Static task
static1
Behavioral task
behavioral1
Sample
d14bcda1462b347a246006df87aa758a33cd50d5540d22404cd05bf5919e1727.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
d14bcda1462b347a246006df87aa758a33cd50d5540d22404cd05bf5919e1727.exe
Resource
win10v2004-20220901-en
General
-
Target
d14bcda1462b347a246006df87aa758a33cd50d5540d22404cd05bf5919e1727
-
Size
109KB
-
MD5
82fd4401969a521e5803663f91093050
-
SHA1
003cf45d9c8e243cc6254a338795d6ccf5635a17
-
SHA256
d14bcda1462b347a246006df87aa758a33cd50d5540d22404cd05bf5919e1727
-
SHA512
bcefb2197bc05a9d07398e8e0e92d08a5780c87e814dce60db408df9d331da19501a8ca6e415523b712bdae60ef6d442a84e728f3c5948f56297f75090af9b63
-
SSDEEP
3072:/EJ7VcuChbFuqGxZ3zq+9S10rm00lJEr:GVIFF0xRzxc0iRE
Malware Config
Signatures
Files
-
d14bcda1462b347a246006df87aa758a33cd50d5540d22404cd05bf5919e1727.exe windows x86
1a8a9df5f0a35d699f3bff888454f705
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
cos
calloc
strncmp
wcscspn
memmove
memcpy
user32
CreateIcon
GetKeyboardState
LoadIconA
GetDC
GetMenuStringA
RedrawWindow
SetClassLongA
SendMessageA
SetTimer
GetMenuItemID
LoadCursorA
GetSysColor
MapWindowPoints
SetWindowLongA
DrawIcon
FillRect
SetActiveWindow
FindWindowA
IsWindow
OffsetRect
GetMenuItemInfoA
GetCapture
GetSysColorBrush
CharUpperBuffA
CloseClipboard
DestroyWindow
SetMenu
EnableMenuItem
EnumWindows
ChildWindowFromPoint
IsIconic
PtInRect
InvalidateRect
InsertMenuA
SetCursor
GetWindowDC
GetDesktopWindow
CharNextW
SystemParametersInfoA
GetKeyboardLayoutNameA
SetWindowTextA
FrameRect
GetTopWindow
SetScrollRange
SetWindowsHookExA
GetKeyNameTextA
GetLastActivePopup
EmptyClipboard
MapVirtualKeyA
GetCursorPos
MessageBeep
IsRectEmpty
GetMessagePos
GetWindowLongA
GetWindow
SetWindowPlacement
SetCapture
PostMessageA
DefWindowProcA
IsChild
PostQuitMessage
CreatePopupMenu
SetPropA
GetKeyState
GetScrollInfo
DestroyMenu
OpenClipboard
IsZoomed
LoadBitmapA
CharNextA
GetClassInfoA
GetScrollPos
TranslateMDISysAccel
MoveWindow
SetForegroundWindow
GetMenuItemCount
GetPropA
OemToCharA
RemovePropA
InsertMenuItemA
IsDialogMessageA
EndPaint
RemoveMenu
DrawEdge
DispatchMessageA
ReleaseCapture
GetParent
TranslateMessage
GetWindowTextA
IsWindowVisible
ShowWindow
wsprintfA
IntersectRect
DrawFrameControl
IsWindowUnicode
MessageBoxA
CharToOemA
KillTimer
EqualRect
GetWindowLongW
GetDCEx
GetScrollRange
ClientToScreen
EnableScrollBar
TrackPopupMenu
SetParent
SetScrollPos
DefMDIChildProcA
ScreenToClient
ScrollWindow
GetClassLongA
SendMessageW
PeekMessageW
GetSystemMenu
InflateRect
DestroyCursor
PeekMessageA
LoadStringA
DrawIconEx
GetKeyboardType
GetDlgItem
GetIconInfo
UpdateWindow
GetWindowRect
SetClipboardData
SetWindowLongW
GetClientRect
BeginPaint
GetForegroundWindow
CallNextHookEx
UnregisterClassA
LoadKeyboardLayoutA
CharLowerBuffA
CheckMenuItem
ShowScrollBar
CharLowerA
WaitMessage
SetScrollInfo
GetSubMenu
GetClipboardData
SetFocus
CreateWindowExA
GetMenuState
DrawAnimatedRects
GetKeyboardLayout
ShowOwnedPopups
GetFocus
RegisterClassA
MsgWaitForMultipleObjects
CreateMenu
GetSystemMetrics
UnhookWindowsHookEx
DrawTextA
GetClassNameA
GetWindowThreadProcessId
DefFrameProcA
EnumChildWindows
GetActiveWindow
SetMenuItemInfoA
DestroyIcon
RegisterClipboardFormatA
AdjustWindowRectEx
SetWindowPos
WindowFromPoint
EnumThreadWindows
GetMenu
GetKeyboardLayoutList
SetRect
ActivateKeyboardLayout
GetCursor
RegisterWindowMessageA
ReleaseDC
DispatchMessageW
IsWindowEnabled
IsDialogMessageW
CallWindowProcA
kernel32
GetFileAttributesA
GetStartupInfoA
GetStringTypeW
SetFilePointer
FreeLibrary
SizeofResource
GetFullPathNameA
lstrcpynA
SetErrorMode
GetModuleHandleA
GetStdHandle
GetFileSize
GlobalAlloc
SetHandleCount
CreateEventA
GetVersionExA
VirtualAlloc
WaitForSingleObject
Sleep
InitializeCriticalSection
LocalAlloc
GetCommandLineA
CreateThread
FindFirstFileA
GetACP
GlobalDeleteAtom
CompareStringA
VirtualAllocEx
GetSystemDefaultLangID
HeapFree
LoadResource
ExitThread
LoadLibraryExA
GetUserDefaultLCID
GetCPInfo
GetModuleFileNameA
MoveFileA
GetCurrentProcessId
HeapAlloc
lstrcpyA
lstrlenA
WideCharToMultiByte
SetEndOfFile
GlobalFindAtomA
DeleteFileA
lstrcmpiA
SetThreadLocale
EnumCalendarInfoA
GetDateFormatA
GlobalAddAtomA
GetTickCount
lstrcatA
GetDiskFreeSpaceA
SetLastError
MulDiv
ExitProcess
GetThreadLocale
FormatMessageA
GetCurrentProcess
CloseHandle
GetLastError
LocalReAlloc
ReadFile
GetFileType
GetProcessHeap
SetEvent
VirtualFree
GetCurrentThread
WriteFile
CreateFileA
FindResourceA
GetLocalTime
FreeResource
GetVersion
FindClose
ResetEvent
GetOEMCP
LockResource
GetCurrentThreadId
HeapDestroy
LocalFree
RaiseException
GetProcAddress
Sections
.text Size: 98KB - Virtual size: 97KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.bss Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
DATA Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ