Static task
static1
Behavioral task
behavioral1
Sample
f65517108bec962c5543f42eba48586d061a4bb8fcdcefef93db92d521f51ec1.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f65517108bec962c5543f42eba48586d061a4bb8fcdcefef93db92d521f51ec1.exe
Resource
win10v2004-20220901-en
General
-
Target
f65517108bec962c5543f42eba48586d061a4bb8fcdcefef93db92d521f51ec1
-
Size
184KB
-
MD5
932306b2c150f98a4b8eda43704f5d9b
-
SHA1
bb4924ba2510967be19997058aa7631b04ed7a6d
-
SHA256
f65517108bec962c5543f42eba48586d061a4bb8fcdcefef93db92d521f51ec1
-
SHA512
beee9443f250b112d71e90c45aed9fbdc22c36cb25e4c55a3e5a4fb25fee02a859ab1d33cfc93f4b2e50901a43f59cce2393051b01ad3a5dd9513671b2660871
-
SSDEEP
3072:4apERerSxpBDC2q7qIwlPsNm0ndLmN8qw31yAIeyZsyGicR0L3P:rreBDC2q7Zwl67nQOqwiKR0T
Malware Config
Signatures
Files
-
f65517108bec962c5543f42eba48586d061a4bb8fcdcefef93db92d521f51ec1.exe windows x86
bcc82ebc3a8218ccdcb2dcad373c5aec
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetThreadLocale
LoadResource
GetVersionExW
SystemTimeToFileTime
GetModuleHandleW
GetCalendarInfoW
GetACP
CreateFileW
LoadLibraryW
FreeLibrary
InterlockedExchange
lstrcmpiA
CreateMutexW
MoveFileW
VirtualFree
ReleaseMutex
GetThreadContext
GetSystemDefaultLangID
WriteFile
CloseHandle
RemoveDirectoryW
GetCurrentDirectoryW
SizeofResource
GetVersion
DeleteFileW
EnumResourceNamesA
FindClose
SetFileTime
FindNextFileW
SetFilePointer
EnumResourceLanguagesW
RaiseException
FindFirstFileW
WaitForSingleObject
CreateDirectoryW
DeleteCriticalSection
LockResource
lstrcpyW
ExitProcess
ReadFile
WideCharToMultiByte
MultiByteToWideChar
GetProcAddress
GetLocaleInfoA
GetLocaleInfoW
LocalFileTimeToFileTime
FindResourceW
GetCurrentProcessId
InterlockedDecrement
ConvertDefaultLocale
GetModuleFileNameW
GetFileAttributesW
InitializeCriticalSection
lstrcmpA
comdlg32
GetFileTitleW
advapi32
RegSetValueExW
RegDeleteKeyW
RegCreateKeyExW
RegOpenKeyW
RegEnumKeyW
RegOpenKeyExW
RegEnumKeyExW
RegCloseKey
RegQueryInfoKeyW
RegQueryValueW
RegQueryValueExW
shlwapi
PathIsUNCW
PathFindExtensionW
PathFindFileNameW
PathFileExistsW
PathStripToRootW
PathRemoveFileSpecW
PathAppendW
shell32
SHCreateDirectoryExW
SHGetSpecialFolderPathW
user32
SetRect
GetMenu
IsRectEmpty
LoadIconW
CopyAcceleratorTableW
GetNextDlgTabItem
RemovePropW
SetForegroundWindow
DefWindowProcW
SetPropW
GetPropW
CallWindowProcW
SendDlgItemMessageA
GetClassInfoW
RegisterWindowMessageW
GetClassInfoExW
RegisterClassW
IsIconic
IntersectRect
GetMessagePos
MapWindowPoints
InvalidateRgn
GetForegroundWindow
CharUpperW
OffsetRect
GetTopWindow
UpdateWindow
IsChild
GetClassLongW
InvalidateRect
SetActiveWindow
GetWindowPlacement
GetClientRect
GetMessageTime
WinHelpW
MessageBeep
IsWindow
CharNextW
EqualRect
CreateWindowExW
AdjustWindowRectEx
GetNextDlgGroupItem
DestroyMenu
winspool.drv
DocumentPropertiesW
ClosePrinter
OpenPrinterW
ole32
CoTaskMemAlloc
CoFreeUnusedLibraries
OleFlushClipboard
OleUninitialize
CoRevokeClassObject
CLSIDFromProgID
CoGetClassObject
CoInitialize
CoRegisterMessageFilter
CoUninitialize
OleInitialize
CoCreateInstance
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoTaskMemFree
OleIsCurrentClipboard
CreateILockBytesOnHGlobal
CLSIDFromString
gdi32
SaveDC
SetViewportOrgEx
CreateBitmap
ExtTextOutW
SetViewportExtEx
GetTextColor
GetClipBox
PtVisible
OffsetViewportOrgEx
SetWindowExtEx
ExtSelectClipRgn
SelectObject
GetBkColor
GetDeviceCaps
ScaleViewportExtEx
DeleteDC
SetTextColor
GetRgnBox
GetStockObject
GetMapMode
SetBkColor
SetMapMode
GetWindowExtEx
GetObjectW
TextOutW
GetViewportExtEx
Escape
ScaleWindowExtEx
RestoreDC
RectVisible
DeleteObject
CreateRectRgnIndirect
oledlg
OleUIBusyW
Sections
.text Size: 100KB - Virtual size: 100KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: 76KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 1024B - Virtual size: 364KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ