Static task
static1
Behavioral task
behavioral1
Sample
dc1aa0a1c41265d9814bfc60434407122b38dbe314c507abf2198e9131779216.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
dc1aa0a1c41265d9814bfc60434407122b38dbe314c507abf2198e9131779216.exe
Resource
win10v2004-20220901-en
General
-
Target
dc1aa0a1c41265d9814bfc60434407122b38dbe314c507abf2198e9131779216
-
Size
118KB
-
MD5
0e5896dd85f99753bf1158acc362f9c2
-
SHA1
ed5a28b2f85bfa3061ff3e48555902301ef76f4f
-
SHA256
dc1aa0a1c41265d9814bfc60434407122b38dbe314c507abf2198e9131779216
-
SHA512
f71981042fcf59c2e2861a8b604d11c5281bf1e9a2709a692481c78223aa820f088cf25e60f359bd087e19d629c116719704cc45fc39ca5810fb4b12a6d56f4a
-
SSDEEP
3072:gPJBDXWBqh8YBy2sJuUFgj7s6OJiAqxV2b8fr+1lBAi:a9X2qh8YEdJuUFgj7s3UxYP6
Malware Config
Signatures
Files
-
dc1aa0a1c41265d9814bfc60434407122b38dbe314c507abf2198e9131779216.exe windows x86
785c0bfd79fca854b75d6ebdb43359ce
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetProcessWorkingSetSize
GetCurrentDirectoryW
GlobalAlloc
GetProcessHeap
SetFileAttributesA
GetBinaryTypeA
GetBinaryTypeA
SetCalendarInfoW
CreateDirectoryExA
GetEnvironmentVariableW
GetAtomNameW
GetSystemPowerStatus
MapViewOfFile
GetBinaryTypeA
LocalSize
GetThreadLocale
FindNextVolumeMountPointA
EnumResourceNamesA
RemoveDirectoryW
FindFirstFileExA
_lopen
QueueUserWorkItem
lstrcpyA
LoadModule
CreateNamedPipeW
CloseHandle
_llseek
GetLastError
FatalExit
SignalObjectAndWait
InterlockedIncrement
SetEnvironmentVariableW
GetThreadTimes
RtlUnwind
LocalLock
LocalUnlock
GetShortPathNameW
SetSystemPowerState
FindFirstFileA
IsBadWritePtr
CancelDeviceWakeupRequest
EnumUILanguagesA
GetTimeFormatW
user32
CharLowerBuffW
SendMessageCallbackA
WINNLSEnableIME
DrawIconEx
CharUpperBuffW
GetDesktopWindow
CascadeWindows
MapDialogRect
GetClassInfoW
GetInputState
BroadcastSystemMessageA
DrawEdge
DrawTextExW
GetMessageTime
SetScrollPos
CreateIcon
SetKeyboardState
DdeQueryStringA
MapVirtualKeyA
CreateAcceleratorTableW
ExitWindowsEx
PostThreadMessageA
DrawCaption
IsCharAlphaNumericA
SetForegroundWindow
AnimateWindow
IsHungAppWindow
RedrawWindow
OpenClipboard
RemovePropW
EnableMenuItem
GetNextDlgTabItem
MonitorFromWindow
DefWindowProcA
ModifyMenuW
GetCaretBlinkTime
EnumThreadWindows
IsWindowUnicode
ValidateRgn
SetThreadDesktop
DdeInitializeA
DdeKeepStringHandle
OpenDesktopW
GetTopWindow
CharPrevA
ArrangeIconicWindows
GetSysColor
EditWndProc
DdeGetLastError
IMPGetIMEW
OemKeyScan
DdeCreateStringHandleA
DdeFreeDataHandle
LookupIconIdFromDirectoryEx
SetDlgItemInt
EnumDisplayMonitors
GetMenuItemRect
ChangeMenuW
SendDlgItemMessageA
SetDeskWallpaper
WaitMessage
GetMessagePos
LoadStringA
GetWindowTextW
ImpersonateDdeClientWindow
HideCaret
LoadStringW
SetSysColors
HiliteMenuItem
GetComboBoxInfo
GetDlgItemInt
GetUserObjectInformationW
DefFrameProcW
SystemParametersInfoA
TrackPopupMenu
GetFocus
DestroyCursor
UnloadKeyboardLayout
PostThreadMessageW
CheckDlgButton
GetMenuItemInfoA
DdeCreateStringHandleW
EnableWindow
ChildWindowFromPointEx
UnregisterHotKey
GetKeyboardLayoutNameW
DdeUninitialize
DestroyAcceleratorTable
SetDlgItemTextW
psapi
GetModuleFileNameExW
GetModuleInformation
EnumProcesses
Sections
.text Size: 71KB - Virtual size: 70KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: 512B - Virtual size: 281B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 39KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.xdata Size: 512B - Virtual size: 493B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE