Static task
static1
Behavioral task
behavioral1
Sample
36734fb2f438b12cef730a21c00653082b257b8a38c1856810f1fba9c66bca11.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
36734fb2f438b12cef730a21c00653082b257b8a38c1856810f1fba9c66bca11.exe
Resource
win10v2004-20220901-en
General
-
Target
36734fb2f438b12cef730a21c00653082b257b8a38c1856810f1fba9c66bca11
-
Size
455KB
-
MD5
9054227183167276c94d43f81dd98c51
-
SHA1
8ec796ef803373553142bbe0b88d98c17bc0181b
-
SHA256
36734fb2f438b12cef730a21c00653082b257b8a38c1856810f1fba9c66bca11
-
SHA512
81aca19b3e3bc240e36961c2c4fa64473095ed46c09ebebddaec5e33d7af4ab92da2519e987411e26dac72838777c8b84482d5e59091e19b3bc51f447f46cc75
-
SSDEEP
12288:xChSAiMpBoywqw943Lje0pTxoSGge9UthBen3oFBV:xPabLDe0kqe9+hBvV
Malware Config
Signatures
Files
-
36734fb2f438b12cef730a21c00653082b257b8a38c1856810f1fba9c66bca11.exe windows x86
61b4327c5dbe53345f3ce7ad4b77a3e9
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
Polygon
GetTextExtentPoint32W
GetTextCharsetInfo
CreatePatternBrush
OffsetRgn
SelectClipRgn
BitBlt
SetWorldTransform
PatBlt
RealizePalette
GetDIBits
Rectangle
CreateCompatibleBitmap
MoveToEx
RestoreDC
CreatePolygonRgn
CombineRgn
DeleteObject
Ellipse
ExtCreatePen
ExtTextOutW
CreateFontIndirectW
CreateDIBSection
SetMapMode
SetTextColor
CreateCompatibleDC
EnumFontFamiliesExW
Arc
GetCharABCWidthsW
SetBkMode
CreatePen
GetTextMetricsA
DeleteDC
EqualRgn
GetStockObject
CreateDCW
SaveDC
GetTextMetricsW
GetClipBox
SelectObject
StretchBlt
CreatePalette
SetPolyFillMode
StartDocW
CreateRectRgn
LineTo
SetWindowOrgEx
RoundRect
GetDeviceCaps
SetTextAlign
TextOutW
SelectPalette
SetStretchBltMode
SetPixel
GdiFlush
GetRgnBox
RectInRegion
GetTextFaceW
GetObjectW
GetPixel
StretchDIBits
comctl32
CreatePropertySheetPageA
ImageList_GetIconSize
InitCommonControlsEx
ImageList_DrawEx
DestroyPropertySheetPage
user32
RegisterClassW
LoadStringW
CreateWindowExW
LoadIconW
DestroyWindow
LoadBitmapW
ShowWindow
DestroyIcon
LoadAcceleratorsW
LoadCursorW
MessageBoxW
RegisterClassExW
DefWindowProcW
shlwapi
PathRemoveBlanksW
PathFileExistsW
PathCanonicalizeW
PathIsRelativeW
StrStrIW
PathRemoveExtensionW
PathIsDirectoryW
ole32
CreateILockBytesOnHGlobal
OleCreateFromData
OleFlushClipboard
OleUninitialize
StgOpenStorageOnILockBytes
CoLockObjectExternal
OleRegGetUserType
StgCreateDocfileOnILockBytes
CreateItemMoniker
CoGetClassObject
kernel32
GetProcAddress
RaiseException
SetEnvironmentVariableA
ReadFile
VirtualAlloc
HeapFree
TlsFree
GetTimeZoneInformation
GetOEMCP
TlsGetValue
TlsSetValue
ExitProcess
IsBadCodePtr
GetCurrentProcess
TlsAlloc
GetCPInfo
LCMapStringW
GetStringTypeW
InitializeCriticalSection
FreeEnvironmentStringsW
LoadLibraryW
QueryPerformanceCounter
CloseHandle
WideCharToMultiByte
CreateMutexW
FreeEnvironmentStringsA
FlushFileBuffers
InterlockedExchange
MultiByteToWideChar
GetLastError
LCMapStringA
HeapReAlloc
GetTimeFormatA
GetSystemTimeAsFileTime
VirtualFree
WriteFile
EnterCriticalSection
GetModuleHandleW
LoadLibraryA
SetLastError
GetStdHandle
DeleteCriticalSection
CompareStringW
GetSystemInfo
HeapSize
HeapDestroy
SetUnhandledExceptionFilter
SetHandleCount
GetTickCount
GetACP
GetModuleHandleA
RtlUnwind
GetCommandLineA
VirtualQuery
VirtualProtect
TerminateProcess
HeapCreate
CompareStringA
SetFilePointer
OpenMutexW
GetStringTypeA
GetVersionExA
GetStartupInfoW
GetModuleFileNameA
LeaveCriticalSection
GetCommandLineW
GetCurrentProcessId
GetStartupInfoA
GetEnvironmentStringsW
GetDateFormatA
UnhandledExceptionFilter
GetEnvironmentStrings
GetFileType
SetStdHandle
HeapAlloc
GetCurrentThreadId
GetLocaleInfoA
GetModuleFileNameW
Sections
.text Size: 92KB - Virtual size: 92KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 253KB - Virtual size: 253KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 66KB - Virtual size: 90KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 42KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ