Static task
static1
Behavioral task
behavioral1
Sample
18847481617919def623838bdc4b92bab61eefa48240bb75d9524a386116f261.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
18847481617919def623838bdc4b92bab61eefa48240bb75d9524a386116f261.exe
Resource
win10v2004-20220812-en
General
-
Target
18847481617919def623838bdc4b92bab61eefa48240bb75d9524a386116f261
-
Size
342KB
-
MD5
a3b398f475ab038fb838f5f8e54d7faf
-
SHA1
de81525eeb94f703a53955eb990223014c9186e0
-
SHA256
18847481617919def623838bdc4b92bab61eefa48240bb75d9524a386116f261
-
SHA512
f22a35996d6cfb61e2f6077b25f985de58774c803a24e19dccd02d43224355f047bb4e4f61390ee183924d448e74441a4a8b7f013e155b79a7b8ef08fe5749f1
-
SSDEEP
6144:Oq4zFMa9vCxpkER0GzeIwzGsD68wILpvxOmeaRt4ajFjWCnQH1:OJZMa9axpR0GzeI2D68wILpvxZRZA5
Malware Config
Signatures
Files
-
18847481617919def623838bdc4b92bab61eefa48240bb75d9524a386116f261.exe windows x86
66ab8af26a55fb4acc390591284462d3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
SetDlgItemTextA
MapDialogRect
BeginPaint
CallWindowProcA
CharNextA
CharPrevA
CheckDlgButton
CloseClipboard
CreateDialogParamA
CreatePopupMenu
CreateWindowExA
DefWindowProcA
DestroyWindow
DialogBoxParamA
DispatchMessageA
DrawTextA
EmptyClipboard
EnableMenuItem
EnableWindow
LoadCursorA
LoadImageA
MessageBoxIndirectA
PeekMessageA
PostQuitMessage
RegisterClassA
ScreenToClient
SendMessageA
SendMessageTimeoutA
SetClassLongA
SetClipboardData
SetCursor
OpenClipboard
SetForegroundWindow
SetTimer
SetWindowLongA
SetWindowPos
SetWindowTextA
SystemParametersInfoA
wsprintfA
TranslateMessage
LoadStringA
GetSystemMetrics
ShowWindow
GetScrollPos
TrackPopupMenu
GetDoubleClickTime
LoadBitmapA
DrawTextW
CharLowerW
AppendMenuA
GetClassWord
MessageBoxW
GetSysColorBrush
GetCaretBlinkTime
GetMessageTime
GetKeyboardLayoutNameW
GetWindowDC
GetCursor
IsZoomed
GetWindowWord
GetUserObjectInformationW
advapi32
LookupPrivilegeValueW
RegQueryValueExA
RegOpenKeyExA
RegEnumValueA
RegEnumKeyA
RegDeleteValueA
RegDeleteKeyA
RegCreateKeyExA
RegCloseKey
RegSetValueExA
gdi32
CreateFontIndirectW
CombineTransform
GetGlyphOutlineW
ExtSelectClipRgn
GetCharABCWidthsW
StrokePath
CloseMetaFile
CreatePolygonRgn
BitBlt
GetTextFaceW
ResizePalette
Polygon
SetDCBrushColor
SetROP2
GetObjectA
ExtTextOutA
PolyBezier
GetLogColorSpaceW
SetTextJustification
ResetDCW
SetMiterLimit
SetBrushOrgEx
PolyPolygon
SetMapperFlags
RestoreDC
CreateCompatibleBitmap
SetTextColor
SetBkMode
SetBkColor
SelectObject
GetDeviceCaps
DeleteObject
CreateFontIndirectA
GetMapMode
CreateBrushIndirect
version
GetFileVersionInfoA
kernel32
FreeEnvironmentStringsA
GetStdHandle
GetModuleHandleW
GetTimeZoneInformation
WideCharToMultiByte
IsDebuggerPresent
SetUnhandledExceptionFilter
GetEnvironmentStrings
GetStartupInfoA
GetSystemTimeAsFileTime
CloseHandle
CompareFileTime
CopyFileA
CreateDirectoryA
CreateFileA
FreeEnvironmentStringsW
GetEnvironmentStringsW
DeleteCriticalSection
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
HeapCreate
VirtualFree
HeapFree
QueryPerformanceCounter
GetCurrentProcessId
LeaveCriticalSection
EnterCriticalSection
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
InitializeCriticalSectionAndSpinCount
HeapAlloc
VirtualAlloc
HeapReAlloc
RtlUnwind
LCMapStringW
GetStringTypeA
GetLocaleInfoA
HeapSize
CompareStringA
CompareStringW
SetEnvironmentVariableA
UnhandledExceptionFilter
HeapSetInformation
CreateProcessA
CreateThread
SetHandleCount
GetVersion
GetCommModemStatus
LocalAlloc
EncodeSystemPointer
GetNamedPipeInfo
SetStdHandle
GetFileType
GetStringTypeW
LocalLock
CreateDirectoryW
LCMapStringA
UnmapViewOfFile
ContinueDebugEvent
DeleteFileW
TerminateProcess
GetDriveTypeA
LockResource
ExitThread
GetDiskFreeSpaceExW
OpenEventW
GetFileSize
ReadProcessMemory
DeviceIoControl
GetLogicalDriveStringsW
SetEvent
lstrcmpA
lstrlenA
lstrcpynA
lstrcmpiA
lstrcatA
WritePrivateProfileStringA
WriteFile
WaitForSingleObject
Sleep
SetFileTime
SetFilePointer
SetFileAttributesA
SetErrorMode
SetCurrentDirectoryA
SearchPathA
RemoveDirectoryA
ReadFile
MultiByteToWideChar
MulDiv
MoveFileA
LoadLibraryExA
LoadLibraryA
GlobalUnlock
GlobalLock
GlobalFree
GlobalAlloc
GetWindowsDirectoryA
GetTickCount
GetTempPathA
GetTempFileNameA
GetSystemDirectoryA
GetShortPathNameA
GetProcAddress
GetPrivateProfileStringA
GetModuleHandleA
GetModuleFileNameA
GetLastError
GetFullPathNameA
GetFileAttributesA
GetExitCodeProcess
GetDiskFreeSpaceA
GetCurrentProcess
GetCommandLineA
FreeLibrary
FindNextFileA
FindFirstFileA
FindClose
ExpandEnvironmentStringsA
ExitProcess
DeleteFileA
Sections
.text Size: 175KB - Virtual size: 175KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 119KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 128KB - Virtual size: 128KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ