Static task
static1
Behavioral task
behavioral1
Sample
c69343b610bf80f4eae04459f304df9e9f71502a5bd3ee957722998fab1d3dd7.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c69343b610bf80f4eae04459f304df9e9f71502a5bd3ee957722998fab1d3dd7.exe
Resource
win10v2004-20220812-en
General
-
Target
c69343b610bf80f4eae04459f304df9e9f71502a5bd3ee957722998fab1d3dd7
-
Size
440KB
-
MD5
8500f91f7ed777b49195cdf02f801f00
-
SHA1
80c3e8efa06f182943d9845b3ee7d117beb0af45
-
SHA256
c69343b610bf80f4eae04459f304df9e9f71502a5bd3ee957722998fab1d3dd7
-
SHA512
bb947dd10bb7661d4561a5fe77d8cffe38a08dbc4f5ac15a8dabe4b54dd81fe99e5a882b2001bfedabea307291eb17d878065b64cbd6c2f7c47ff684e172d9b4
-
SSDEEP
12288:/Fijc+B4qMkr/QqDUjB8TmNN4hyL4f0PGjLsh9Ak86N:/Fij346rnYBpOhyLs0PG/sh9Ak86N
Malware Config
Signatures
Files
-
c69343b610bf80f4eae04459f304df9e9f71502a5bd3ee957722998fab1d3dd7.exe windows x86
4bd5d138ffcd947b6c4694e6e57238b7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
PathRemoveExtensionA
PathIsUNCA
comdlg32
GetSaveFileNameA
GetFileTitleA
user32
CreatePopupMenu
LoadAcceleratorsW
PtInRect
ShowWindow
RegisterClassW
IsWindow
RedrawWindow
GetClientRect
DestroyWindow
EndDeferWindowPos
BeginDeferWindowPos
DefWindowProcW
EnableWindow
CreateWindowExW
RegisterClassExW
GetActiveWindow
IntersectRect
UnregisterClassW
DrawTextW
ReuseDDElParam
MessageBoxW
KillTimer
GetSystemMenu
kernel32
RtlUnwind
WideCharToMultiByte
UnhandledExceptionFilter
InterlockedIncrement
FileTimeToSystemTime
MultiByteToWideChar
GetStdHandle
SetEndOfFile
GetSystemInfo
DeleteFileW
SetLastError
SetEnvironmentVariableA
IsValidCodePage
IsValidLocale
CompareStringA
TlsGetValue
GetLocaleInfoW
LCMapStringA
HeapReAlloc
lstrcmpA
VirtualProtect
FreeEnvironmentStringsW
lstrcpynW
GetCurrentProcessId
GetCurrentDirectoryA
TlsAlloc
GetSystemDirectoryA
GetOEMCP
GetStringTypeA
GetModuleHandleW
SuspendThread
GetCurrentProcess
HeapCreate
GetCommandLineA
DeleteCriticalSection
GlobalHandle
GetTimeZoneInformation
GetModuleFileNameA
GetDateFormatA
MulDiv
SetStdHandle
LoadResource
QueryPerformanceCounter
GlobalLock
GetProcAddress
TlsSetValue
GetTickCount
EnterCriticalSection
WriteFile
ResumeThread
GetCPInfo
TlsFree
ExitProcess
GetModuleFileNameW
CreateFileA
HeapAlloc
CreateMutexW
lstrlenW
GetFileType
lstrlenA
HeapSize
GetUserDefaultLCID
GetStringTypeW
FatalAppExitA
LeaveCriticalSection
FlushFileBuffers
SetFilePointer
HeapDestroy
GetEnvironmentStringsW
GetExitCodeProcess
GetCurrentThreadId
FreeEnvironmentStringsA
InterlockedExchange
GetStartupInfoW
GetSystemTimeAsFileTime
GetLastError
WriteConsoleA
GetCurrentThread
FreeResource
GetProcessHeap
GetFileSize
IsBadWritePtr
lstrcpynA
GetFileTime
GetSystemTime
ReadFile
VirtualFree
LoadLibraryA
GetLocaleInfoA
OutputDebugStringA
SizeofResource
InitializeCriticalSection
GetACP
SetHandleCount
GetCommandLineW
SetConsoleCtrlHandler
IsBadReadPtr
HeapFree
GetTimeFormatA
SetUnhandledExceptionFilter
CloseHandle
IsBadCodePtr
CompareStringW
GetEnvironmentStrings
VirtualQuery
GetModuleHandleA
GetVersionExA
GetStartupInfoA
TerminateProcess
LCMapStringW
WaitForSingleObject
RaiseException
VirtualAlloc
InterlockedDecrement
gdi32
SetDIBitsToDevice
CreateMetaFileA
GetCharWidthA
GetFontData
CreateRectRgn
CloseEnhMetaFile
GetViewportExtEx
Escape
CloseMetaFile
GetGlyphOutlineA
GetObjectA
OffsetWindowOrgEx
SetBkMode
CreateBitmap
DeleteObject
Polyline
GetStockObject
SetROP2
CopyMetaFileA
DPtoLP
CreateEnhMetaFileA
Ellipse
oleaut32
LoadTypeLi
wininet
InternetCheckConnectionA
InternetConnectA
InternetAttemptConnect
HttpSendRequestA
HttpQueryInfoA
InternetOpenA
HttpOpenRequestA
InternetGetConnectedState
Sections
.text Size: 84KB - Virtual size: 82KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 260KB - Virtual size: 256KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 68KB - Virtual size: 93KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ