Static task
static1
Behavioral task
behavioral1
Sample
39ee87f41cf6855c9861b656ee8b1286456a95e9658db7f0dd0a5ef41aa43522.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
39ee87f41cf6855c9861b656ee8b1286456a95e9658db7f0dd0a5ef41aa43522.exe
Resource
win10v2004-20220812-en
General
-
Target
39ee87f41cf6855c9861b656ee8b1286456a95e9658db7f0dd0a5ef41aa43522
-
Size
123KB
-
MD5
928c2e686d75ed022a041aa135284aeb
-
SHA1
72d3bad54c2107dc2742bb840f1bf38add86494a
-
SHA256
39ee87f41cf6855c9861b656ee8b1286456a95e9658db7f0dd0a5ef41aa43522
-
SHA512
ee7d99bd101a623f2b0e890fbfbe8a64b2fbce83aad53d218b1b2376528ddfbbc7596b9bbfa20ff850468e606cc314759c0d841aa25d9b6dd1d366ad6e686fe1
-
SSDEEP
3072:odhwqbx7SHQQVYe68CQrxlai7QdLcFEc66TGww57RRq3ofRkuXQG:shtbx7a1Vm8Va0Qd0Ec6j57b+uzX
Malware Config
Signatures
Files
-
39ee87f41cf6855c9861b656ee8b1286456a95e9658db7f0dd0a5ef41aa43522.exe windows x86
1b0b96b71dd8b2f7bd533534b132dd4e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcessHeap
LoadLibraryA
BuildCommDCBA
HeapAlloc
EnterCriticalSection
GetSystemTimeAsFileTime
InterlockedIncrement
OutputDebugStringW
UnhandledExceptionFilter
lstrcmpiW
CreateMutexW
WideCharToMultiByte
WaitForSingleObject
VirtualFree
GetModuleFileNameW
TerminateProcess
HeapFree
CreateThread
IsDebuggerPresent
SetLastError
SizeofResource
LoadLibraryExW
LeaveCriticalSection
LoadResource
WaitNamedPipeW
SetEvent
FlushInstructionCache
WaitForMultipleObjects
MultiByteToWideChar
CreateEventW
VirtualAlloc
FreeLibrary
GetCurrentProcess
InterlockedCompareExchange
TerminateThread
DeleteCriticalSection
Sleep
lstrlenW
FormatMessageW
LocalFree
GetCurrentThreadId
GetCurrentProcessId
FindResourceW
QueryPerformanceCounter
SetUnhandledExceptionFilter
CloseHandle
InterlockedExchange
ResetEvent
GetModuleHandleW
GetPriorityClass
InitializeCriticalSection
GetVersionExW
InterlockedDecrement
IsProcessorFeaturePresent
RaiseException
GetStartupInfoW
LoadLibraryW
ExitProcess
GetVersion
VirtualProtect
LoadLibraryExA
GetProcAddress
GetLastError
GetTickCount
ReleaseMutex
lstrlenA
user32
GetMessageW
AppendMenuW
CallWindowProcW
SetMenuItemInfoW
GetSysColorBrush
SetMenuDefaultItem
LoadImageW
DestroyMenu
RegisterWindowMessageW
GetMenuItemCount
SetTimer
PostMessageW
FillRect
TrackPopupMenu
GetClassInfoExW
KillTimer
CreateWindowExW
PostQuitMessage
DestroyIcon
GetSysColor
GetSubMenu
DefWindowProcW
LoadMenuW
LoadStringW
DispatchMessageW
SystemParametersInfoW
DrawIconEx
IsWindow
DrawTextW
GetMenuItemInfoW
ReleaseDC
SetForegroundWindow
FindWindowW
LoadCursorW
GetDoubleClickTime
IsMenu
GetDC
SetWindowLongW
CreatePopupMenu
TranslateMessage
RegisterClassExW
UnregisterClassA
GetSystemMetrics
DestroyWindow
DeleteMenu
CharNextW
GetCursorPos
GetWindowLongW
gdi32
SetTextColor
DeleteObject
SelectObject
CreateFontIndirectW
SetBkColor
advapi32
RegQueryValueExW
RegEnumKeyExW
RegDeleteKeyW
RegCreateKeyExW
RegCloseKey
RegDeleteValueW
GetUserNameA
RegEnumValueW
RegOpenKeyExW
RegSetValueExW
RegNotifyChangeKeyValue
RegQueryInfoKeyW
ole32
CoTaskMemRealloc
CoUninitialize
CoTaskMemFree
CoTaskMemAlloc
CoInitialize
CoCreateInstance
oleaut32
VarUI4FromStr
wldap32
ord197
Sections
.text Size: 70KB - Virtual size: 69KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.shit Size: - Virtual size: 9KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 35KB - Virtual size: 57KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ