Static task
static1
Behavioral task
behavioral1
Sample
d798c19f93730ae59521ee54ec34d94b0ab00ba5f014d4a26f0186396f55567d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d798c19f93730ae59521ee54ec34d94b0ab00ba5f014d4a26f0186396f55567d.exe
Resource
win10v2004-20220812-en
General
-
Target
d798c19f93730ae59521ee54ec34d94b0ab00ba5f014d4a26f0186396f55567d
-
Size
699KB
-
MD5
08ac7647409cfd497979581e2692cd5d
-
SHA1
8f81a41635e1c39792c6e7cb7899649e4aa848e5
-
SHA256
d798c19f93730ae59521ee54ec34d94b0ab00ba5f014d4a26f0186396f55567d
-
SHA512
26dd79f439902e5088fc8ba152b650f8370442cb79e480281c6c7807243e55b5302d90c86f5b81ac1dafd85b3b6df846ec38273f88506551c29053c03eb429e9
-
SSDEEP
12288:RwfOSpH4mwfFWCMpWiwLPArOcd5Ka4hSlpAT2mgjpuYpfNTDigi:Rwjx4UDWi4P1cd5D4wm1+dp1Xig
Malware Config
Signatures
Files
-
d798c19f93730ae59521ee54ec34d94b0ab00ba5f014d4a26f0186396f55567d.exe windows x86
8779b2e7e21001cd1389e85de011cd97
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegisterEventSourceA
ReportEventA
SetSecurityDescriptorDacl
OpenServiceA
RegDeleteValueA
GetUserNameA
RegSetValueExA
RegOpenKeyExA
RegDeleteKeyA
DeregisterEventSource
RegCreateKeyExA
RegCreateKeyA
OpenSCManagerA
OpenThreadToken
RegQueryValueExA
RegEnumValueA
CopySid
RegQueryInfoKeyA
GetTokenInformation
RegCloseKey
mfc42
ord1576
oleaut32
LoadTypeLi
comdlg32
GetSaveFileNameA
GetFileTitleA
winspool.drv
GetJobA
OpenPrinterA
ord204
ClosePrinter
DocumentPropertiesA
shlwapi
PathStripToRootA
PathSkipRootA
UrlUnescapeA
PathFindExtensionA
gdi32
GetROP2
CreateDIBitmap
SetArcDirection
GetViewportExtEx
CreateRectRgn
PolylineTo
GetArcDirection
GetTextExtentPointA
ExtCreatePen
BitBlt
Rectangle
PtVisible
CreateEllipticRgn
PlayMetaFile
CreateBitmap
MoveToEx
RealizePalette
ExtCreateRegion
CreateSolidBrush
CreatePenIndirect
GetDeviceCaps
SetStretchBltMode
Polygon
SetTextAlign
CreateBitmapIndirect
CreatePalette
GetNearestPaletteIndex
FlattenPath
ExtFloodFill
GetNearestColor
CreateRectRgnIndirect
CreatePolygonRgn
CloseMetaFile
FillRgn
CreateRoundRectRgn
GetBoundsRect
GetWindowOrgEx
ExtSelectClipRgn
CreateFontA
GetBkColor
CreateHatchBrush
GetPath
SetBrushOrgEx
SetTextJustification
SaveDC
StretchDIBits
CreateCompatibleDC
GetBitmapBits
SetViewportExtEx
CreateBrushIndirect
ExcludeClipRect
GetTextExtentPoint32A
SelectPalette
RestoreDC
PathToRegion
SelectObject
RoundRect
CreateICA
InvertRgn
CreateMetaFileA
OffsetClipRgn
CopyMetaFileA
GetRgnBox
SetRectRgn
GetObjectA
Escape
Ellipse
ScaleViewportExtEx
GetTextColor
GetObjectType
SetBkMode
CreateEllipticRgnIndirect
Polyline
SetROP2
PatBlt
Pie
GetRegionData
SetPixel
SetViewportOrgEx
GetTextAlign
SetWindowOrgEx
GetMapMode
UnrealizeObject
SetAbortProc
DeleteObject
ScaleWindowExtEx
SelectClipPath
user32
RegisterClassExA
CloseClipboard
SendMessageA
ReleaseDC
GetActiveWindow
PtInRect
UpdateWindow
LoadCursorA
ShowWindow
FrameRect
DefWindowProcA
GetWindowThreadProcessId
MessageBoxA
FillRect
ExitWindowsEx
PostMessageA
RemovePropA
KillTimer
CreateDialogParamA
RegisterClassA
kernel32
GlobalFree
GetLocalTime
HeapAlloc
GetLastError
lstrcmpiA
GetSystemTimeAsFileTime
IsBadWritePtr
GetFileTime
FreeResource
FreeEnvironmentStringsW
HeapReAlloc
GetEnvironmentVariableW
TlsFree
GetLocaleInfoA
IsBadCodePtr
GetACP
HeapDestroy
CompareStringW
FileTimeToLocalFileTime
TlsAlloc
FreeEnvironmentStringsA
SetFileAttributesA
GlobalLock
CreateFileW
CloseHandle
IsBadReadPtr
GetEnvironmentStringsW
GetTimeZoneInformation
MultiByteToWideChar
CreateMutexA
GetStringTypeA
DeleteFileA
GetCurrentThread
InterlockedExchange
SetUnhandledExceptionFilter
LockResource
EnumSystemLocalesA
GetProcAddress
GetFileSize
IsValidLocale
LCMapStringW
SetHandleCount
VirtualFree
FatalAppExitA
GlobalAlloc
EnterCriticalSection
GetModuleHandleA
WideCharToMultiByte
HeapSize
GetDateFormatA
TlsGetValue
GetModuleFileNameA
DeleteCriticalSection
ReadFile
GetCurrentThreadId
GetCommandLineA
SetEnvironmentVariableA
GetFileType
ExitProcess
TerminateProcess
RtlUnwind
RaiseException
GetLocaleInfoW
GetUserDefaultLCID
CompareFileTime
GetEnvironmentStrings
VirtualProtect
SetEndOfFile
IsValidCodePage
FlushFileBuffers
LeaveCriticalSection
SetLastError
GetCurrentProcess
GetOEMCP
Sleep
UnhandledExceptionFilter
VirtualQuery
QueryPerformanceCounter
GetStdHandle
LCMapStringA
GetVersionExA
GlobalHandle
CompareStringA
CreateThread
HeapFree
LoadLibraryA
GetVersion
GetSystemInfo
GetStartupInfoA
SetFilePointer
GetTickCount
TlsSetValue
WriteFile
GetCurrentProcessId
GetTimeFormatA
SetStdHandle
MoveFileW
GetStringTypeW
HeapCreate
InitializeCriticalSection
SetConsoleCtrlHandler
VirtualAlloc
LocalReAlloc
GetCPInfo
ole32
OleInitialize
OleRegEnumVerbs
CreateFileMoniker
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
CreateGenericComposite
OleFlushClipboard
OleGetClipboard
OleRegGetMiscStatus
OleCreateFromData
OleLockRunning
OleSaveToStream
StgOpenStorage
CoDisconnectObject
StringFromCLSID
WriteClassStm
OleSetContainedObject
WriteClassStg
comctl32
CreatePropertySheetPageA
InitCommonControlsEx
Sections
.text Size: 86KB - Virtual size: 85KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 453KB - Virtual size: 453KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 97KB - Virtual size: 111KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 61KB - Virtual size: 60KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ