?SpotJiaoLeudPiedrim@@YG_KPCUPhutDaysCyanweptSurayo@@ACU_SYSTEMTIME@@_WAC_JACEPC_J@Z
Static task
static1
Behavioral task
behavioral1
Sample
db807d848e1816b37d9f79357630078450fbe1c645e7050a6897f6f4d550aac0.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
db807d848e1816b37d9f79357630078450fbe1c645e7050a6897f6f4d550aac0.exe
Resource
win10v2004-20220812-en
General
-
Target
db807d848e1816b37d9f79357630078450fbe1c645e7050a6897f6f4d550aac0
-
Size
178KB
-
MD5
488d62ac16a2b3611ac84f1607a606ca
-
SHA1
591f93c20b32fb990ba14c54979df97b0e4e3fee
-
SHA256
db807d848e1816b37d9f79357630078450fbe1c645e7050a6897f6f4d550aac0
-
SHA512
5f4fba134c43f2cd63e076f575c315700be69271c4b4a56434abc5897fd547021ecc8e956733d5bcf240ea12ccb10a1cc2249f09358af4d16b8d61049794fe04
-
SSDEEP
3072:GvToc1rFfL1UPjl12iPWjALIP2faxPW354Zkq8AaP4gxydx81sNVsb62:Soc1rh1UPh12SqALIPAKPGqa4gMdegC
Malware Config
Signatures
Files
-
db807d848e1816b37d9f79357630078450fbe1c645e7050a6897f6f4d550aac0.exe windows x86
93b8145b227c95a4a0e2cae57965a376
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetEnvironmentVariableW
FindVolumeClose
GetConsoleMode
CompareStringA
CancelWaitableTimer
GetPrivateProfileStringA
TerminateProcess
GetSystemDefaultLangID
GetCommandLineW
GetDriveTypeW
SetErrorMode
GetCurrentProcess
GetEnvironmentStringsW
GetLogicalDrives
GetSystemDefaultLCID
GetCurrentThread
GetProcessHeap
GetCommandLineA
GetDriveTypeA
GetVolumeInformationA
CreateEventA
HeapDestroy
MulDiv
IsDBCSLeadByte
GetEnvironmentVariableA
GetACP
GetLastError
IsDBCSLeadByteEx
GetThreadLocale
IsValidCodePage
CreateSemaphoreW
CreateFileMappingW
SetCurrentDirectoryW
GetProfileStringA
SetEnvironmentVariableA
GetCurrentThreadId
GetDiskFreeSpaceExA
GetDiskFreeSpaceExW
GetCurrentProcessId
GetVolumeInformationW
user32
GetScrollPos
GetDlgItemTextA
SetWindowsHookExW
GetKeyNameTextW
CreateDialogParamW
ReleaseDC
InvalidateRgn
GetClipboardOwner
EnumClipboardFormats
IsMenu
EnableWindow
DdeQueryStringA
GetShellWindow
VkKeyScanA
GetMessagePos
CheckMenuItem
RegisterHotKey
GetDialogBaseUnits
SetClipboardViewer
SetWindowTextW
DialogBoxParamA
UnregisterHotKey
DdePostAdvise
OpenClipboard
PostThreadMessageW
RemoveMenu
IsWindow
DrawMenuBar
SwitchDesktop
IsDlgButtonChecked
SetMenu
GetMenuStringA
GetSysColor
DestroyCaret
GetDlgItem
IsWindowUnicode
GetMenuState
EnableMenuItem
GetClipboardData
GetWindowLongA
DdeCreateDataHandle
GetWindowLongW
GetScrollInfo
MapVirtualKeyA
RegisterClipboardFormatA
TrackPopupMenuEx
OpenWindowStationA
LockWindowUpdate
SetPropW
GetDoubleClickTime
IsCharUpperW
RegisterWindowMessageA
IsWindowEnabled
OemToCharBuffW
MessageBeep
GetParent
IsClipboardFormatAvailable
GetFocus
DeleteMenu
SetMenuItemBitmaps
GetSubMenu
DialogBoxIndirectParamW
TabbedTextOutW
GetLastActivePopup
IsZoomed
IsChild
GetThreadDesktop
CreateDialogParamA
ImpersonateDdeClientWindow
SetActiveWindow
GetDlgItemInt
CloseClipboard
GetUserObjectInformationA
SetCursor
Exports
Exports
Sections
.text Size: 98KB - Virtual size: 97KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.edata Size: 7KB - Virtual size: 6KB
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 23KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 40KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ