Static task
static1
Behavioral task
behavioral1
Sample
814449adf6138822621e3540e21f98811beba97f9c5a7b3c527f8bde9e0954cf.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
814449adf6138822621e3540e21f98811beba97f9c5a7b3c527f8bde9e0954cf.exe
Resource
win10v2004-20220812-en
General
-
Target
814449adf6138822621e3540e21f98811beba97f9c5a7b3c527f8bde9e0954cf
-
Size
585KB
-
MD5
eafd17b91c69b198e5cd0053c22a54cd
-
SHA1
5de3750b3452042d736fe2d127725f79e6b9dd69
-
SHA256
814449adf6138822621e3540e21f98811beba97f9c5a7b3c527f8bde9e0954cf
-
SHA512
08d014b12f64b3c153ed2f729b75b7c7d020e322d61b58d00244e7e13ae98c2dcc1d5df99a280c9b16b5c5f39684e45dd27d99a64a9cbd3f0b00ced2439ec2cf
-
SSDEEP
12288:D+TUve1N52T8wmAKARvPzdTjRsRdDAC+B4lqt3j4paYA7PguJo:4sRINAR1WTZ+qu4MZrbo
Malware Config
Signatures
Files
-
814449adf6138822621e3540e21f98811beba97f9c5a7b3c527f8bde9e0954cf.exe windows x86
9ab89360de867105fb9380e636864630
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
ImageList_Remove
ImageList_GetImageInfo
DrawStatusTextA
_TrackMouseEvent
ImageList_BeginDrag
GetEffectiveClientRect
ImageList_SetImageCount
ImageList_EndDrag
CreatePropertySheetPageW
DrawInsert
ImageList_Read
ImageList_LoadImageA
CreatePropertySheetPageA
CreatePropertySheetPage
ImageList_GetBkColor
InitCommonControlsEx
ImageList_SetOverlayImage
ImageList_LoadImageW
ImageList_GetFlags
ImageList_Destroy
ImageList_DrawIndirect
ImageList_GetDragImage
ImageList_Merge
kernel32
GetCommandLineA
VirtualAlloc
SetLastError
UnhandledExceptionFilter
GetVersionExA
GetFileType
SetHandleCount
VirtualProtect
GetEnvironmentStringsW
FlushFileBuffers
GetShortPathNameW
GetCurrentThread
DebugBreak
GetSystemInfo
LeaveCriticalSection
HeapCreate
GetTickCount
TerminateProcess
FreeEnvironmentStringsW
GetProcAddress
GetTimeFormatA
EnumSystemLocalesA
GetOEMCP
MultiByteToWideChar
GetTimeZoneInformation
HeapDestroy
GetCommandLineW
GetDateFormatA
CompareStringA
ExitProcess
GetACP
GetCurrentProcess
TlsFree
IsBadWritePtr
TlsGetValue
HeapReAlloc
IsValidLocale
IsValidCodePage
HeapAlloc
ReadConsoleOutputAttribute
GetLocaleInfoA
InterlockedIncrement
FreeEnvironmentStringsA
VirtualFree
CloseHandle
GetCurrentProcessId
TlsSetValue
GetModuleFileNameA
GetStringTypeW
OutputDebugStringA
GetEnvironmentStrings
DeleteCriticalSection
HeapFree
GetModuleFileNameW
VirtualQuery
IsBadReadPtr
OpenMutexA
GetLastError
GetStartupInfoW
GetCPInfo
SetStdHandle
GetSystemTimeAsFileTime
CreateMutexA
InterlockedDecrement
LCMapStringA
GetModuleHandleA
LCMapStringW
ReadFile
InitializeCriticalSection
QueryPerformanceCounter
WriteFile
HeapValidate
GetStdHandle
LoadLibraryA
SetFilePointer
SetConsoleCtrlHandler
InterlockedExchange
LocalUnlock
EnterCriticalSection
SetEnvironmentVariableA
GetStartupInfoA
GetLocaleInfoW
LocalCompact
TlsAlloc
GetStringTypeA
GetUserDefaultLCID
CompareStringW
RtlUnwind
GetCurrentThreadId
WideCharToMultiByte
advapi32
RegQueryValueExA
RegLoadKeyW
CryptSetProviderExW
gdi32
CreateDIBitmap
Polyline
GetTextCharsetInfo
LineDDA
CreateSolidBrush
PolyPolygon
comdlg32
PageSetupDlgW
user32
GetPropW
RemovePropW
CharToOemA
DrawCaption
DdeDisconnect
RegisterClassA
MoveWindow
DefWindowProcW
DefWindowProcA
CreateWindowExA
EndDialog
SetClipboardViewer
DestroyWindow
GetDCEx
InsertMenuItemA
RegisterClassExA
UpdateWindow
ShowWindow
MessageBoxW
Sections
.text Size: 371KB - Virtual size: 370KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 49KB - Virtual size: 70KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 112KB - Virtual size: 112KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ