Static task
static1
Behavioral task
behavioral1
Sample
d1abcde84c5cde1e1bf7e1920601c40802ab735c0f2b685d30db361e633fd9f5.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d1abcde84c5cde1e1bf7e1920601c40802ab735c0f2b685d30db361e633fd9f5.exe
Resource
win10v2004-20220901-en
General
-
Target
d1abcde84c5cde1e1bf7e1920601c40802ab735c0f2b685d30db361e633fd9f5
-
Size
109KB
-
MD5
c2a3b585140af4095cdae92395e42a51
-
SHA1
e3adfc4aeb0639203c8bac73aa72e9ac3cff1d31
-
SHA256
d1abcde84c5cde1e1bf7e1920601c40802ab735c0f2b685d30db361e633fd9f5
-
SHA512
01a9a26c4b6ac9ff1f19823778be70d1640e3080286a7cd1d6043f3aeba59b596cd0827dc754eadf551a903ab84800238392a8357fd399df4f1f2d4dec6f7f5a
-
SSDEEP
1536:QbQtTquyqPiHFP2dNfTfFcEqU5t6Jt5TbZgFR50whQ9G11IyE2W6OGJD:9TPaHZsfTkuAJt5T1O50x+GpzG
Malware Config
Signatures
Files
-
d1abcde84c5cde1e1bf7e1920601c40802ab735c0f2b685d30db361e633fd9f5.exe windows x86
10c6a04bc0245f8267be367939d30ba9
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapDestroy
HeapCreate
VirtualFree
LoadLibraryA
GetACP
GetOEMCP
GetCPInfo
VirtualAlloc
RtlUnwind
InterlockedExchange
VirtualQuery
SetFilePointer
MultiByteToWideChar
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
SetStdHandle
VirtualProtect
GetSystemInfo
GetLocaleInfoA
FlushFileBuffers
InterlockedIncrement
WaitForMultipleObjects
GetLastError
GetModuleHandleA
ResetEvent
HeapFree
GetProcessHeap
CreateEventW
GetStdHandle
CloseHandle
GetWindowsDirectoryA
CreateFileA
lstrcatA
user32
TranslateMessage
GetMessageW
LoadImageW
GetDC
ReleaseDC
MessageBoxW
SetWindowTextW
ShowWindow
SetDlgItemTextW
SetFocus
SendMessageW
PostThreadMessageW
GetDlgItemTextW
GetDlgItem
GetWindowTextLengthW
EnableWindow
GetWindowLongW
SetWindowLongW
SendDlgItemMessageW
GetParent
PostMessageW
LoadStringW
KillTimer
DispatchMessageW
SetTimer
PostQuitMessage
LoadCursorW
LoadIconA
LoadCursorA
RegisterClassExA
CreateWindowExA
UpdateWindow
GetMessageA
DispatchMessageA
BeginPaint
EndPaint
DefWindowProcA
GetSysColor
gdi32
GetObjectW
GetDeviceCaps
CreateFontIndirectW
DeleteObject
GetStockObject
Rectangle
MoveToEx
LineTo
Ellipse
RoundRect
comdlg32
GetOpenFileNameW
advapi32
RegCloseKey
RegSetValueExW
RegCreateKeyExW
RegQueryValueExW
RegOpenKeyExW
RegQueryValueExA
RegOpenKeyExA
shell32
SHGetFolderPathW
SHBindToParent
SHGetSpecialFolderPathW
SHGetPathFromIDListW
SHBrowseForFolderW
ShellExecuteW
SHSetLocalizedName
ole32
CoInitialize
CoMarshalInterThreadInterfaceInStream
CoRegisterClassObject
CoRevokeClassObject
CoInitializeEx
CoGetInterfaceAndReleaseStream
CoCreateInstance
CoUninitialize
shlwapi
StrFormatByteSizeW
StrRetToBufW
SHSetValueW
PathFindFileNameW
PathAddExtensionW
PathAppendW
PathRemoveFileSpecW
StrStrIA
PathCombineW
Sections
.text Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 77KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 26KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ