Static task
static1
Behavioral task
behavioral1
Sample
d973c70cea99973d79d4e255bd2a7528ab102f909e17a3ab37dad7e245fb4393.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
d973c70cea99973d79d4e255bd2a7528ab102f909e17a3ab37dad7e245fb4393.exe
Resource
win10v2004-20220901-en
General
-
Target
d973c70cea99973d79d4e255bd2a7528ab102f909e17a3ab37dad7e245fb4393
-
Size
716KB
-
MD5
0579b422f1898de896ba4b88e9bae960
-
SHA1
92c225c49fc1f7491cd22ba700522c61c8eeed22
-
SHA256
d973c70cea99973d79d4e255bd2a7528ab102f909e17a3ab37dad7e245fb4393
-
SHA512
6293e1a7ee66d43645035773d5c91e185a45641f54ca9bf51f177002129e635541fb4a46ecb314317ac2c7ec55b2b061f8f6632e418f85348967cddb42a5d507
-
SSDEEP
12288:2dXJh5ynmXwBh01GYOe+eU2fVeZLrVi1/W0v/NssWRxm+6SPvd:2pJ3nABhEV+eU29eebssCm+f1
Malware Config
Signatures
Files
-
d973c70cea99973d79d4e255bd2a7528ab102f909e17a3ab37dad7e245fb4393.exe windows x86
8f6ea67c7e55076f96da8d8686f993fb
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
DPtoLP
SetDIBits
DeleteDC
SetMapMode
CreateSolidBrush
CombineRgn
BitBlt
SetViewportOrgEx
GetWindowExtEx
GetTextExtentPoint32W
LineTo
GetClipBox
SetTextAlign
CreateCompatibleDC
CreatePen
ExtCreatePen
GetDeviceCaps
GetPixel
RoundRect
ExtTextOutA
Ellipse
CreateRectRgnIndirect
GetMapMode
DeleteObject
GetObjectA
PatBlt
SetAbortProc
RestoreDC
StartPage
ScaleViewportExtEx
SetTextColor
CreatePolygonRgn
ExcludeClipRect
ScaleWindowExtEx
GetTextColor
PtVisible
TextOutW
CreateBitmap
SaveDC
SetBrushOrgEx
GetTextExtentPoint32A
OffsetRgn
SetStretchBltMode
GetTextMetricsA
PtInRegion
CreateCompatibleBitmap
Pie
RectVisible
GetTextExtentPointA
EndPage
SetPolyFillMode
GetStockObject
ExtSelectClipRgn
SelectClipRgn
SelectObject
SetROP2
GetViewportExtEx
CreatePatternBrush
SetBkMode
RealizePalette
Polygon
SetWindowExtEx
StretchDIBits
EndDoc
OffsetViewportOrgEx
SetBkColor
GetSystemPaletteEntries
kernel32
DeleteCriticalSection
GetCPInfo
SetStdHandle
HeapDestroy
SetUnhandledExceptionFilter
GetVersionExA
HeapAlloc
UnhandledExceptionFilter
MultiByteToWideChar
GetTimeZoneInformation
FreeLibrary
InitializeCriticalSection
LeaveCriticalSection
GetConsoleOutputCP
FreeEnvironmentStringsW
EnumSystemLocalesA
GetStdHandle
GetEnvironmentStringsW
FreeEnvironmentStringsA
GetProcAddress
ReadFile
TlsGetValue
LCMapStringW
CreateFileA
GetSystemTimeAsFileTime
SetFilePointer
RtlUnwind
SetLastError
FlushFileBuffers
SetConsoleCtrlHandler
EnterCriticalSection
WideCharToMultiByte
CompareStringW
TerminateProcess
SetHandleCount
InterlockedDecrement
GetUserDefaultLCID
GetEnvironmentStrings
WriteFile
GetCommandLineA
GetStringTypeA
TlsSetValue
VirtualAlloc
HeapCreate
IsValidCodePage
GetConsoleMode
FatalAppExitA
GetOEMCP
TlsFree
IsDebuggerPresent
InterlockedIncrement
GetACP
CreateMutexA
HeapFree
SetEnvironmentVariableA
GetProcessHeap
GetCurrentProcess
InterlockedExchange
GetModuleFileNameA
GetConsoleCP
LoadLibraryA
GetTickCount
HeapReAlloc
GetModuleHandleA
WriteConsoleA
CloseHandle
GetStringTypeW
GetDateFormatA
TlsAlloc
GetCurrentThreadId
GetTimeFormatA
VirtualFree
IsValidLocale
GetLastError
HeapSize
GetStartupInfoA
GetLocaleInfoW
WriteConsoleW
GetLocaleInfoA
GetFileType
ExitProcess
Sleep
VirtualQuery
RaiseException
GetCurrentProcessId
QueryPerformanceCounter
CompareStringA
GetCurrentThread
LCMapStringA
ole32
StgCreateDocfileOnILockBytes
IsAccelerator
ReleaseStgMedium
CLSIDFromProgID
CoLockObjectExternal
OleInitialize
CoGetMalloc
CoFreeUnusedLibraries
CoTaskMemAlloc
CreateILockBytesOnHGlobal
StgOpenStorageOnILockBytes
RevokeDragDrop
CreateItemMoniker
OleCreateMenuDescriptor
OleDestroyMenuDescriptor
CoGetClassObject
OleSetClipboard
CLSIDFromString
WriteClassStm
CreateBindCtx
OleTranslateAccelerator
mfc42
ord1576
user32
GetScrollInfo
EmptyClipboard
GetSysColorBrush
GetClientRect
SetWindowContextHelpId
LoadMenuA
InflateRect
ValidateRect
GetMenuItemCount
GetTopWindow
CreateMenu
EnableMenuItem
FillRect
SetScrollPos
MapWindowPoints
GetClassInfoA
SystemParametersInfoA
AdjustWindowRectEx
IsWindowEnabled
KillTimer
RemovePropA
ShowWindow
SetFocus
EnableWindow
DestroyIcon
DispatchMessageA
AppendMenuA
RegisterClassA
PtInRect
RegisterClassExA
GetSystemMetrics
MoveWindow
GetMenuState
DrawIconEx
UpdateWindow
GetDesktopWindow
LoadCursorA
FlashWindow
GetWindowDC
TranslateAcceleratorA
GetFocus
UnhookWindowsHookEx
LoadAcceleratorsA
GetLastActivePopup
GetMenuItemID
IsWindowVisible
GetDlgItemTextA
CopyRect
RegisterWindowMessageA
IsDlgButtonChecked
ClientToScreen
DestroyMenu
wsprintfA
IsChild
GetMessagePos
GetDlgItem
LoadBitmapA
CharUpperA
UnpackDDElParam
CreatePopupMenu
ModifyMenuA
DefDlgProcA
DrawStateA
DefWindowProcA
SetForegroundWindow
RedrawWindow
GetWindow
PostThreadMessageA
GetMenuStringA
GetForegroundWindow
DeferWindowPos
advapi32
RegOpenKeyExA
RegQueryInfoKeyA
RegCloseKey
RegCreateKeyA
RegOpenKeyA
RegSetValueA
OpenServiceA
RegDeleteKeyA
RegQueryValueExA
StartServiceA
RegEnumValueA
shell32
SHGetFileInfoA
SHGetPathFromIDListA
SHGetDesktopFolder
oleaut32
LoadTypeLi
Sections
.text Size: 112KB - Virtual size: 110KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 460KB - Virtual size: 457KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 104KB - Virtual size: 102KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 36KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ