Static task
static1
Behavioral task
behavioral1
Sample
88826417969928c729195eaf45a1eb005e48c04e582b297f2a8a48b752813acc.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
88826417969928c729195eaf45a1eb005e48c04e582b297f2a8a48b752813acc.exe
Resource
win10v2004-20220812-en
General
-
Target
88826417969928c729195eaf45a1eb005e48c04e582b297f2a8a48b752813acc
-
Size
728KB
-
MD5
06fe030bc039cd914220478a8aa02b02
-
SHA1
133a1c786de1c67d51dd474579701a0296ab6f52
-
SHA256
88826417969928c729195eaf45a1eb005e48c04e582b297f2a8a48b752813acc
-
SHA512
b123456e8b21ee47f1d12bf622ad6fa2d314506254f2edc481069ae027191f426a24a409d28f7e3e34348bfa8a6058583a2a5728f026f5f3759a8269192f088f
-
SSDEEP
12288:XTE00kUtoOOXw9wD+HMHYAN0ttOUz0++a/TpsV3rV54HIQkgYro+x9uU:DE00JoOz9wh4y0tAPpa1oVaHIQk
Malware Config
Signatures
Files
-
88826417969928c729195eaf45a1eb005e48c04e582b297f2a8a48b752813acc.exe windows x86
72742b10c6736de7d4052cf00e01812e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ole32
ReleaseStgMedium
IsAccelerator
CoTaskMemAlloc
CoInitialize
CreateILockBytesOnHGlobal
CoGetMalloc
OleGetClipboard
OleRun
OleDestroyMenuDescriptor
OleLockRunning
CoGetClassObject
OleCreateMenuDescriptor
CLSIDFromProgID
DoDragDrop
GetHGlobalFromILockBytes
OleFlushClipboard
OleTranslateAccelerator
StgCreateDocfileOnILockBytes
comctl32
ImageList_GetIcon
ImageList_Duplicate
ImageList_Draw
ImageList_Add
ord17
ImageList_AddMasked
ImageList_GetImageInfo
PropertySheetA
ImageList_LoadImageA
ImageList_Destroy
ImageList_ReplaceIcon
DestroyPropertySheetPage
ImageList_Create
CreatePropertySheetPageA
ImageList_GetImageCount
oleaut32
LoadTypeLi
user32
GetClientRect
GetActiveWindow
GetClassNameA
ShowCaret
IsChild
CreateCaret
SetRectEmpty
TranslateMessage
DefWindowProcA
DeferWindowPos
LoadIconA
LoadStringA
GetMessageA
InvalidateRgn
SetDlgItemInt
SetCursorPos
GetMessagePos
SetCapture
EnableMenuItem
PostThreadMessageA
RegisterClipboardFormatA
CreatePopupMenu
CharUpperA
GetCursorPos
SetTimer
SetParent
UnregisterClassA
RegisterWindowMessageA
MapDialogRect
LoadBitmapA
LoadCursorA
EqualRect
IsDialogMessageA
CheckDlgButton
CharNextA
InsertMenuA
MapWindowPoints
GetMenuItemCount
GetDC
RegisterClassA
GetDlgItem
GetClassInfoA
ReleaseDC
GetDlgCtrlID
SetPropA
BeginPaint
LoadMenuA
ShowWindow
EndDialog
SetActiveWindow
DrawIconEx
WinHelpA
GetWindowLongA
PeekMessageA
CreateWindowExA
CallWindowProcA
DrawFocusRect
EndPaint
DestroyIcon
SetRect
DestroyMenu
SetWindowLongA
GetTopWindow
CallNextHookEx
SetWindowsHookExA
EnumChildWindows
GetMessageTime
GetSysColor
TabbedTextOutA
GetWindow
GetCapture
IsWindowEnabled
IsWindowUnicode
SetCursor
TranslateAcceleratorA
RegisterClassExA
GetWindowRect
SetWindowPos
GetFocus
ScreenToClient
KillTimer
DrawMenuBar
GetMenuState
InflateRect
MessageBoxA
CreateDialogIndirectParamA
GetMenuItemID
DestroyWindow
SetWindowTextA
IsIconic
SetDlgItemTextA
LoadImageA
PtInRect
WindowFromPoint
SetScrollInfo
GetPropA
kernel32
GlobalHandle
SetThreadPriority
LocalFileTimeToFileTime
MultiByteToWideChar
SetEndOfFile
LoadResource
GetProcAddress
RemoveDirectoryA
GetStartupInfoA
RaiseException
DeleteFileA
GetTimeFormatA
GetVersionExA
GetLastError
GlobalFlags
GetCurrentThreadId
ExitProcess
CompareStringW
GlobalDeleteAtom
Sleep
FindClose
GlobalUnlock
InterlockedIncrement
GlobalFree
HeapAlloc
GetDateFormatA
lstrcmpA
GetWindowsDirectoryA
QueryPerformanceCounter
ReadFile
LocalFree
SuspendThread
GetLocalTime
RtlUnwind
GetModuleHandleA
LCMapStringW
GetSystemTimeAsFileTime
LocalReAlloc
GlobalAlloc
GetFileType
TlsFree
CompareStringA
WriteConsoleW
GetACP
SetFilePointer
SetEvent
LoadLibraryA
GetFileTime
WriteFile
FindFirstFileA
GetSystemInfo
FindResourceA
lstrlenW
FileTimeToSystemTime
HeapSize
MoveFileW
GetCurrentThread
GetSystemDirectoryA
CreateFileA
EnterCriticalSection
CloseHandle
SetEnvironmentVariableA
InitializeCriticalSection
IsValidCodePage
GetStringTypeW
LockResource
HeapCreate
SetLastError
GetTimeZoneInformation
SetUnhandledExceptionFilter
VirtualQuery
SetHandleCount
GetConsoleCP
GetConsoleMode
GetFileSize
LeaveCriticalSection
CopyFileA
IsDebuggerPresent
GetCurrentDirectoryA
TlsAlloc
LCMapStringA
GetTempPathW
MulDiv
HeapDestroy
GetLogicalDrives
WriteConsoleA
LocalAlloc
WideCharToMultiByte
ResumeThread
TerminateProcess
GetCurrentProcess
TlsGetValue
GetOEMCP
SetCurrentDirectoryA
CreateThread
GetProcessHeap
VirtualFree
GetEnvironmentStringsW
FreeEnvironmentStringsA
GetCPInfo
TlsSetValue
GetConsoleOutputCP
DeleteFileW
GetTickCount
GetEnvironmentStrings
HeapFree
FreeLibrary
DeviceIoControl
CopyFileW
WaitForMultipleObjects
WaitForSingleObject
lstrcmpiA
SetStdHandle
VirtualProtect
UnhandledExceptionFilter
GlobalReAlloc
GetVolumeInformationA
GlobalLock
FlushFileBuffers
GetFullPathNameA
GetCommandLineA
IsBadWritePtr
GetStringTypeA
GetModuleFileNameA
HeapReAlloc
VirtualAlloc
DuplicateHandle
GlobalSize
GetCurrentProcessId
InterlockedExchange
PeekNamedPipe
GetStdHandle
lstrlenA
FreeEnvironmentStringsW
InterlockedDecrement
FileTimeToLocalFileTime
FindNextFileA
CreateMutexA
FormatMessageA
DeleteCriticalSection
GetLocaleInfoA
GetFileAttributesA
comdlg32
GetSaveFileNameA
PrintDlgA
shell32
DragFinish
ord155
SHGetPathFromIDListW
SHGetDesktopFolder
DragQueryFileW
SHGetMalloc
Shell_NotifyIconW
ShellExecuteW
SHBrowseForFolderW
SHGetFileInfoW
winspool.drv
ClosePrinter
DeviceCapabilitiesA
AddPrinterA
EnumJobsA
ord204
GetPrinterDriverDirectoryA
OpenPrinterA
GetPrinterA
EnumPrinterDriversA
DocumentPropertiesA
AddPrinterDriverA
EnumPrintersA
Sections
.text Size: 120KB - Virtual size: 116KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 476KB - Virtual size: 475KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 112KB - Virtual size: 110KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ