Static task
static1
Behavioral task
behavioral1
Sample
321db0da67d5d800efbc120c5f78245120c6cd348e207a615a79741ec1bf37e4.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
321db0da67d5d800efbc120c5f78245120c6cd348e207a615a79741ec1bf37e4.exe
Resource
win10v2004-20220812-en
General
-
Target
321db0da67d5d800efbc120c5f78245120c6cd348e207a615a79741ec1bf37e4
-
Size
186KB
-
MD5
2f84a12c2e229a2f7ce06659df65e360
-
SHA1
e89d863bd12970bd137d41d23d750bd04820aa72
-
SHA256
321db0da67d5d800efbc120c5f78245120c6cd348e207a615a79741ec1bf37e4
-
SHA512
9d9e167a2740b60b3af0094ebfea1116990dbe77ea4d605c83edb44412c82a3d6ffe71954a9cbdc55d499b436876733b23dc4834f9e24c7367e9ecf2140f62cf
-
SSDEEP
1536:dWfUIT6OIX1yQtHp5Nc9b8ndXRoNo7d1ZjviCeqxD6Z7jAgF35woKJL1HMwnVdf1:d4vOOOZdBwlHqx2VA05woKJLiwnVQQ
Malware Config
Signatures
Files
-
321db0da67d5d800efbc120c5f78245120c6cd348e207a615a79741ec1bf37e4.exe windows x86
4c20db64e8df3b30ed1d04b5cdb9f3b3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapAlloc
HeapCreate
HeapDestroy
HeapFree
HeapReAlloc
HeapSize
InterlockedExchange
LCMapStringA
LCMapStringW
LoadLibraryA
MulDiv
MultiByteToWideChar
QueryPerformanceCounter
RaiseException
GlobalFree
RtlUnwind
SetHandleCount
SetUnhandledExceptionFilter
Sleep
TerminateProcess
UnhandledExceptionFilter
VirtualFree
VirtualProtect
VirtualQuery
WideCharToMultiByte
WriteFile
lstrcatW
lstrcpyW
lstrlenW
GetVersionExA
GetTickCount
GetSystemTimeAsFileTime
GetSystemInfo
GetStringTypeW
GetStringTypeA
GetStdHandle
GetProcAddress
GetOEMCP
GetModuleHandleW
GetModuleHandleA
GetModuleFileNameA
GetLocaleInfoA
GetLastError
GetFileType
GetFileSize
GetEnvironmentStringsW
GetEnvironmentStrings
GetCurrentThreadId
GetCurrentProcessId
GetCommandLineA
GetCPInfo
GetACP
FreeEnvironmentStringsW
FreeEnvironmentStringsA
ExitProcess
CreateFileW
CloseHandle
GetCurrentProcess
VirtualAlloc
GetStartupInfoA
GlobalAlloc
ReadFile
GetWindowsDirectoryA
user32
IsZoomed
LoadAcceleratorsW
LoadBitmapW
LoadCursorW
LoadIconW
LoadStringA
LoadStringW
MessageBoxA
MessageBoxW
MoveWindow
OffsetRect
PeekMessageW
PostMessageW
PostQuitMessage
PtInRect
RegisterClassW
ReleaseCapture
ReleaseDC
SendMessageW
SetCapture
SetDlgItemTextW
SetRect
SetTimer
ShowWindow
TranslateAcceleratorW
TranslateMessage
UnionRect
UpdateWindow
WaitMessage
WinHelpW
wsprintfW
IsIconic
IsDlgButtonChecked
InvertRect
InvalidateRect
IntersectRect
GetWindowRect
GetWindowPlacement
GetSystemMetrics
GetSubMenu
GetParent
GetMessageW
GetMenu
GetForegroundWindow
GetDlgItemTextW
GetDlgItem
GetDC
GetClientRect
FrameRect
FillRect
EndPaint
EndDialog
EnableMenuItem
DrawTextW
DrawMenuBar
DispatchMessageW
DialogBoxParamW
DestroyWindow
DefWindowProcW
CreateWindowExW
CheckRadioButton
CheckDlgButton
BeginPaint
LoadCursorA
LoadIconA
GetSysColor
GetDesktopWindow
gdi32
GetPixel
GetStockObject
GetTextColor
CreateCompatibleDC
GetTextExtentPoint32W
LineTo
GetDeviceCaps
RestoreDC
SaveDC
SelectObject
SetBkMode
SetPixel
SetTextColor
GetBkMode
GdiFlush
ExcludeClipRect
Ellipse
DeleteObject
DeleteDC
CreateSolidBrush
MoveToEx
BitBlt
CreateCompatibleBitmap
CreateFontIndirectW
advapi32
RegQueryValueExW
RegQueryValueExA
RegOpenKeyExW
RegOpenKeyExA
RegCreateKeyExW
RegCloseKey
RegOpenKeyA
RegSetValueExW
shell32
SHGetSpecialFolderPathW
msvcrt
memcpy
Sections
.text Size: 80KB - Virtual size: 79KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 40KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text2 Size: 1024B - Virtual size: 1000B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 59KB - Virtual size: 58KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ