Static task
static1
Behavioral task
behavioral1
Sample
03185b7381d605b6ce6439bc6ccfece9763292522aa5d8de7ce4c89693c1ebed.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
03185b7381d605b6ce6439bc6ccfece9763292522aa5d8de7ce4c89693c1ebed.exe
Resource
win10v2004-20220901-en
General
-
Target
03185b7381d605b6ce6439bc6ccfece9763292522aa5d8de7ce4c89693c1ebed
-
Size
224KB
-
MD5
7c055eecf2cb40f44ebd075edb5daa5f
-
SHA1
574aab9c04131f2307382f970580266254508f9f
-
SHA256
03185b7381d605b6ce6439bc6ccfece9763292522aa5d8de7ce4c89693c1ebed
-
SHA512
12886b0d0c00fb0f654ebab73f102639a0ebe65e749c36cffffa5c9b081d146a6802b759ea28efad8e6a6a2e4bc0fd512356f47a56d47d614f5fdef2a0cd6098
-
SSDEEP
3072:OGPF9GnUX6dezvoZ4XuWakLdaZuHJDSeAxkfCj/sHHW62ZjhVBNwSC9zMbmuS+h6:L99RAov09cLdaAHJDSj+fw/rjhVB
Malware Config
Signatures
Files
-
03185b7381d605b6ce6439bc6ccfece9763292522aa5d8de7ce4c89693c1ebed.exe windows x86
d5cd2765245755f986494e73d2d7ac19
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
oleaut32
LoadTypeLi
comctl32
ImageList_GetImageInfo
ImageList_AddMasked
ImageList_SetDragCursorImage
ImageList_SetOverlayImage
ImageList_GetBkColor
ImageList_Write
ImageList_Read
ImageList_Replace
ImageList_Create
ImageList_BeginDrag
ImageList_SetBkColor
ord17
ImageList_Destroy
ImageList_DragEnter
ImageList_DragMove
ImageList_GetImageCount
ImageList_ReplaceIcon
ImageList_GetDragImage
PropertySheetA
ImageList_EndDrag
ImageList_Draw
CreatePropertySheetPageA
DestroyPropertySheetPage
ImageList_LoadImageA
ImageList_Remove
ImageList_GetIcon
ImageList_DragLeave
ImageList_Add
ImageList_Merge
ImageList_DragShowNolock
user32
DestroyWindow
FindWindowA
DrawEdge
ShowCaret
GetParent
TranslateAcceleratorA
CreateWindowExA
RegisterClassA
ShowScrollBar
EnableWindow
DestroyMenu
IsZoomed
SetCapture
MessageBoxA
IsClipboardFormatAvailable
CreatePopupMenu
LoadStringA
CharNextA
SetCursor
RegisterClassExA
EndPaint
DestroyCursor
LoadImageA
RegisterWindowMessageA
IsWindow
ShowWindow
GetSysColor
SetFocus
GetMessageA
SetWindowTextA
GetClientRect
InsertMenuA
ClientToScreen
GetUpdateRect
EndDialog
BeginPaint
GetFocus
TranslateMessage
EnumChildWindows
SendDlgItemMessageA
CheckMenuItem
InvalidateRect
SetWindowPos
GetForegroundWindow
DefWindowProcA
PtInRect
gdi32
GetCurrentPositionEx
SetPixel
GetTextCharsetInfo
SetPolyFillMode
GetTextFaceA
StretchBlt
CreateDIBitmap
GetTextMetricsA
ExcludeClipRect
SetBkColor
SetStretchBltMode
ExtCreatePen
DPtoLP
CreateCompatibleDC
GetTextAlign
SetTextColor
ScaleWindowExtEx
CreatePen
SetViewportExtEx
GetDIBits
GetTextExtentPoint32A
GetROP2
DeleteObject
StretchDIBits
GetWindowExtEx
SaveDC
GetObjectA
GetViewportExtEx
GetPixel
RoundRect
SetRectRgn
CreatePalette
Rectangle
CreateSolidBrush
PtInRegion
GetStockObject
GetTextExtentPointA
CreatePolygonRgn
RealizePalette
ExtSelectClipRgn
OffsetViewportOrgEx
RestoreDC
Escape
RectVisible
SelectObject
ScaleViewportExtEx
CopyMetaFileA
Polyline
GetBoundsRect
GetTextColor
CreateDCA
GetDeviceCaps
SelectPalette
CreateRectRgn
EnumFontFamiliesA
IntersectClipRect
GetMapMode
SetPaletteEntries
PtVisible
CreatePatternBrush
GetCharWidthA
kernel32
HeapReAlloc
GetCurrentProcessId
VirtualFree
GetTickCount
FreeEnvironmentStringsA
TlsSetValue
GetProcAddress
FatalAppExitA
TerminateProcess
IsBadWritePtr
VirtualQuery
VirtualAlloc
InterlockedExchange
LeaveCriticalSection
GetCommandLineA
InterlockedIncrement
IsBadReadPtr
InterlockedDecrement
SetEnvironmentVariableA
GetACP
HeapFree
SetStdHandle
SetFilePointer
SetHandleCount
WideCharToMultiByte
GetStringTypeA
GetFileType
GetEnvironmentStringsW
GetLocalTime
MultiByteToWideChar
RtlUnwind
TlsGetValue
GetModuleHandleA
UnhandledExceptionFilter
GetCurrentThread
SetUnhandledExceptionFilter
GetSystemTime
GetModuleFileNameA
GetSystemTimeAsFileTime
SetConsoleCtrlHandler
EnterCriticalSection
CreateMutexA
HeapAlloc
GetStringTypeW
CloseHandle
QueryPerformanceCounter
RaiseException
CompareStringW
LoadLibraryA
WriteFile
HeapDestroy
GetLastError
TlsFree
IsBadCodePtr
CompareStringA
GetEnvironmentStrings
LCMapStringW
GetCurrentProcess
TlsAlloc
ReadFile
FreeEnvironmentStringsW
InitializeCriticalSection
DeleteCriticalSection
FlushFileBuffers
SetLastError
GetOEMCP
GetCurrentThreadId
GetStartupInfoA
GetTimeZoneInformation
LCMapStringA
HeapCreate
GetStdHandle
GetCPInfo
ExitProcess
GetVersion
advapi32
RegQueryValueExA
RegGetKeySecurity
RegEnumKeyA
GetSidIdentifierAuthority
RegCreateKeyExA
InitializeSecurityDescriptor
RegCloseKey
RegDeleteValueA
GetLengthSid
comdlg32
GetOpenFileNameA
GetFileTitleA
GetSaveFileNameA
ChooseColorA
Sections
.text Size: 56KB - Virtual size: 54KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 68KB - Virtual size: 64KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 52KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 44KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ