Static task
static1
Behavioral task
behavioral1
Sample
89cb53a061d72e364ac8116c22d2544f6f0dac283a7a140dc60db5fba68639d8.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
89cb53a061d72e364ac8116c22d2544f6f0dac283a7a140dc60db5fba68639d8.exe
Resource
win10v2004-20220812-en
General
-
Target
89cb53a061d72e364ac8116c22d2544f6f0dac283a7a140dc60db5fba68639d8
-
Size
215KB
-
MD5
0d35aacccb94ec8382c2a182707f9d38
-
SHA1
9fda284a9b0ffb065563109f38b430746a4727f5
-
SHA256
89cb53a061d72e364ac8116c22d2544f6f0dac283a7a140dc60db5fba68639d8
-
SHA512
f6e479f963d0c0f3187dddf7d5f00563ce9f3a46e1b860e49f25189666f4ee6dc53e59474efbf86558025c5c69e4243d1644cfe6cf1978e78869c00832536a08
-
SSDEEP
3072:d+dcFhQ6eabdetDqcI1PbQBK1ql9/nfPTcQIQOEEn1FfpzgXN2vxgxuMhOF2I:d+dcFWlaREIiBnfTIf1FhzgXIvxgo4I
Malware Config
Signatures
Files
-
89cb53a061d72e364ac8116c22d2544f6f0dac283a7a140dc60db5fba68639d8.exe windows x86
69b23e5f8463539b9fb4c5dae4437830
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
oleaut32
VarBstrFromDec
VarBstrFromUI8
VarBstrFromI8
VarBstrFromI4
VarBstrFromUI4
VarBstrFromI1
VarBstrFromUI2
VarBstrFromCy
VarBstrFromR8
VarBstrFromDisp
VarBstrFromUI1
VarBstrFromR4
VarBstrFromI2
VarBstrFromDate
user32
IsWindowVisible
InvalidateRect
EnableWindow
GetDC
ClientToScreen
SetCursor
CheckRadioButton
DispatchMessageW
LoadCursorW
DestroyWindow
GetClientRect
CheckDlgButton
GetAsyncKeyState
ShowWindow
SendMessageW
ReleaseDC
TranslateMessage
IsWindow
MoveWindow
IsRectEmpty
DefWindowProcW
SetDlgItemTextW
GetDesktopWindow
GetDlgItem
CreateDialogParamW
SetWindowLongW
GetWindowRect
PeekMessageW
LoadStringW
GetWindowLongW
GetDlgItemInt
SetDlgItemInt
kernel32
GetProcAddress
SetFilePointer
IsBadCodePtr
lstrcmpiW
GetTickCount
GlobalHandle
GlobalAlloc
GetDiskFreeSpaceW
GetCurrentThread
lstrcpyA
FreeLibrary
InterlockedDecrement
SetLastError
GetFileAttributesW
InterlockedIncrement
GetCurrentProcessId
GetThreadPriority
GlobalFree
GetVersionExW
GetLocaleInfoA
WaitForSingleObject
ResetEvent
IsBadWritePtr
InitializeCriticalSection
GlobalMemoryStatus
MulDiv
lstrcpynW
WaitForMultipleObjects
lstrcpyW
SetEvent
VirtualFree
SetEndOfFile
CloseHandle
WideCharToMultiByte
LeaveCriticalSection
ReadFile
IsBadReadPtr
GetQueuedCompletionStatus
SetThreadPriority
MultiByteToWideChar
GetCurrentProcess
CreateEventW
GetSystemTimeAsFileTime
CreateThread
GetModuleFileNameA
GetProcessHeap
CreateFileW
EnterCriticalSection
DeleteCriticalSection
InterlockedExchange
GetFileSize
ReleaseSemaphore
SetUnhandledExceptionFilter
lstrlenA
GetPrivateProfileStringW
HeapFree
QueryPerformanceCounter
GlobalUnlock
CreateSemaphoreW
lstrcmpW
GlobalLock
WriteFile
lstrlenW
GetProfileIntA
GetLastError
LoadLibraryW
HeapAlloc
GetFullPathNameW
GetACP
GlobalFindAtomA
msls31
LssbGetVisibleDcpInSubline
LsCompressSubline
LssbGetObjDimSubline
LssbGetPlsrunsFromSubline
LssbGetNumberDnodesInSubline
LssbGetDurTrailWithPensInSubline
Sections
.text Size: 88KB - Virtual size: 88KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 114KB - Virtual size: 114KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 6.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ