Static task
static1
Behavioral task
behavioral1
Sample
d4d57854594ff4fc45df7704b4a39f04cdc386ab5b8e7f92af846b7cb7841137.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d4d57854594ff4fc45df7704b4a39f04cdc386ab5b8e7f92af846b7cb7841137.exe
Resource
win10v2004-20220812-en
General
-
Target
d4d57854594ff4fc45df7704b4a39f04cdc386ab5b8e7f92af846b7cb7841137
-
Size
168KB
-
MD5
a3a4a6f44d97b7efc15bdcc9b257c600
-
SHA1
46b60b10c1decf5880da313c009deb9a33cabc18
-
SHA256
d4d57854594ff4fc45df7704b4a39f04cdc386ab5b8e7f92af846b7cb7841137
-
SHA512
c2eb46b8aafed55c4dc97531e4fa2714e5688d84ec299acce057fcc54a85c23df18e8461d9223c881c0ad9a85764e63ecc8bc0842f5074b6dd5926e746ca0bdc
-
SSDEEP
3072:cbrr2sulqR1xkCeTBAV5Is8IC1LN4FTkT3iXnlyVmdSy7A:c3ystQmzTC1LATmgnoVd4A
Malware Config
Signatures
Files
-
d4d57854594ff4fc45df7704b4a39f04cdc386ab5b8e7f92af846b7cb7841137.exe windows x86
ce67399c442437497618ba9701334605
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
Sleep
ExitThread
CreateThread
GlobalAlloc
GlobalFree
GetFileSize
ReadFile
GetModuleFileNameW
CloseHandle
GetLocaleInfoW
GetSystemTimeAsFileTime
lstrlenA
WriteFile
WideCharToMultiByte
lstrcpynW
CreateFileW
lstrlenW
lstrcatW
lstrcpyW
lstrcmpA
lstrcpynA
CreateProcessW
GetTickCount
MultiByteToWideChar
FlushFileBuffers
SetFilePointer
SystemTimeToFileTime
SetFileTime
GetFileAttributesW
GetCurrentDirectoryW
LocalFileTimeToFileTime
FindFirstFileW
FreeLibrary
MoveFileExW
SetEvent
GetModuleHandleW
LoadLibraryW
GetProcAddress
ResetEvent
CreateEventW
FindNextFileW
GetCurrentProcessId
InitializeCriticalSection
GetSystemDirectoryW
LeaveCriticalSection
WaitForSingleObject
FindClose
GetComputerNameA
HeapAlloc
HeapFree
VirtualFree
VirtualAlloc
LoadLibraryA
GetModuleHandleA
GetSystemTime
SetWaitableTimer
CancelWaitableTimer
CreateWaitableTimerW
VirtualQuery
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
GetLocaleInfoA
HeapSize
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
RaiseException
InitializeCriticalSectionAndSpinCount
IsDebuggerPresent
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
QueryPerformanceCounter
InterlockedDecrement
ExitProcess
CreateMutexW
DeleteFileW
GetTempPathW
CreateDirectoryW
EnterCriticalSection
GetTempFileNameW
GetCurrentThreadId
SetLastError
InterlockedIncrement
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetModuleFileNameA
GetStdHandle
SetUnhandledExceptionFilter
HeapCreate
GetLastError
HeapReAlloc
GetCommandLineA
GetStartupInfoA
DeleteCriticalSection
user32
SetWindowLongW
GetWindowLongW
ShowWindow
CreateWindowExW
LoadCursorW
EnumWindows
SetSysColors
LoadIconW
SystemParametersInfoW
DefWindowProcW
RegisterClassW
EnableWindow
GetWindowThreadProcessId
DestroyWindow
GetMessageW
TranslateMessage
SetWindowPos
IsWindow
GetSystemMetrics
SendMessageW
DispatchMessageW
wsprintfA
ExitWindowsEx
wsprintfW
GetClientRect
gdi32
GetStockObject
advapi32
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
RegCloseKey
shell32
SHGetFolderPathW
ShellExecuteW
ole32
CoCreateInstance
CoInitializeEx
OleInitialize
CoGetClassObject
OleSetContainedObject
oleaut32
VariantClear
VariantInit
SysAllocString
ntdll
RtlUnwind
Sections
.text Size: 74KB - Virtual size: 74KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 800B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ