Static task
static1
Behavioral task
behavioral1
Sample
8d22da3cb72eeecf5e775c2276079c349fe1d099a45681fc35d317ef5035c3ac.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8d22da3cb72eeecf5e775c2276079c349fe1d099a45681fc35d317ef5035c3ac.exe
Resource
win10v2004-20220812-en
General
-
Target
8d22da3cb72eeecf5e775c2276079c349fe1d099a45681fc35d317ef5035c3ac
-
Size
210KB
-
MD5
96837291acf23ad817c049f3c4ae128f
-
SHA1
f0277ee694de5be79522e2c19a177db5c87f5c69
-
SHA256
8d22da3cb72eeecf5e775c2276079c349fe1d099a45681fc35d317ef5035c3ac
-
SHA512
ef65dbc4716ec23f567db69cca355d1128bf52a62280887e0e91b7ca75fa56160dac44cae44592507f1ca5377e623c23316aaeb65b12a3cbd62b3a795042b933
-
SSDEEP
6144:iylwqQKvx4E4b7Y//KajT13Z0xEoz1ypYac5L:KTK54f+/KavxZozIpYa6L
Malware Config
Signatures
Files
-
8d22da3cb72eeecf5e775c2276079c349fe1d099a45681fc35d317ef5035c3ac.exe windows x86
d2ed31a718240e2723e9491218bac5f9
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
MulDiv
GetFileSize
GetACP
GetSystemTimeAsFileTime
lstrcpynW
SetEndOfFile
InterlockedIncrement
GlobalFree
SetThreadPriority
lstrcpyA
CreateThread
GetThreadPriority
CloseHandle
HeapFree
lstrcmpW
InterlockedDecrement
GlobalFindAtomW
GetProfileIntA
GetCurrentProcessId
CreateSemaphoreW
GetDiskFreeSpaceW
ReadFile
GetCurrentThread
GlobalUnlock
HeapAlloc
EnterCriticalSection
GetLastError
lstrlenW
LoadLibraryW
GetProcessHeap
lstrcmpiW
GetFileAttributesW
WaitForMultipleObjects
InitializeCriticalSection
InterlockedExchange
LeaveCriticalSection
lstrcpyW
SetLastError
GetPrivateProfileStringW
CreateFileW
IsBadReadPtr
IsBadWritePtr
SetEvent
WriteFile
MultiByteToWideChar
WaitForSingleObject
GetFullPathNameW
ResetEvent
SetFilePointer
GetModuleFileNameA
GetCurrentProcess
IsBadCodePtr
lstrlenA
GlobalLock
GetProcAddress
ReleaseSemaphore
GlobalMemoryStatus
GlobalHandle
CreateEventW
VirtualFree
FreeLibrary
WideCharToMultiByte
GetTickCount
GetVersionExW
GetQueuedCompletionStatus
DeleteCriticalSection
SetUnhandledExceptionFilter
GlobalAlloc
QueryPerformanceCounter
oleaut32
VarBstrFromUI1
VarBstrFromDate
VarBstrFromDisp
VarBstrFromDec
VarBstrFromUI8
VarBstrFromR4
VarBstrFromI1
VarBstrFromCy
VarBstrFromUI4
VarBstrFromI2
VarBstrFromI4
VarBstrFromR8
VarBstrFromUI2
VarBstrFromI8
user32
SetCursor
IsWindowVisible
IsRectEmpty
GetClientRect
CheckDlgButton
GetDlgItemInt
SetDlgItemTextW
InvalidateRect
SetDlgItemInt
MoveWindow
DestroyWindow
CheckRadioButton
CreateDialogParamW
GetDlgItem
GetWindowRect
DefWindowProcW
LoadStringW
LoadCursorW
PeekMessageW
DispatchMessageW
IsWindow
ShowWindow
GetWindowLongW
SetWindowLongW
ClientToScreen
GetAsyncKeyState
GetDesktopWindow
TranslateMessage
ReleaseDC
GetDC
EnableWindow
SendMessageW
cewmdm
DllGetClassObject
DllCanUnloadNow
DllRegisterServer
DllUnregisterServer
msls31
LssbGetObjDimSubline
LsCompressSubline
LssbGetDurTrailWithPensInSubline
LssbGetPlsrunsFromSubline
LssbGetNumberDnodesInSubline
LssbGetVisibleDcpInSubline
nddeapi
NDdeIsValidAppTopicListA
NDdeGetShareSecurityW
NDdeGetTrustedShareW
NDdeIsValidAppTopicListW
NDdeGetErrorStringA
NDdeGetTrustedShareA
msltus40
DllRegisterServer
DllUnregisterServer
msoeacct
HrCreateAccountManager
DllGetClassObject
ValidEmailAddress
GetDllMajorVersion
DllCanUnloadNow
msnetobj
DllCanUnloadNow
DllRegisterServer
DllUnregisterServer
DllGetClassObject
Sections
.text Size: 81KB - Virtual size: 81KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 118KB - Virtual size: 117KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 6.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ