Static task
static1
Behavioral task
behavioral1
Sample
92a7cd6016f958641cce32e4e447a29d8d9603a9cf4d2fdfb9ca1c0a393c8ac1.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
92a7cd6016f958641cce32e4e447a29d8d9603a9cf4d2fdfb9ca1c0a393c8ac1.exe
Resource
win10v2004-20220812-en
General
-
Target
92a7cd6016f958641cce32e4e447a29d8d9603a9cf4d2fdfb9ca1c0a393c8ac1
-
Size
207KB
-
MD5
83ac282734cecebe7d558c364b451890
-
SHA1
8ad1b1c8b703f5f0cf024225ee189dde1268ca2a
-
SHA256
92a7cd6016f958641cce32e4e447a29d8d9603a9cf4d2fdfb9ca1c0a393c8ac1
-
SHA512
00a91aa98cc17f36f5d8d940bd3da5068a67be44d8268de50788484af4eb9c788ec75656c710cdf70570cd68941ac2a6689e5e4a5d04de751821ba3f4de06239
-
SSDEEP
6144:6x6FU1ciicpoXuhJG8Doek8T8IBnsEUVvT:64K65cPhJxDYw8ksEUNT
Malware Config
Signatures
Files
-
92a7cd6016f958641cce32e4e447a29d8d9603a9cf4d2fdfb9ca1c0a393c8ac1.exe windows x86
ff25993db4e48d85fc5d18295f3c96fd
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetThreadPriority
HeapFree
GetLocaleInfoA
SetEndOfFile
lstrcmpiW
IsBadWritePtr
CloseHandle
MultiByteToWideChar
ReadFile
InterlockedExchange
GetPrivateProfileStringW
GetFileAttributesW
GetFullPathNameW
CreateEventW
lstrcpyA
GetCurrentProcess
SetThreadPriority
GlobalUnlock
SetEvent
lstrlenW
HeapAlloc
lstrcpyW
SetLastError
lstrcmpW
GlobalHandle
GetFileSize
InterlockedIncrement
WaitForMultipleObjects
IsBadReadPtr
WideCharToMultiByte
QueryPerformanceCounter
GlobalFindAtomA
VirtualFree
GetLastError
GetCurrentProcessId
WaitForSingleObject
InitializeCriticalSection
ReleaseSemaphore
GetSystemTimeAsFileTime
GetProcessHeap
DeleteCriticalSection
lstrcpynW
LoadLibraryW
CreateFileW
GetQueuedCompletionStatus
FreeLibrary
EnterCriticalSection
GetDiskFreeSpaceW
SetUnhandledExceptionFilter
GetACP
GetVersionExW
GlobalFree
GlobalLock
GetCurrentThread
CreateSemaphoreW
GlobalAlloc
IsBadCodePtr
ResetEvent
InterlockedDecrement
WriteFile
SetFilePointer
LeaveCriticalSection
MulDiv
GetProfileIntA
lstrlenA
GetProcAddress
GlobalMemoryStatus
GetTickCount
GetModuleFileNameA
CreateThread
oleaut32
VarBstrFromI2
VarBstrFromUI4
VarBstrFromUI8
VarBstrFromUI1
VarBstrFromDec
VarBstrFromDisp
VarBstrFromI8
VarBstrFromR8
VarBstrFromI1
VarBstrFromDate
VarBstrFromR4
VarBstrFromUI2
VarBstrFromCy
VarBstrFromI4
user32
IsWindow
IsRectEmpty
SendMessageW
EnableWindow
GetWindowLongW
ShowWindow
SetDlgItemTextW
ClientToScreen
GetDlgItem
DestroyWindow
LoadCursorW
CheckRadioButton
TranslateMessage
SetDlgItemInt
IsWindowVisible
CheckDlgButton
GetDC
GetAsyncKeyState
LoadStringW
DispatchMessageW
InvalidateRect
GetClientRect
ReleaseDC
CreateDialogParamW
GetDesktopWindow
SetWindowLongW
GetDlgItemInt
SetCursor
GetWindowRect
MoveWindow
DefWindowProcW
PeekMessageW
msls31
LssbGetNumberDnodesInSubline
LssbGetVisibleDcpInSubline
LssbGetDurTrailWithPensInSubline
LssbGetObjDimSubline
LsCompressSubline
LssbGetPlsrunsFromSubline
Sections
.text Size: 82KB - Virtual size: 81KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 117KB - Virtual size: 116KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 6.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ