?buildPreference@@YGEUsimulatecorW@@@Z
Static task
static1
Behavioral task
behavioral1
Sample
f22e67fb14f82920349c0cca627065b87b9d56a4f08e8c26627aa0aab44124b7.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f22e67fb14f82920349c0cca627065b87b9d56a4f08e8c26627aa0aab44124b7.exe
Resource
win10v2004-20220901-en
General
-
Target
f22e67fb14f82920349c0cca627065b87b9d56a4f08e8c26627aa0aab44124b7
-
Size
157KB
-
MD5
21b8fb360fc921222c98a40f6e664ef6
-
SHA1
fd6fbb8d8731b0430edd82a2e6daadf1b0c89074
-
SHA256
f22e67fb14f82920349c0cca627065b87b9d56a4f08e8c26627aa0aab44124b7
-
SHA512
8ae3b88e803b75faa96359446d7982d068106b3ee22f1247fbf61073d47f3e291acedd95131d625d248b87eca6f56b444fc67b40da82263ea8c81fc1a68254d2
-
SSDEEP
3072:3WYBev4zxSe8X5O9louwQZFO1xVh8p3v9KvMla1WGG6Hpj23F:3jBev4zxJ8tuwMFOlMlKgCWdsy
Malware Config
Signatures
Files
-
f22e67fb14f82920349c0cca627065b87b9d56a4f08e8c26627aa0aab44124b7.exe windows x86
7eba770a1a6f3e447a0ecbfd3c67d89b
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
comdlg32
GetSaveFileNameW
PrintDlgW
GetOpenFileNameW
GetSaveFileNameA
CommDlgExtendedError
ReplaceTextW
PageSetupDlgW
FindTextW
ChooseFontW
ChooseColorW
GetFileTitleW
PrintDlgExW
GetOpenFileNameA
advapi32
RegSetValueExA
RegQueryValueExW
OpenEventLogW
CryptCreateHash
NotifyBootConfigStatus
OpenSCManagerW
LookupAccountNameW
RegQueryValueExA
CryptDecrypt
OpenEventLogA
CryptDeriveKey
RegisterServiceCtrlHandlerW
RegOpenKeyW
RegSetValueExW
InitializeAcl
CryptDestroyKey
RegCreateKeyW
EqualSid
LookupAccountSidW
RegOpenKeyExW
RegCreateKeyA
RegEnumKeyExA
CryptReleaseContext
RegDeleteValueA
RegEnumValueA
RegEnumKeyA
GetLengthSid
CryptDestroyHash
RegCloseKey
RegOpenKeyExA
RegQueryInfoKeyA
RegCreateKeyExA
OpenServiceW
RegCreateKeyExW
CryptHashData
RegDeleteKeyA
RegEnumKeyW
ControlService
SetServiceStatus
RegOpenKeyA
comctl32
ImageList_Remove
ImageList_GetIconSize
ImageList_Create
CreatePropertySheetPageA
ImageList_GetImageCount
CreateToolbarEx
CreatePropertySheetPageW
ImageList_LoadImageW
ImageList_SetIconSize
ImageList_Read
ImageList_AddMasked
ImageList_Destroy
PropertySheetW
PropertySheetA
CreateStatusWindowW
InitCommonControlsEx
ImageList_Write
ImageList_GetIcon
DestroyPropertySheetPage
ImageList_Draw
ImageList_ReplaceIcon
user32
GetActiveWindow
FindWindowW
ActivateKeyboardLayout
IsDlgButtonChecked
kernel32
GetDateFormatW
SearchPathW
LCMapStringA
OpenEventA
Sleep
RaiseException
GetTempFileNameA
CreateWaitableTimerA
TlsSetValue
DeleteAtom
GlobalHandle
RtlUnwind
LoadLibraryA
GetModuleFileNameA
WriteFile
GetWindowsDirectoryW
GlobalFindAtomW
SetThreadExecutionState
lstrcmpW
LocalUnlock
GetFileAttributesA
FileTimeToLocalFileTime
GetThreadLocale
ConvertDefaultLocale
HeapCreate
GlobalGetAtomNameA
UnlockFile
CreateEventA
FindNextChangeNotification
CreateFileA
CompareFileTime
FreeResource
WaitForSingleObjectEx
GetACP
MoveFileA
GetFullPathNameA
lstrcmpiW
RemoveDirectoryA
IsValidLocale
SetThreadLocale
GetFileInformationByHandle
GetCommandLineA
FileTimeToDosDateTime
SetSystemTimeAdjustment
GlobalReAlloc
TlsGetValue
TerminateThread
GetVersionExW
GlobalCompact
GetShortPathNameW
HeapFree
GetLocaleInfoW
ResumeThread
GetFileAttributesW
FoldStringW
GetSystemWindowsDirectoryW
LocalFree
SearchPathA
WaitForMultipleObjects
GetComputerNameExA
TryEnterCriticalSection
LockFile
GetSystemDirectoryW
VerifyVersionInfoW
lstrcpyA
GlobalAddAtomA
SetFileTime
GetCurrentDirectoryW
WaitForMultipleObjectsEx
SetTimerQueueTimer
CreateSemaphoreW
WaitForSingleObject
GetFullPathNameW
GetHandleInformation
CreateMutexW
GetThreadContext
GetFileAttributesExA
lstrcpynW
lstrcpyW
GetSystemDefaultUILanguage
FindNextFileW
IsBadStringPtrW
UnmapViewOfFile
LoadLibraryW
DeleteFileW
GetComputerNameW
DeviceIoControl
IsValidLanguageGroup
GetTimeFormatW
CloseHandle
CreatePipe
SetThreadAffinityMask
GetAtomNameA
WinExec
GetBinaryTypeA
IsBadReadPtr
AddAtomW
SetErrorMode
CreateRemoteThread
GetSystemDefaultLangID
IsBadWritePtr
CreateFileMappingA
WideCharToMultiByte
SetThreadPriority
OpenEventW
HeapLock
LocalReAlloc
CreateMailslotW
RegisterWaitForSingleObject
SetEndOfFile
ClearCommBreak
SetEvent
OpenFileMappingW
IsDBCSLeadByteEx
GetCommConfig
GetFileSize
LocalSize
ExitThread
GetLocaleInfoA
GetTickCount
GetCommState
FormatMessageA
FindFirstFileW
GetCompressedFileSizeW
lstrcatA
GetFileTime
SetLastError
ReleaseSemaphore
CreateWaitableTimerW
LCMapStringW
VirtualFree
SizeofResource
SetPriorityClass
CancelWaitableTimer
SetCurrentDirectoryW
HeapUnlock
MoveFileExA
GetStringTypeExW
CopyFileW
GetBinaryTypeW
SetLocalTime
AddAtomA
FindCloseChangeNotification
SetCommBreak
GetThreadPriority
GetFileType
GetCPInfo
HeapSize
FindFirstChangeNotificationW
GetOEMCP
GetProcAddress
SetHandleInformation
LoadLibraryExW
GetStdHandle
SetWaitableTimer
PulseEvent
SetCommMask
GetAtomNameW
CallNamedPipeW
VirtualProtect
FormatMessageW
VerSetConditionMask
GetSystemDirectoryA
CreateFileW
SetCommState
GlobalMemoryStatusEx
DisconnectNamedPipe
GetModuleHandleA
DeleteFileA
InitializeCriticalSection
CancelIo
GetWindowsDirectoryA
IsDBCSLeadByte
GetCommModemStatus
FindResourceW
HeapAlloc
ResetEvent
SetSystemTime
msvcrt
isalpha
Exports
Exports
Sections
.text Size: 47KB - Virtual size: 47KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.tls1 Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls2 Size: 512B - Virtual size: 128B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls3 Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 512B - Virtual size: 117B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pack3 Size: 21KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls4 Size: 25KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ