGetVisibleDcpInSubline
msnetobj
DllGetClassObject
DllCanUnloadNow
DllRegisterServer
Sections
.text Size: 84KB - Virtual size: 83KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 117KB - Virtual size: 117KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 6.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ