Static task
static1
Behavioral task
behavioral1
Sample
d017b3cc88b5f601ecd50370c6b4776425d177a027112e1f240e3bc2c463aa57.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d017b3cc88b5f601ecd50370c6b4776425d177a027112e1f240e3bc2c463aa57.exe
Resource
win10v2004-20220812-en
General
-
Target
d017b3cc88b5f601ecd50370c6b4776425d177a027112e1f240e3bc2c463aa57
-
Size
268KB
-
MD5
007e49becbf3b3fe351df099a9ce27a0
-
SHA1
69abc096edf6ac4d7fb2807d5e140da7ffb9e0cc
-
SHA256
d017b3cc88b5f601ecd50370c6b4776425d177a027112e1f240e3bc2c463aa57
-
SHA512
c43f2740464ef87193e86cee8cb5bf0f3d61a0350650ac66dc3bc96751d39fd21a5c4ec8c55a4d1f74e30ec77a790d12567a763905d4d5779eb05ddef68a3be3
-
SSDEEP
6144:Ch4SJm779Zent2CKJUDrgc9A5ilKrGWDgLsfcrzzo0naGG:zS87YtuJUvz9mikGU0PaGG
Malware Config
Signatures
Files
-
d017b3cc88b5f601ecd50370c6b4776425d177a027112e1f240e3bc2c463aa57.exe windows x86
0f82a01fede6478fcf75cd4657eec3b8
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_stricmp
strcspn
?raw_name@type_info@@QBEPBDXZ
free
calloc
_purecall
fclose
fopen
qsort
isprint
strrchr
strncpy
strchr
isdigit
_snprintf
_fullpath
strstr
toupper
_vsnprintf
vsprintf
_strnicmp
strncmp
sprintf
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
??1type_info@@UAE@XZ
_onexit
__dllonexit
strpbrk
strspn
tolower
__CxxFrameHandler
isspace
memmove
_splitpath
strtoul
kernel32
GetCurrentDirectoryA
VirtualLock
VirtualUnlock
GetLastError
GetFileAttributesA
DeleteFileA
CloseHandle
ReadFile
GetFileSize
CreateFileA
FreeLibrary
GetProcAddress
LoadLibraryA
GetDiskFreeSpaceA
CreateDirectoryA
GetModuleHandleA
MoveFileA
CopyFileA
GetTempFileNameA
GetWindowsDirectoryA
SetFileTime
WriteFile
GetTickCount
SetErrorMode
Sleep
GetLocalTime
GetSystemDefaultLangID
GetTimeZoneInformation
GetVersionExA
GetDriveTypeA
GetLogicalDriveStringsA
SetLastError
SetFilePointer
SetEndOfFile
GetStartupInfoA
LeaveCriticalSection
EnterCriticalSection
ExitProcess
VirtualAlloc
VirtualFree
GetSystemInfo
DeleteCriticalSection
OutputDebugStringA
InitializeCriticalSection
GetProcessHeap
HeapFree
GetCurrentThreadId
InterlockedDecrement
InterlockedIncrement
TerminateProcess
GetExitCodeProcess
GetCurrentProcess
GetVersion
FindClose
FindFirstFileA
GetModuleFileNameA
FormatMessageA
HeapAlloc
SetThreadPriority
CreateThread
CreateEventA
WaitForSingleObject
SetEvent
UnmapViewOfFile
FreeResource
SizeofResource
LockResource
LoadResource
FindResourceA
MapViewOfFile
CreateFileMappingA
GetVolumeInformationA
GetCurrentThread
GetComputerNameA
IsBadReadPtr
IsBadWritePtr
VirtualQuery
lstrcpynA
GetCurrentProcessId
user32
LoadStringA
IsWindow
MessageBoxA
wsprintfA
SetClassLongA
CheckDlgButton
MoveWindow
SetFocus
IsDlgButtonChecked
SendDlgItemMessageA
GetWindowRect
GetDC
ReleaseDC
GetClassInfoExA
CreateDialogParamA
UpdateWindow
DestroyWindow
DefWindowProcA
SetWindowPos
PostQuitMessage
LoadIconA
LoadCursorA
LoadImageA
RegisterClassExA
GetSystemMetrics
CreateWindowExA
SetWindowTextA
IsWindowVisible
EnableWindow
SetTimer
GetDlgItemTextA
GetDlgItem
ShowWindow
SetDlgItemTextA
EndDialog
DialogBoxParamA
SetForegroundWindow
GetTopWindow
GetLastActivePopup
FindWindowA
gdi32
GetDeviceCaps
GetStockObject
comctl32
ord17
advapi32
RegQueryValueExA
RegOpenKeyExA
RegDeleteKeyA
RegCloseKey
GetUserNameA
RegCreateKeyExA
RegFlushKey
RegSetValueExA
shell32
ShellExecuteA
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
Sections
.text Size: 148KB - Virtual size: 144KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 16KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 74KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 80KB - Virtual size: 78KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ