Static task
static1
Behavioral task
behavioral1
Sample
d721cfaceaa3fc42edbe73be575e4906dc8340abe37d515f82f7fc596c3b99b7.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d721cfaceaa3fc42edbe73be575e4906dc8340abe37d515f82f7fc596c3b99b7.exe
Resource
win10v2004-20220901-en
General
-
Target
d721cfaceaa3fc42edbe73be575e4906dc8340abe37d515f82f7fc596c3b99b7
-
Size
324KB
-
MD5
8f1f1f4da1c1cb895bec63f9a0b0ac6e
-
SHA1
1e6e7f33db09d45792c8c459a25d77113ccdfdb2
-
SHA256
d721cfaceaa3fc42edbe73be575e4906dc8340abe37d515f82f7fc596c3b99b7
-
SHA512
474278c4ef7ff26b5c4c1ed2c6cca97fa69d34f743bdf8c7d68b00168dbdaeaac7e88deb36968415a2ab0d4b19c4155d8930a2194978bc3b2b7d94ec05469e87
-
SSDEEP
6144:GK6l/cmyyeMtohoYH1D44noGr2KZw65MyinzLvjENEEom7Z:GD/c8+hoCq4noGCa/YoE4
Malware Config
Signatures
Files
-
d721cfaceaa3fc42edbe73be575e4906dc8340abe37d515f82f7fc596c3b99b7.exe windows x86
3aff2aeddc4f52a9d4cf1c2ba71fca4d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
OutputDebugStringA
GetAtomNameA
DuplicateHandle
ExpandEnvironmentStringsW
CreateProcessA
SetupComm
SwitchToFiber
GetFileAttributesA
FormatMessageW
FreeEnvironmentStringsA
lstrcmpiA
GetConsoleMode
GetConsoleCursorInfo
GetDriveTypeA
GetSystemTime
GetTimeZoneInformation
FindResourceExA
GlobalUnlock
GetProfileStringA
GetShortPathNameW
WritePrivateProfileStringW
DebugBreak
GetUserDefaultLangID
SearchPathW
GetFileAttributesExA
GetCommModemStatus
_lread
QueryDosDeviceW
EnumResourceLanguagesW
lstrcpynA
ReleaseSemaphore
AllocConsole
GlobalReAlloc
VirtualAlloc
GetModuleHandleA
GetStartupInfoA
user32
GetAsyncKeyState
LockWindowUpdate
MapVirtualKeyW
InsertMenuItemA
SetClipboardData
ModifyMenuW
DestroyAcceleratorTable
EnumDisplaySettingsA
ShowCursor
LoadBitmapA
GetCursor
ShowWindowAsync
GetSysColorBrush
EmptyClipboard
AttachThreadInput
ToAscii
CallWindowProcA
FrameRect
UnhookWindowsHookEx
CopyRect
LoadBitmapW
GetWindowTextW
TabbedTextOutA
UnloadKeyboardLayout
CharUpperA
CreateWindowExW
ExitWindowsEx
BringWindowToTop
RegisterWindowMessageA
SetWindowLongW
wsprintfA
DestroyCursor
ChangeClipboardChain
GetTopWindow
SetUserObjectSecurity
CheckMenuRadioItem
DrawTextA
IsWindowVisible
FillRect
SetDlgItemTextW
EnumDisplayDevicesA
SendMessageW
LookupIconIdFromDirectory
ChildWindowFromPointEx
CreateIcon
IsClipboardFormatAvailable
DefFrameProcW
FindWindowA
CreateAcceleratorTableW
ScreenToClient
TranslateAcceleratorW
GetScrollPos
AppendMenuA
GetDoubleClickTime
UpdateWindow
MsgWaitForMultipleObjectsEx
GetActiveWindow
ChangeMenuA
gdi32
GetBkMode
GetWindowExtEx
CreateBitmap
SetPixelV
Polyline
ExtTextOutA
CreatePatternBrush
GetTextExtentPointW
SetROP2
GetTextExtentPointA
GetEnhMetaFileBits
CreateFontW
CloseEnhMetaFile
ExtEscape
OffsetRgn
ExtSelectClipRgn
advapi32
RegReplaceKeyW
RegDeleteValueW
CreateServiceW
DuplicateTokenEx
RegOpenKeyExA
CreateServiceA
CryptVerifySignatureW
DeleteService
RegFlushKey
RegOpenKeyA
LookupAccountSidA
CryptReleaseContext
CloseEventLog
StartServiceW
QueryServiceConfigW
GetAce
GetSecurityDescriptorGroup
GetSidIdentifierAuthority
RegSaveKeyW
MakeAbsoluteSD
RegOpenKeyW
CryptDestroyKey
SetEntriesInAclA
RegQueryValueExW
OpenServiceW
RegCloseKey
IsTextUnicode
NotifyBootConfigStatus
OpenServiceA
EnumDependentServicesW
SetSecurityDescriptorOwner
RegSetValueExA
OpenThreadToken
EnumServicesStatusA
shell32
SHAddToRecentDocs
Shell_NotifyIconW
SHGetSettings
SHFileOperationA
SHGetSpecialFolderPathA
ole32
CoGetInterfaceAndReleaseStream
CoReleaseServerProcess
CoLockObjectExternal
oleaut32
SysFreeString
SysAllocStringLen
LoadTypeLi
SafeArrayUnaccessData
VariantCopy
VariantChangeType
QueryPathOfRegTypeLi
LoadTypeLibEx
comctl32
ord17
ImageList_Duplicate
PropertySheetW
shlwapi
SHOpenRegStream2W
PathAppendW
msvcrt
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
_XcptFilter
_exit
fwprintf
_mbsnbcpy
localtime
printf
vfwprintf
swprintf
_mbctoupper
_mbsicmp
_getmbcp
strncat
_ismbcspace
wcstol
_ltoa
sscanf
_wfullpath
_eof
_ismbcdigit
remove
_wopen
exit
_strncoll
isdigit
_mkdir
_close
_mbsinc
_wgetenv
wscanf
strerror
_mbsnicmp
_wputenv
_stricmp
floor
fputws
iswctype
_wsopen
_makepath
setlocale
_ltow
fseek
_getdcwd
_wsplitpath
wcsncmp
_getche
_ismbblead
_wfreopen
_strdup
wcsncat
setvbuf
_wchmod
_controlfp
_errno
longjmp
_umask
_mbslwr
_open
_chdir
srand
Sections
ooema Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
cyogq Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
gwayqu Size: 280KB - Virtual size: 279KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
oqemik Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ