Static task
static1
Behavioral task
behavioral1
Sample
8201b96c3200b4733429e04a25e6213a81f69348947a74f4a3dfb4956813e725.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8201b96c3200b4733429e04a25e6213a81f69348947a74f4a3dfb4956813e725.exe
Resource
win10v2004-20220812-en
General
-
Target
8201b96c3200b4733429e04a25e6213a81f69348947a74f4a3dfb4956813e725
-
Size
622KB
-
MD5
eedd6eec3220ba06090132e67e2075d9
-
SHA1
10ffbea46bea0d388357e33fa154f27cb3b2aa3b
-
SHA256
8201b96c3200b4733429e04a25e6213a81f69348947a74f4a3dfb4956813e725
-
SHA512
5a683047782fdccc375ea56ede4e6b4381100993b034e4ccaf5badb5400d7bad4856b33524551ef758c62cc15fab33c742836805450d56579594b8d203b01a30
-
SSDEEP
12288:dATTX3m0/zSknQPmbFlXTPhvHA7azeJIp:GTT2qbFR9A7aCIp
Malware Config
Signatures
Files
-
8201b96c3200b4733429e04a25e6213a81f69348947a74f4a3dfb4956813e725.exe windows x86
375e99c150899f4a1953b1fbd5bea5aa
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetSystemDirectoryA
InterlockedIncrement
InterlockedDecrement
GetPrivateProfileStringA
WritePrivateProfileStringA
GetShortPathNameA
GetWindowsDirectoryA
TerminateProcess
GetLastError
CreateProcessA
GetModuleFileNameA
GetCurrentThreadId
GetTickCount
lstrlenA
FindFirstFileA
FindNextFileA
FindClose
DeleteFileA
RemoveDirectoryA
lstrcatA
WriteProfileStringA
GlobalLock
_lclose
GlobalHandle
GlobalUnlock
Sleep
LoadLibraryA
OpenProcess
CloseHandle
FreeResource
GetProcAddress
FreeLibrary
LockResource
FindResourceA
LoadResource
_lread
_lopen
_llseek
GetProfileIntA
GlobalAlloc
GetVersion
GetExitCodeProcess
SetEnvironmentVariableA
GetTimeZoneInformation
SetEndOfFile
CreateFileA
CompareStringA
SetStdHandle
GetStringTypeW
FlushFileBuffers
LCMapStringW
LCMapStringA
GetStringTypeA
RtlUnwind
GetFileType
MultiByteToWideChar
SetHandleCount
GetEnvironmentStringsW
GetStdHandle
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetEnvironmentStrings
CompareStringW
GlobalFree
GetSystemTimeAsFileTime
MoveFileA
WriteFile
SetFilePointer
UnhandledExceptionFilter
HeapReAlloc
ReadFile
VirtualFree
HeapCreate
VirtualAlloc
GetOEMCP
GetACP
HeapDestroy
GetCurrentDirectoryA
GetCPInfo
WideCharToMultiByte
GetCurrentProcess
GetFullPathNameA
GetCommandLineA
GetStartupInfoA
ExitProcess
GetLocalTime
GetSystemTime
GetModuleHandleA
HeapAlloc
GetDriveTypeA
HeapFree
FileTimeToSystemTime
GetFileAttributesA
SetFileAttributesA
FileTimeToLocalFileTime
user32
ReleaseDC
FillRect
WaitForInputIdle
PostQuitMessage
GetDC
PostThreadMessageA
GetClientRect
PostMessageA
ShowCursor
PeekMessageA
IsWindow
GetWindowThreadProcessId
GetSystemMetrics
AttachThreadInput
SetForegroundWindow
GetTopWindow
SetWindowPos
ShowWindow
GetForegroundWindow
SystemParametersInfoA
EnumWindows
FindWindowExA
SendMessageA
GetWindowLongA
MessageBoxA
DialogBoxParamA
GetWindow
LoadStringA
CheckDlgButton
GetDlgItem
EnableWindow
SetTimer
DefWindowProcA
KillTimer
CreateWindowExA
LoadIconA
RegisterClassA
GetParent
InvalidateRect
UpdateWindow
CreateDialogParamA
BeginPaint
EndPaint
TranslateMessage
GetMessageA
IsDialogMessageA
SetRect
DispatchMessageA
DestroyWindow
GetDlgItemTextA
IsDlgButtonChecked
gdi32
SetDIBitsToDevice
SelectObject
CreateCompatibleDC
StretchBlt
BitBlt
RealizePalette
GetObjectA
TextOutA
SetBkColor
SelectPalette
GetStockObject
GetTextMetricsA
SetTextColor
DeleteObject
CreateDIBitmap
CreatePalette
DeleteDC
advapi32
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
Sections
.text Size: 68KB - Virtual size: 66KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Shared Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 88KB - Virtual size: 87KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ