Static task
static1
Behavioral task
behavioral1
Sample
32cacf4dcc553d6b298c6f62c12a13bc24d518f7db03d4fbdd06ab5e327de92c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
32cacf4dcc553d6b298c6f62c12a13bc24d518f7db03d4fbdd06ab5e327de92c.exe
Resource
win10v2004-20220812-en
General
-
Target
32cacf4dcc553d6b298c6f62c12a13bc24d518f7db03d4fbdd06ab5e327de92c
-
Size
203KB
-
MD5
81cfc673f0741cb23332a2de98568b60
-
SHA1
cc3d5ce98dc25b9801c1d67e6ba6cdde5e6b4e57
-
SHA256
32cacf4dcc553d6b298c6f62c12a13bc24d518f7db03d4fbdd06ab5e327de92c
-
SHA512
c23873d8bc38314cd87e14df784344e2ae8654a052d9a96853ed00a31690caf9e281c54047aeda5d5644a99d05c5207a978dbd243e13e6bdb57ff90ef0508f86
-
SSDEEP
3072:v05rVMXQv4ar3sCLHxmZeX+kl6mml/f/K7ZCiEmZyGd1+K:vURvB3si4UnMmml/3KUiEmZyG
Malware Config
Signatures
Files
-
32cacf4dcc553d6b298c6f62c12a13bc24d518f7db03d4fbdd06ab5e327de92c.exe windows x86
d76a5dde23ed604e80c8985677fb6986
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetWindowLongW
ShowWindow
TranslateMessage
PeekMessageW
GetDC
ClientToScreen
EnableWindow
LoadStringW
CheckDlgButton
DestroyWindow
GetClientRect
DefWindowProcW
GetDlgItemInt
InvalidateRect
GetDlgItem
SetDlgItemInt
LoadCursorW
IsRectEmpty
GetAsyncKeyState
CheckRadioButton
SetCursor
ReleaseDC
SendMessageW
IsWindow
CreateDialogParamW
GetWindowRect
SetDlgItemTextW
GetDesktopWindow
DispatchMessageW
MoveWindow
SetWindowLongW
IsWindowVisible
kernel32
GetProcAddress
SetUnhandledExceptionFilter
lstrcpyA
GlobalUnlock
GetProfileIntA
GetSystemTimeAsFileTime
GetDiskFreeSpaceW
lstrcmpW
GetFileSize
LeaveCriticalSection
IsBadReadPtr
QueryPerformanceCounter
GlobalMemoryStatus
GetFileAttributesW
DeleteFileW
GlobalFree
GetProcessHeap
FreeLibrary
ResetEvent
MulDiv
GetTickCount
WideCharToMultiByte
GetModuleFileNameA
WaitForMultipleObjects
lstrlenA
InterlockedExchange
GetFullPathNameW
HeapFree
lstrlenW
IsBadCodePtr
GetTimeZoneInformation
GetEnvironmentStringsA
SetThreadPriority
GlobalLock
IsBadWritePtr
GetSystemInfo
GetVersionExW
WaitForSingleObject
MultiByteToWideChar
CreateThread
InterlockedIncrement
GetACP
InterlockedDecrement
EnterCriticalSection
lstrcpyW
CloseHandle
GetPrivateProfileStringW
GetLastError
lstrcpynW
GetCurrentProcess
InitializeCriticalSection
LoadLibraryW
CreateFileW
VirtualFree
SetEvent
CreateSemaphoreW
GlobalHandle
DeleteCriticalSection
ReadFile
CreateEventW
GetCurrentThread
WriteFile
ReleaseSemaphore
lstrcmpiW
HeapAlloc
GetCurrentProcessId
GetThreadPriority
SetEndOfFile
GetQueuedCompletionStatus
SetFilePointer
GlobalAlloc
cewmdm
DllRegisterServer
DllUnregisterServer
DllGetClassObject
DllCanUnloadNow
cfgmgr32
CMP_WaitNoPendingInstallEvents
CMP_WaitServicesAvailable
CM_Add_Empty_Log_Conf
CMP_Report_LogOn
CMP_Init_Detection
nddeapi
NDdeGetTrustedShareA
NDdeGetShareSecurityW
NDdeGetErrorStringA
NDdeGetTrustedShareW
NDdeIsValidAppTopicListA
NDdeGetShareSecurityA
NDdeIsValidAppTopicListW
Sections
.text Size: 81KB - Virtual size: 81KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 58KB - Virtual size: 58KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 58KB - Virtual size: 2.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ