Static task
static1
Behavioral task
behavioral1
Sample
d2e846bd5926fee24b8b07e322bf871572b48fc41cbaabc5561c4ee79534b80d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d2e846bd5926fee24b8b07e322bf871572b48fc41cbaabc5561c4ee79534b80d.exe
Resource
win10v2004-20220812-en
General
-
Target
d2e846bd5926fee24b8b07e322bf871572b48fc41cbaabc5561c4ee79534b80d
-
Size
1.0MB
-
MD5
7ac4acaf2785a6d4b422b69a59a50279
-
SHA1
69d457be3836df464be8807ac27235549bb00a6b
-
SHA256
d2e846bd5926fee24b8b07e322bf871572b48fc41cbaabc5561c4ee79534b80d
-
SHA512
01ba4a022783ea23188c14576c545c9ef55e42928c93475d67ecb3e226a0c514452a996fc8d274237d6f0480f508327487238be79e8e2b5648f9a05b29bde0fb
-
SSDEEP
24576:fdObCe3n5IauISBsBd8sNx+cxWKWUGkVBLVw7gaW3lNBYXk/3s:fdiXujBsBd8kTq0LZf
Malware Config
Signatures
Files
-
d2e846bd5926fee24b8b07e322bf871572b48fc41cbaabc5561c4ee79534b80d.exe windows x86
1c85ca9d9e38f771693b782e44cfb0c7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
asusbios
ord1
kernel32
HeapFree
CreateThread
ExitThread
TerminateProcess
HeapAlloc
HeapSize
HeapReAlloc
GetACP
GetTimeZoneInformation
GetCommandLineA
RaiseException
ExitProcess
SetHandleCount
GetStdHandle
GetFileType
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
HeapDestroy
HeapCreate
CloseHandle
GetStartupInfoA
LCMapStringW
VirtualAlloc
IsBadWritePtr
IsBadReadPtr
IsBadCodePtr
SetStdHandle
CompareStringA
CompareStringW
SetEnvironmentVariableA
LockResource
SizeofResource
FreeResource
lstrcatA
GlobalSize
GlobalAlloc
RtlUnwind
FileTimeToLocalFileTime
FileTimeToSystemTime
SetErrorMode
GetFileTime
GetFileSize
GetFileAttributesA
GetOEMCP
GetCPInfo
GetProcessVersion
TlsGetValue
LocalReAlloc
TlsSetValue
GlobalReAlloc
TlsFree
GlobalHandle
TlsAlloc
LocalAlloc
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
GlobalFlags
lstrcmpA
GetCurrentThread
GetFullPathNameA
GetVolumeInformationA
FindFirstFileA
FindClose
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
CreateFileA
DuplicateHandle
CreateEventA
SuspendThread
SetThreadPriority
ResumeThread
SetEvent
SetLastError
GetModuleFileNameA
SetCurrentDirectoryA
InterlockedDecrement
InterlockedIncrement
GetStringTypeA
GetCurrentThreadId
GetVersionExA
GetCurrentProcess
lstrlenA
LocalFree
GetVersion
GlobalFindAtomA
GlobalGetAtomNameA
GlobalAddAtomA
CreateMutexA
GlobalDeleteAtom
GetCurrentDirectoryA
SearchPathA
GetLastError
SetProcessAffinityMask
GetModuleHandleA
MultiByteToWideChar
WideCharToMultiByte
LoadLibraryA
MulDiv
FreeLibrary
FindResourceA
GetProcAddress
OutputDebugStringA
GetStringTypeW
LoadResource
LCMapStringA
VirtualFree
SetUnhandledExceptionFilter
lstrcpynA
WaitForSingleObject
GetWindowsDirectoryA
DeleteFileA
DeviceIoControl
Sleep
WritePrivateProfileStringA
CopyFileA
GetExitCodeProcess
GetProfileStringA
GlobalFree
lstrcpyA
GlobalUnlock
GlobalLock
lstrcmpiA
user32
CreateDialogIndirectParamA
GetActiveWindow
GetMenuCheckMarkDimensions
GetMenuState
EndDialog
GetWindowDC
BeginPaint
EndPaint
ValidateRect
GetMessageA
InflateRect
PostQuitMessage
PtInRect
GetSysColorBrush
DestroyMenu
LoadStringA
GetClassNameA
AdjustWindowRectEx
IsWindowVisible
GetTopWindow
GetCapture
WinHelpA
GetClassInfoA
RegisterClassA
GetMenu
GetMenuItemCount
GetSubMenu
GetMenuItemID
GetDlgCtrlID
SetFocus
DefWindowProcA
DestroyWindow
CreateWindowExA
CheckMenuItem
ModifyMenuA
UnhookWindowsHookEx
GetPropA
CallWindowProcA
RemovePropA
GetMessageTime
GetMessagePos
GetLastActivePopup
GetForegroundWindow
SetForegroundWindow
GetWindowLongA
SetWindowLongA
SetWindowPos
RegisterWindowMessageA
OffsetRect
IntersectRect
SystemParametersInfoA
GetWindowPlacement
CopyRect
ReleaseDC
CharUpperA
LoadCursorA
SetCursor
SetCapture
GetWindowRect
SetWindowRgn
ReleaseCapture
RedrawWindow
GrayStringA
DrawTextA
TabbedTextOutA
IsWindow
LoadIconA
GetWindow
KillTimer
SetTimer
InvalidateRect
IsIconic
MessageBoxA
DrawIcon
LoadBitmapA
wsprintfA
PeekMessageA
TranslateMessage
DispatchMessageA
ExitWindowsEx
GetSystemMetrics
SetWindowTextA
GetDesktopWindow
GetDC
GetClientRect
FillRect
ClientToScreen
MoveWindow
IsDialogMessageA
SendMessageA
SetDlgItemTextA
CheckDlgButton
PostMessageA
UpdateWindow
SendDlgItemMessageA
MapWindowPoints
GetFocus
SetActiveWindow
SetMenuItemBitmaps
IsWindowEnabled
EnableMenuItem
GetNextDlgTabItem
GetClassLongA
ShowWindow
SetPropA
GetKeyState
EnableWindow
GetSysColor
GetCursorPos
ScreenToClient
GetParent
GetWindowTextA
GetWindowTextLengthA
CallNextHookEx
SetWindowsHookExA
GetDlgItem
DefDlgProcA
IsWindowUnicode
UnregisterClassA
DrawFocusRect
HideCaret
ShowCaret
CharNextA
ExcludeUpdateRgn
gdi32
GetDeviceCaps
CreateCompatibleDC
StretchBlt
CreatePatternBrush
CreateRectRgn
PtVisible
CreateCompatibleBitmap
BitBlt
TextOutA
RectVisible
Escape
ExtCreateRegion
ExtTextOutA
PatBlt
SetTextColor
SetBkColor
GetClipBox
CreateBitmap
DeleteDC
GetObjectA
CreateBrushIndirect
RestoreDC
SelectObject
GetStockObject
CreateFontA
SetBkMode
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowOrgEx
SetWindowExtEx
ScaleWindowExtEx
SelectClipRgn
IntersectClipRect
DeleteObject
CreateSolidBrush
GetTextExtentPointA
CreateDIBitmap
SaveDC
comdlg32
GetFileTitleA
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
advapi32
RegCreateKeyExA
RegSetValueExA
RegEnumKeyExA
RegDeleteKeyA
LookupPrivilegeValueA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
OpenProcessToken
AdjustTokenPrivileges
shell32
ShellExecuteExA
SHGetDesktopFolder
SHGetPathFromIDListA
SHGetFileInfoA
SHGetMalloc
comctl32
ord17
ImageList_SetBkColor
ImageList_Destroy
ole32
CreateStreamOnHGlobal
olepro32
ord251
Sections
.text Size: 168KB - Virtual size: 164KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 28KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 832KB - Virtual size: 832KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
fgbxxve Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE