Static task
static1
Behavioral task
behavioral1
Sample
0924c6dc807d75d15864278bae33fadcb9f3a873b184016449e4a73e9ea5960b.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
0924c6dc807d75d15864278bae33fadcb9f3a873b184016449e4a73e9ea5960b.exe
Resource
win10v2004-20220812-en
General
-
Target
0924c6dc807d75d15864278bae33fadcb9f3a873b184016449e4a73e9ea5960b
-
Size
320KB
-
MD5
07a2dbce99e00ca0b7189cec5253f9e1
-
SHA1
599e5da93713252afcf5fc2dd72d0818622c91eb
-
SHA256
0924c6dc807d75d15864278bae33fadcb9f3a873b184016449e4a73e9ea5960b
-
SHA512
fb662994fbf94f5d83dd2da6c73e3dd8f835b37d50dd06567af48c21ab2cc7077c32ba93ae57482eb0e756251c5527722bafb2993526085fddadb2cc6ffb08fe
-
SSDEEP
6144:vDmyrOwaRqCVtPwJImk9y2VTXOGzFZJ9/s2P1c50ZTlaz2ENYSbCQUpNQRnOFARp:LprOwjLK57LJ9E2Nu4TxENYSbCQUpNQF
Malware Config
Signatures
Files
-
0924c6dc807d75d15864278bae33fadcb9f3a873b184016449e4a73e9ea5960b.exe windows x86
7ab12be52b9621ec761f47eb0abfbf65
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLastError
CloseHandle
LoadLibraryA
GetCPInfo
GetStringTypeA
QueryPerformanceCounter
WideCharToMultiByte
GetEnvironmentStrings
MultiByteToWideChar
InitializeCriticalSection
RtlUnwind
CompareStringA
FreeEnvironmentStringsW
GetCurrentThread
GetSystemTimeAsFileTime
EnterCriticalSection
VirtualQuery
GetStringTypeW
SetFilePointer
InterlockedIncrement
TlsSetValue
GetACP
FreeEnvironmentStringsA
GetStdHandle
GetTimeZoneInformation
CompareStringW
UnhandledExceptionFilter
GetCurrentThreadId
HeapAlloc
IsBadWritePtr
GetStartupInfoA
HeapCreate
TlsAlloc
GetProcAddress
ExitProcess
DeleteCriticalSection
WriteFile
GetSystemTime
GetCommandLineA
SetHandleCount
SetLastError
SetStdHandle
LCMapStringW
FlushFileBuffers
LCMapStringA
GetModuleHandleA
GetTickCount
TerminateProcess
GetOEMCP
GetLocalTime
GetEnvironmentStringsW
TlsGetValue
GetCurrentProcess
GetVersion
HeapReAlloc
SetEnvironmentVariableA
HeapDestroy
CreateMutexA
TlsFree
VirtualFree
GetCurrentProcessId
LeaveCriticalSection
GetFileType
InterlockedDecrement
HeapFree
InterlockedExchange
GetModuleFileNameA
ReadFile
VirtualAlloc
OpenMutexA
GlobalLock
comctl32
ImageList_GetIconSize
ImageList_Read
ImageList_GetBkColor
ImageList_SetDragCursorImage
DrawStatusTextW
ImageList_SetImageCount
ImageList_Remove
DestroyPropertySheetPage
ImageList_GetImageRect
CreateToolbar
ImageList_GetImageCount
GetEffectiveClientRect
ImageList_Merge
ImageList_DrawEx
InitCommonControlsEx
ImageList_GetDragImage
ImageList_Copy
user32
wsprintfA
CallWindowProcW
CharPrevExA
DefWindowProcW
GetKBCodePage
GetMenuBarInfo
MessageBoxA
SetWindowsHookA
RegisterClassA
GetProcessWindowStation
DefDlgProcW
DestroyWindow
GetCursorPos
DdeDisconnect
ShowWindow
GetFocus
RegisterWindowMessageW
CreateWindowExA
ScreenToClient
RegisterClassExA
GetSysColorBrush
IsWindowEnabled
gdi32
PolyDraw
GetClipBox
CopyEnhMetaFileW
GetDeviceCaps
DeleteDC
DeleteObject
GetObjectW
GetTextCharsetInfo
PolyBezier
GetMetaRgn
CreateDCW
StrokePath
CreateRectRgn
Sections
.text Size: 116KB - Virtual size: 113KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 68KB - Virtual size: 67KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 92KB - Virtual size: 114KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 40KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ