Static task
static1
Behavioral task
behavioral1
Sample
666ecfb29317c7abb2cae339acf14fb09cb58cd3c4260910aa9b09ad4c3a5eca.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
666ecfb29317c7abb2cae339acf14fb09cb58cd3c4260910aa9b09ad4c3a5eca.exe
Resource
win10v2004-20220812-en
General
-
Target
666ecfb29317c7abb2cae339acf14fb09cb58cd3c4260910aa9b09ad4c3a5eca
-
Size
249KB
-
MD5
849408b323c6d83ea5b17243d671cf40
-
SHA1
34db765e22847e129a447e3703a191aaacfd821a
-
SHA256
666ecfb29317c7abb2cae339acf14fb09cb58cd3c4260910aa9b09ad4c3a5eca
-
SHA512
660d019c39a28c3a5c272b68e9fdf842d04614bbcd9c62b817810fb6a7b4211075ab0f57d235809ac96504ef3143cb7a71e5f1e2b57d775162d5211f2653a1b9
-
SSDEEP
3072:XWohuuzBBwOQxPjOrTHAyz3f4kfYlhFjGlXqKjVhDtwCiLn+vrSrVAt2OdZYslvd:mEukByOMOvV3wPl4q4DtwVnTWZdBFWuT
Malware Config
Signatures
Files
-
666ecfb29317c7abb2cae339acf14fb09cb58cd3c4260910aa9b09ad4c3a5eca.exe windows x86
3e69df9c618a2a91aae1f510c352e149
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetClientRect
comdlg32
GetSaveFileNameW
GetOpenFileNameW
ChooseColorW
PrintDlgW
shell32
SHGetMalloc
ShellExecuteW
DragQueryPoint
DragQueryFileW
Shell_NotifyIconW
SHGetPathFromIDListW
SHBrowseForFolderW
DragFinish
SHGetSpecialFolderLocation
ole32
CoUninitialize
CoInitialize
advapi32
RegQueryValueExW
RegSetValueExW
RegCreateKeyExW
RegDeleteValueW
RegDeleteKeyW
IsTextUnicode
RegQueryInfoKeyW
RegEnumKeyExW
RegCloseKey
RegOpenKeyExW
dbghelp
SymLoadModule
SymFromAddr
SymGetOptions
SymGetModuleBase64
SymGetModuleBase
SymEnumerateSymbolsW
comctl32
ImageList_Create
ImageList_ReplaceIcon
ImageList_Destroy
ImageList_GetImageInfo
ImageList_DragEnter
ImageList_Draw
ImageList_AddMasked
ImageList_SetIconSize
InitCommonControlsEx
ImageList_EndDrag
ImageList_BeginDrag
ImageList_GetImageCount
ImageList_DragMove
ImageList_DragShowNolock
ImageList_Add
_TrackMouseEvent
shlwapi
PathFindExtensionW
PathFindFileNameW
PathRemoveExtensionW
PathCompactPathExW
PathIsDirectoryW
PathMatchSpecW
PathRemoveFileSpecW
PathAppendW
PathAddExtensionW
PathIsRelativeW
PathStripPathW
PathFileExistsW
kernel32
GetStringTypeW
GetStringTypeA
LCMapStringW
MultiByteToWideChar
GetConsoleMode
FlushFileBuffers
CompareStringA
SetEnvironmentVariableA
CloseHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetStdHandle
GetConsoleCP
SetFilePointer
CreateFileA
GetSystemTimeAsFileTime
LCMapStringA
GetLocaleInfoA
HeapSize
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
RtlUnwind
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetFileType
EnumDateFormatsExW
GetComputerNameA
CompareStringW
GetTapeStatus
FindFirstFileExA
DuplicateHandle
GetCommandLineW
GlobalSize
GetLastError
HeapFree
GetTimeZoneInformation
GetModuleHandleW
Sleep
GetProcAddress
ExitProcess
GetCommandLineA
GetStartupInfoA
HeapCreate
VirtualFree
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
HeapAlloc
VirtualAlloc
HeapReAlloc
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
WideCharToMultiByte
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
WriteFile
GetStdHandle
GetModuleFileNameA
LoadLibraryA
InitializeCriticalSectionAndSpinCount
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
Sections
.text Size: 45KB - Virtual size: 45KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 104KB - Virtual size: 103KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ