Static task
static1
Behavioral task
behavioral1
Sample
d1fbe2fa868d0f9cae9579cbd9f75a324955de6a7458e692b318c19dddea4b15.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
d1fbe2fa868d0f9cae9579cbd9f75a324955de6a7458e692b318c19dddea4b15.exe
Resource
win10v2004-20220901-en
General
-
Target
d1fbe2fa868d0f9cae9579cbd9f75a324955de6a7458e692b318c19dddea4b15
-
Size
130KB
-
MD5
224d101467cffc0981102708e3e6c3d0
-
SHA1
484f58635cfbf01c82e40bed9a798dc009889ed7
-
SHA256
d1fbe2fa868d0f9cae9579cbd9f75a324955de6a7458e692b318c19dddea4b15
-
SHA512
10a8be61118a46ea910b7e7d5913d1b4ef90b07bad8a8da0510de595229768fe03c73d7526e8a9ac88271d62494a4f4fefc3dea11823fcd6e87c6ed62a508255
-
SSDEEP
3072:I3N8m6Kt/lL2jpNu1nLX9ljjjjjjjjjcSxm85yi7JR:ytwju1nLFxm8
Malware Config
Signatures
Files
-
d1fbe2fa868d0f9cae9579cbd9f75a324955de6a7458e692b318c19dddea4b15.exe windows x86
dcb419a480197d69e60957dacb206a6d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
OpenProcess
OpenSemaphoreW
ProcessIdToSessionId
QueryPerformanceCounter
ReadFile
ReleaseSemaphore
SetEndOfFile
SetErrorMode
SetEvent
SetFilePointer
SetLastError
SetUnhandledExceptionFilter
Sleep
MultiByteToWideChar
TerminateThread
UnhandledExceptionFilter
UnmapViewOfFile
WaitForSingleObject
WideCharToMultiByte
WriteFile
lstrcmpW
lstrcmpiW
lstrcpyW
lstrcpynW
lstrlenW
MulDiv
MapViewOfFile
LocalUnlock
LocalSize
LocalReAlloc
LocalLock
LocalFree
LocalAlloc
LoadResource
LoadLibraryA
InterlockedCompareExchange
GlobalUnlock
GlobalLock
GlobalFree
GetVersion
GetUserDefaultUILanguage
GetUserDefaultLCID
GetTimeFormatW
GetTickCount
GetSystemTimeAsFileTime
GetSystemInfo
GetStartupInfoA
GetProcAddress
GetModuleHandleW
GetModuleHandleA
GetModuleFileNameW
GetLocaleInfoW
GetLocalTime
GetLastError
GetFileInformationByHandle
GetFileAttributesW
GetDateFormatW
GetCurrentThreadId
GetCurrentProcessId
lstrcatW
GetComputerNameW
GetCommandLineW
GetACP
FreeLibrary
FormatMessageW
FoldStringW
FindResourceExW
FindFirstFileW
FindClose
ExpandEnvironmentStringsW
ExitProcess
DeleteFileW
CreateThread
CreateSemaphoreW
CreateFileMappingW
CreateDirectoryW
CompareStringW
CloseHandle
VirtualAlloc
GetCurrentProcess
GetStartupInfoW
GlobalAlloc
GetWindowsDirectoryA
CreateFileW
GetWindowsDirectoryW
TerminateProcess
user32
ScreenToClient
SendDlgItemMessageW
SendMessageW
SetActiveWindow
SetCursor
SetDlgItemTextA
SetDlgItemTextW
SetFocus
SetForegroundWindow
SetScrollPos
SetTimer
SetWinEventHook
SetWindowLongW
SetWindowPlacement
SetWindowTextW
ShowWindow
TranslateAcceleratorW
TranslateMessage
UnhookWinEvent
UpdateWindow
WinHelpW
wsprintfW
PeekMessageW
OpenClipboard
MoveWindow
MessageBoxW
MessageBeep
LoadStringW
LoadImageW
LoadIconW
LoadCursorW
LoadAcceleratorsW
KillTimer
IsIconic
IsDlgButtonChecked
IsDialogMessageW
IsClipboardFormatAvailable
InvalidateRect
GetWindowTextW
RegisterWindowMessageW
GetWindowLongW
GetSystemMenu
GetSubMenu
GetParent
GetMessageW
GetMenuState
GetMenu
GetKeyboardLayout
GetFocus
GetDlgItemTextW
GetDlgItem
GetDlgCtrlID
GetDesktopWindow
GetDC
GetCursorPos
GetClientRect
EnumChildWindows
EndDialog
EnableWindow
EnableMenuItem
DrawTextExW
DispatchMessageW
DialogBoxParamW
DestroyWindow
DefWindowProcW
DefDlgProcW
CreateWindowExW
CreateDialogParamW
CloseClipboard
ChildWindowFromPoint
CheckMenuItem
CharUpperW
CharNextW
CharLowerW
CallWindowProcW
AppendMenuW
LoadIconA
LoadCursorA
ReleaseDC
DefWindowProcA
GetSystemMetrics
RegisterClassW
RegisterClassExW
PostQuitMessage
GetWindowPlacement
PostMessageW
GetSysColor
GetForegroundWindow
gdi32
TextOutW
StartDocW
SetWindowExtEx
SetViewportExtEx
SetMapMode
SetBkMode
SetAbortProc
LPtoDP
GetTextMetricsW
GetTextFaceW
GetTextExtentPointW
GetTextExtentPoint32W
GetObjectW
GetDeviceCaps
EnumFontsW
EndPage
EndDoc
DeleteObject
DeleteDC
CreateFontIndirectW
CreateDCW
AbortDoc
GetStockObject
SelectObject
StartPage
GetTextMetricsA
comdlg32
GetFileTitleW
ReplaceTextW
PrintDlgExW
ChooseFontW
CommDlgExtendedError
FindTextW
GetOpenFileNameW
GetSaveFileNameW
PageSetupDlgW
advapi32
RegCreateKeyW
SetSecurityDescriptorDacl
ReportEventW
RegisterEventSourceW
RegSetValueExW
RegQueryValueExW
RegQueryValueExA
RegOpenKeyExW
RegOpenKeyExA
RegDeleteValueW
RegOpenKeyA
RegCreateKeyExW
RegCloseKey
ReadEventLogW
OpenEventLogW
IsTextUnicode
InitializeSecurityDescriptor
GetUserNameW
DeregisterEventSource
CloseEventLog
ClearEventLogW
shell32
DragFinish
DragQueryFileW
ShellAboutW
DragAcceptFiles
comctl32
CreateStatusWindowW
msvcrt
memcpy
_XcptFilter
__getmainargs
__initenv
__p__commode
__p__fmode
__set_app_type
__setusermatherr
_acmdln
_adjust_fdiv
_c_exit
_cexit
_controlfp
_except_handler3
_exit
_initterm
_snwprintf
_vsnwprintf
_wcsicmp
_wgetcwd
_wmakepath
_wsplitpath
_wtoi
_wtol
calloc
exit
free
isdigit
isprint
iswctype
localtime
malloc
realloc
sprintf
strchr
swprintf
swscanf
time
tolower
wcscat
wcscmp
wcscpy
wcslen
wcsncmp
wcsncpy
wprintf
Sections
.text Size: 107KB - Virtual size: 107KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text2 Size: 512B - Virtual size: 100B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ