Static task
static1
Behavioral task
behavioral1
Sample
80267444a8b0a037ee3b8c50e65a562324ad0d1bdfb19cd0419c71a14c18d1cc.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
80267444a8b0a037ee3b8c50e65a562324ad0d1bdfb19cd0419c71a14c18d1cc.exe
Resource
win10v2004-20220812-en
General
-
Target
80267444a8b0a037ee3b8c50e65a562324ad0d1bdfb19cd0419c71a14c18d1cc
-
Size
168KB
-
MD5
2267c140c22e95bd31736ff71fbe4428
-
SHA1
295dec5bce65495ef9dcf08c89581b1eac8baf6b
-
SHA256
80267444a8b0a037ee3b8c50e65a562324ad0d1bdfb19cd0419c71a14c18d1cc
-
SHA512
cde553fdee3fce17904054329c4b361dbdb8813695d7cbf8ae23d4ccb5b46a623a602c42374ca8d1d745a77ea7aae92144678e7cf3f8349c1805223dbd870148
-
SSDEEP
3072:xqP1d2nerVk0NuB1VDFjEXKqo48++hxyWcW5D7jxxVhe:sP1eCVk/5jEaqo48p47W5D7jK
Malware Config
Signatures
Files
-
80267444a8b0a037ee3b8c50e65a562324ad0d1bdfb19cd0419c71a14c18d1cc.exe windows x86
305b41fab878c6ab225b81d99a4edcff
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
SaveDC
GetStockObject
DeleteDC
RectVisible
DeleteObject
SelectObject
GetPixel
CreatePen
CreateSolidBrush
GetTextMetricsA
GetDeviceCaps
PatBlt
SetTextColor
RestoreDC
CreatePalette
GetObjectA
GetClipBox
SelectPalette
LineTo
SetMapMode
CreateCompatibleDC
CreateFontIndirectA
SetStretchBltMode
SetTextAlign
kernel32
lstrcmpA
lstrlenW
GlobalFindAtomW
GetCurrentProcessId
DeleteFileA
SetCurrentDirectoryA
VirtualAlloc
CopyFileA
VirtualFree
GlobalFindAtomA
GetStartupInfoA
RemoveDirectoryA
GetDriveTypeA
IsDebuggerPresent
lstrcmpiW
GetConsoleOutputCP
GetProcessHeap
GetCurrentProcess
GetWindowsDirectoryA
GetCommandLineA
GetTickCount
GetCommandLineW
GetVersion
DeleteFileW
MulDiv
GetUserDefaultLangID
GetCurrentThreadId
lstrlenA
GetModuleHandleW
QueryPerformanceCounter
GetCurrentThread
GetACP
GetThreadLocale
lstrcmpiA
GetModuleHandleA
user32
GetSystemMetrics
GetParent
GetDesktopWindow
GetDC
CharNextA
TranslateMessage
glu32
gluNurbsCallback
Sections
.text Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Amyx, Ft Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 26KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Jskplisv Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 100KB - Virtual size: 99KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 29KB - Virtual size: 57KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
rkndhhv Size: - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
qbvgqpa Size: - Virtual size: 108KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE