Static task
static1
Behavioral task
behavioral1
Sample
d86d05b6e02236fbe43853b696183733bafdd1882b87b5717be4786516d92d5b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d86d05b6e02236fbe43853b696183733bafdd1882b87b5717be4786516d92d5b.exe
Resource
win10v2004-20220812-en
General
-
Target
d86d05b6e02236fbe43853b696183733bafdd1882b87b5717be4786516d92d5b
-
Size
243KB
-
MD5
e0566d7633504a048c702707c9926282
-
SHA1
d4fd8220734482f9f40566f614c131056f830bc8
-
SHA256
d86d05b6e02236fbe43853b696183733bafdd1882b87b5717be4786516d92d5b
-
SHA512
5bf28916cbfc79e70cc7964682c72e942cf9f0ea20f23d4368eb9e50b49c7e223f8853eddf1d71a037e169d61c35bdc8fbee0702e21be12074dfa42695ad06c8
-
SSDEEP
3072:tI35MQU93wPhcY473hEZCpbBLALFV/8r32O5y71tpAu7:GiQU93wPj47aZCi/K3M7rp
Malware Config
Signatures
Files
-
d86d05b6e02236fbe43853b696183733bafdd1882b87b5717be4786516d92d5b.exe windows x86
fdc573a163ef72f6c360d63f78974936
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
wininet
InternetOpenA
InternetCloseHandle
InternetOpenUrlA
kernel32
GlobalFlags
GetLocaleInfoA
GetCPInfo
GetOEMCP
HeapReAlloc
ExitThread
CreateThread
GetCommandLineA
GetStartupInfoA
RtlUnwind
RaiseException
FlushFileBuffers
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapCreate
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetACP
IsValidCodePage
InitializeCriticalSectionAndSpinCount
GetConsoleCP
GetConsoleMode
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
lstrcmpW
lstrcmpA
GlobalGetAtomNameA
InterlockedIncrement
GetModuleHandleW
CompareStringA
FormatMessageA
MultiByteToWideChar
GetCurrentProcessId
GetModuleFileNameA
WideCharToMultiByte
FindResourceA
LoadResource
LockResource
SizeofResource
InterlockedDecrement
GetModuleHandleA
TlsFree
GlobalFree
LocalReAlloc
TlsSetValue
TlsAlloc
GlobalAlloc
GlobalHandle
GlobalUnlock
GlobalReAlloc
GlobalLock
TlsGetValue
LocalFree
LocalAlloc
SetLastError
GetVersionExA
GetDiskFreeSpaceExA
GetCurrentThreadId
GetSystemInfo
OpenEventA
GlobalMemoryStatusEx
GetLocalTime
GetDriveTypeA
ExitProcess
VirtualProtect
LoadLibraryA
GetProcAddress
IsBadReadPtr
GetProcessHeap
HeapFree
HeapAlloc
FreeLibrary
GetLastError
CreateDirectoryA
lstrcatA
ReadFile
CreateProcessA
GetFileAttributesA
TerminateThread
GetWindowsDirectoryA
ExpandEnvironmentStringsA
GetTickCount
GetCurrentProcess
lstrlenA
WriteFile
SetFilePointer
GetFileSize
CreateFileA
lstrcpyA
CloseHandle
CancelIo
ResetEvent
InterlockedExchange
CreateEventA
SetEvent
WaitForSingleObject
DeleteCriticalSection
EnterCriticalSection
VirtualAlloc
LeaveCriticalSection
Sleep
InitializeCriticalSection
VirtualFree
HeapSize
user32
PostQuitMessage
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
DestroyMenu
ClientToScreen
SetWindowTextA
RegisterWindowMessageA
LoadIconA
WinHelpA
GetCapture
GetClassLongA
GetClassNameA
SetPropA
GetPropA
RemovePropA
IsWindow
GetForegroundWindow
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetMenu
SetForegroundWindow
GetClientRect
PostMessageA
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
CopyRect
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
PtInRect
GetMenu
SetWindowLongA
SetWindowPos
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowRect
GetWindow
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
GetFocus
ModifyMenuA
EnableMenuItem
CheckMenuItem
GetWindowTextA
LoadCursorA
GetSystemMetrics
GetDC
ReleaseDC
GetSysColor
GetSysColorBrush
SetWindowsHookExA
CallNextHookEx
DispatchMessageA
GetKeyState
GetDlgItem
PeekMessageA
ValidateRect
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
GetWindowThreadProcessId
SendMessageA
GetParent
GetWindowLongA
GetLastActivePopup
IsWindowEnabled
EnableWindow
MessageBoxA
UnhookWindowsHookEx
GetUserObjectInformationA
GetThreadDesktop
OpenInputDesktop
CloseDesktop
SetThreadDesktop
GetMessageA
PostThreadMessageA
GetInputState
wsprintfA
ExitWindowsEx
AdjustWindowRectEx
gdi32
ScaleWindowExtEx
DeleteDC
GetStockObject
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
TextOutA
RectVisible
PtVisible
CreateBitmap
GetDeviceCaps
SetMapMode
RestoreDC
SaveDC
ExtTextOutA
DeleteObject
SetBkColor
SetTextColor
GetClipBox
winspool.drv
DocumentPropertiesA
OpenPrinterA
ClosePrinter
advapi32
RegOpenKeyA
RegCloseKey
RegOpenKeyExA
RegCreateKeyExA
RegQueryValueExA
RegSetValueExA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
shell32
ShellExecuteA
ws2_32
send
gethostbyname
closesocket
socket
recv
WSACleanup
setsockopt
ntohs
htons
select
WSAStartup
connect
gethostname
getsockname
WSAIoctl
oleaut32
VariantChangeType
VariantClear
VariantInit
Sections
.text Size: 129KB - Virtual size: 128KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 48KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ