Static task
static1
Behavioral task
behavioral1
Sample
274eaf614c500f730b0a643db427d33f24ec7dd53208684899bb40df3803b9f0.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
274eaf614c500f730b0a643db427d33f24ec7dd53208684899bb40df3803b9f0.exe
Resource
win10v2004-20220901-en
General
-
Target
274eaf614c500f730b0a643db427d33f24ec7dd53208684899bb40df3803b9f0.exe
-
Size
1013KB
-
MD5
572884c093c54ca213e15366a032ccf6
-
SHA1
9cebd9e381538e36fbd252020cfef2b5957fa5ff
-
SHA256
274eaf614c500f730b0a643db427d33f24ec7dd53208684899bb40df3803b9f0
-
SHA512
18ef1d6ff6f5a860278540d712c283101c0f935209f3549b305bdb7e93f17ac7d65c7c95a04edd8e74f10827e0d8c9fc1bf970da5ee9a94bba37e0571f4a414b
-
SSDEEP
12288:7Znu4ToYEbVmI9YLEK1JYclX64Jg1QpKwzvnF3WiaaHVzlLWJc9aRczG/ontrphO:7HwC6NILOBjoKrrg42kdj5oTYmPwbd4Q
Malware Config
Signatures
Files
-
274eaf614c500f730b0a643db427d33f24ec7dd53208684899bb40df3803b9f0.exe.exe windows x86
02ebc439803e2e53130f4cd7d6bfc69b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
InitCommonControlsEx
shell32
SHGetPathFromIDListW
SHGetMalloc
ShellExecuteExW
ShellExecuteW
SHBrowseForFolderW
CommandLineToArgvW
SHGetFileInfoW
kernel32
HeapFree
GetLastError
HeapAlloc
LocalFree
GetProcessHeap
GetFileAttributesW
LoadLibraryW
CloseHandle
GetProcAddress
FreeLibrary
GetCurrentProcess
GetVersionExW
GetModuleHandleW
ExpandEnvironmentStringsW
InitializeCriticalSectionAndSpinCount
WaitForSingleObject
CreateProcessW
GetModuleFileNameW
GetCurrentDirectoryW
SetCurrentDirectoryW
SetFileApisToOEM
SetPriorityClass
SetThreadPriority
GetEnvironmentVariableW
GetCurrentThread
GetCommandLineW
FindResourceW
FindFirstFileW
FindNextFileW
FindClose
GetLongPathNameW
CreateFileW
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
GetCurrentThreadId
GetCurrentProcessId
LoadLibraryExW
WriteFile
SetFileTime
SetEndOfFile
FormatMessageW
InterlockedExchangeAdd
ReadFile
SetFilePointer
GetFileSize
ResumeThread
GetACP
MultiByteToWideChar
CreateDirectoryW
GetFullPathNameW
lstrlenW
RemoveDirectoryW
GetTempPathW
SetFileAttributesW
DeleteFileW
GetWindowsDirectoryW
MoveFileExW
GetTempFileNameW
MoveFileW
FileTimeToSystemTime
ExitProcess
CreateEventW
SetEvent
ResetEvent
WaitForMultipleObjects
GetModuleHandleExW
VirtualAlloc
VirtualFree
WriteConsoleW
DecodePointer
FreeLibraryAndExitThread
FlushFileBuffers
SetFilePointerEx
GetConsoleMode
GetConsoleCP
HeapReAlloc
HeapSize
SetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetCPInfo
GetOEMCP
IsValidCodePage
FindFirstFileExW
WideCharToMultiByte
ExitThread
CreateThread
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
EncodePointer
SetLastError
LCMapStringW
GetFileType
GetStringTypeW
GetStdHandle
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
WaitForSingleObjectEx
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
GetSystemTimeAsFileTime
InitializeSListHead
RtlUnwind
RaiseException
user32
GetWindowTextW
GetDlgItem
SetFocus
SetWindowTextW
SendMessageW
LoadStringW
GetDesktopWindow
GetMessageW
CreateDialogParamW
IsWindowVisible
ScreenToClient
DispatchMessageW
SetTimer
IsDialogMessageW
TranslateMessage
LoadIconW
KillTimer
PostQuitMessage
EnableWindow
DestroyIcon
IsWindow
MessageBoxW
ShowWindow
PostMessageW
GetWindowRect
SetWindowPos
GetSystemMetrics
DialogBoxParamW
EndDialog
gdi32
CreateSolidBrush
DeleteObject
ole32
CoCreateInstance
CoInitializeEx
CoUninitialize
CoInitialize
Sections
.text Size: 314KB - Virtual size: 313KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 86KB - Virtual size: 85KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 80KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ