Static task
static1
Behavioral task
behavioral1
Sample
44eb529c56326e0871df83a0d83265e548ec9475d0104c84361fd3f13c0b65fa.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
44eb529c56326e0871df83a0d83265e548ec9475d0104c84361fd3f13c0b65fa.exe
Resource
win10v2004-20220901-en
General
-
Target
44eb529c56326e0871df83a0d83265e548ec9475d0104c84361fd3f13c0b65fa
-
Size
173KB
-
MD5
803256468be1c76336fb20abfcda5e80
-
SHA1
9dde3ee4b2f38de9337a3c33873d7c0f74cebdc4
-
SHA256
44eb529c56326e0871df83a0d83265e548ec9475d0104c84361fd3f13c0b65fa
-
SHA512
5eb5b8252e7029e9848520aa29e7766a28dae8f445cfe4d432dafe11540a2f0411eb4efe44f6ce1fbf54675ee5ef912ba78db05fef175aba5c1ff824d3100db0
-
SSDEEP
3072:3nMpY0lA+OhKM/Mawd14TTkq+RP7t3SDADeak7dJHB/AdG1:UhltOhKKOkIq+L3SsQLH5AdA
Malware Config
Signatures
Files
-
44eb529c56326e0871df83a0d83265e548ec9475d0104c84361fd3f13c0b65fa.exe windows x86
328e4eb753c0b5e92c08dffb396e5269
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mfc100
ord11792
ord6211
ord4888
ord7888
ord7891
ord12867
ord6968
ord4781
ord12280
ord7932
ord12864
ord12960
ord7473
ord3969
ord12342
ord12343
ord3901
ord2223
ord2233
ord11269
ord2877
ord3163
ord3164
ord385
ord316
ord1900
ord1929
ord3839
ord946
ord1982
ord4283
ord3439
ord5837
ord5776
ord948
ord6680
ord9475
ord1315
ord7933
ord310
ord1316
ord12868
ord300
ord7889
ord788
ord1210
ord10030
ord1313
ord1479
ord2626
ord5242
ord305
ord1483
ord2611
ord6970
ord4340
ord12128
ord11882
ord374
ord943
ord5774
ord2183
ord2184
ord11924
ord5830
ord3167
ord11941
ord4131
ord6054
ord12790
ord3421
ord11940
ord7927
ord7491
ord3390
ord11108
ord5805
ord3676
ord9286
ord5123
ord11103
ord2846
ord2944
ord2945
ord3484
ord11060
ord2338
ord5253
ord12482
ord10672
ord6128
ord13300
ord7074
ord13302
ord2661
ord3984
ord13980
ord3991
ord4401
ord4368
ord4364
ord4398
ord4419
ord4377
ord12627
ord4415
ord4385
ord4389
ord13301
ord4381
ord4410
ord13299
ord1514
ord1507
ord1509
ord1503
ord1496
ord11188
ord11190
ord12644
ord2847
ord8330
ord9994
ord6217
ord8070
ord13294
ord10883
ord3395
ord11025
ord8235
ord13973
ord13972
ord14045
ord14062
ord14058
ord14060
ord14061
ord14059
ord2416
ord7349
ord2878
ord2881
ord12531
ord5532
ord2752
ord2973
ord2974
ord10360
ord8137
ord11067
ord7487
ord11781
ord13125
ord7837
ord4144
ord11626
ord1437
ord4498
ord3618
ord11806
ord7091
ord1732
ord14075
ord10922
ord13181
ord11413
ord7144
ord13483
ord13480
ord13485
ord13482
ord13484
ord13481
ord3409
ord5238
ord11172
ord11180
ord4078
ord7355
ord9449
ord11184
ord11153
ord11787
ord4622
ord4903
ord5095
ord8439
ord4881
ord5098
ord4625
ord4774
ord4606
ord6897
ord6898
ord6888
ord4772
ord7357
ord9281
ord8304
ord6112
ord7302
ord2897
ord2896
ord12988
ord11009
ord11033
ord3184
ord2864
ord9172
ord3620
ord12672
ord849
ord5663
ord7264
ord12630
ord7267
ord3671
ord3467
ord2870
ord2871
ord5279
ord5782
ord7584
ord7510
ord11726
ord13767
ord4724
ord2163
ord11420
ord4406
ord11421
ord7141
ord1890
ord1295
ord1288
ord888
ord6835
ord9399
ord4393
ord7073
ord1297
ord1184
ord734
ord1294
ord901
ord2088
ord4373
ord8486
ord306
ord4094
ord4095
ord4092
ord13518
ord322
ord6653
ord8305
ord1296
msvcr100
__CxxFrameHandler3
_CxxThrowException
memset
_controlfp_s
_invoke_watson
_except_handler4_common
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_crt_debugger_hook
?terminate@@YAXXZ
__set_app_type
_fmode
_commode
__setusermatherr
_configthreadlocale
_initterm_e
_initterm
_acmdln
exit
_ismbblead
_XcptFilter
_exit
_cexit
__getmainargs
_amsg_exit
_onexit
_lock
__dllonexit
_unlock
_purecall
?what@exception@std@@UBEPBDXZ
??0exception@std@@QAE@ABV01@@Z
atoi
strtoul
??1exception@std@@UAE@XZ
??0exception@std@@QAE@ABQBD@Z
_setmbcp
kernel32
GetPrivateProfileIntA
GetPrivateProfileStringA
LocalFree
DecodePointer
EncodePointer
GetCommandLineW
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetStartupInfoW
HeapSetInformation
InterlockedCompareExchange
Sleep
InterlockedExchange
user32
EnableWindow
SystemParametersInfoA
SetCursor
LoadCursorA
PtInRect
ScreenToClient
FillRect
LoadBitmapW
GetWindowRect
GetWindowDC
DrawIcon
GetSystemMetrics
IsIconic
GetClientRect
SendMessageA
LoadIconW
MessageBoxA
SendMessageTimeoutA
gdi32
CreatePatternBrush
CreateCompatibleDC
BitBlt
CreateCompatibleBitmap
GetTextExtentPoint32A
CreatePen
shell32
CommandLineToArgvW
comctl32
_TrackMouseEvent
InitCommonControlsEx
ole32
OleInitialize
OleUninitialize
cdzhwebbctrlr
?m_pWebSpIf@CDzhWebBrowser@@2PAVCWebSpProIF@@A
?Navigate@CDzhWebBrowser@@QAEXPBDK00PAXK@Z
??0CDzhWebBrowser@@QAE@XZ
??1CDzhWebBrowser@@UAE@XZ
msvcp100
?_Xlength_error@std@@YAXPBD@Z
?_Xout_of_range@std@@YAXPBD@Z
Sections
.text Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 98KB - Virtual size: 97KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 42KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ