Static task
static1
Behavioral task
behavioral1
Sample
679eed47dc9a42b209aca8aa295b0b250ae01731612095d689e0e97f5eb346c3.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
679eed47dc9a42b209aca8aa295b0b250ae01731612095d689e0e97f5eb346c3.exe
Resource
win10v2004-20220812-en
General
-
Target
679eed47dc9a42b209aca8aa295b0b250ae01731612095d689e0e97f5eb346c3
-
Size
266KB
-
MD5
ab7b09290b17b37838d19091c2c3b8e7
-
SHA1
45947f823c6efaed769f71f7eae5c482ed8e1464
-
SHA256
679eed47dc9a42b209aca8aa295b0b250ae01731612095d689e0e97f5eb346c3
-
SHA512
f118d19c266c4d7faadbbda6b4a57fae356db261ba0ed13420a7d2438906c0d33d483f21145e1c2a436f34ae62f9e7cd0e47a3a45d5facd787f7fedcf1b81ceb
-
SSDEEP
3072:CyTWc8Iv9PO9+VkKCog9aUsUVLBMFwWEoKqx9N46BRZaL0Ep6mSx5zVuX+hlKTtp:lVCq33SL0EAPzkDYX2UQPcvQbWO
Malware Config
Signatures
Files
-
679eed47dc9a42b209aca8aa295b0b250ae01731612095d689e0e97f5eb346c3.exe windows x86
9a9f30f025adcca6a0743c09f21c8299
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
GetDCPenColor
GetClipRgn
GetMetaRgn
GetCurrentObject
GetDeviceCaps
GetGraphicsMode
GetNearestPaletteIndex
GetPixelFormat
GetPolyFillMode
GetRandomRgn
GetStretchBltMode
GetSystemPaletteUse
GetTextCharacterExtra
GetTextAlign
GetTextColor
GetTextCharsetInfo
GetFontLanguageInfo
GetFontUnicodeRanges
SetSystemPaletteUse
SetTextCharacterExtra
SetTextColor
SetTextAlign
user32
LoadIconA
GetWindowLongA
GetCursor
GetMenuContextHelpId
GetWindowContextHelpId
SetWindowTextA
RemovePropA
GetPropA
GetScrollPos
EndPaint
GetWindowDC
GetDC
WindowFromDC
DrawTextA
GetMenuItemCount
GetMenuItemID
GetMenu
IsWindowEnabled
EnableWindow
IsWindowUnicode
GetQueueStatus
GetInputState
SetFocus
GetDialogBaseUnits
CheckDlgButton
SetDlgItemTextA
GetDlgItem
EndDialog
MoveWindow
ShowWindow
CallWindowProcA
PostMessageA
SendMessageA
kernel32
SetEnvironmentVariableA
ReadConsoleW
ReadFile
SetEndOfFile
GetTimeZoneInformation
WriteConsoleW
SetFilePointerEx
SetStdHandle
CreateFileW
GetCurrentDirectoryW
GetFullPathNameW
PeekNamedPipe
GetFileInformationByHandle
FileTimeToLocalFileTime
GetStringTypeW
OutputDebugStringW
HeapReAlloc
LCMapStringW
CompareStringW
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetModuleFileNameA
GetConsoleMode
GetConsoleCP
FileTimeToSystemTime
DeleteFileA
FindClose
FlushFileBuffers
GetFileType
SetFilePointer
WriteFile
IsDebuggerPresent
CloseHandle
GetLastError
GetProcessHeap
GetCurrentProcess
GetCurrentProcessId
CreateThread
GetCurrentThreadId
IsProcessorFeaturePresent
GetVersion
GetTickCount
GetModuleHandleA
GetProcAddress
LoadResource
LockResource
SizeofResource
GlobalAlloc
GlobalSize
GlobalFlags
GlobalHandle
LocalFlags
MoveFileA
EncodePointer
DecodePointer
ExitProcess
GetModuleHandleExW
AreFileApisANSI
MultiByteToWideChar
WideCharToMultiByte
HeapFree
HeapAlloc
GetSystemTimeAsFileTime
GetCommandLineA
RaiseException
RtlUnwind
HeapSize
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
UnhandledExceptionFilter
SetUnhandledExceptionFilter
SetLastError
InitializeCriticalSectionAndSpinCount
Sleep
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetModuleHandleW
GetStdHandle
GetModuleFileNameW
LoadLibraryExW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
FindFirstFileExW
GetDriveTypeW
SystemTimeToTzSpecificLocalTime
Sections
.text Size: 192KB - Virtual size: 192KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 51KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ