Static task
static1
Behavioral task
behavioral1
Sample
8d29cc311017434e7c3b3233ff848d5b6c3a27a89d3a7164edfdd6819007b4b1.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
8d29cc311017434e7c3b3233ff848d5b6c3a27a89d3a7164edfdd6819007b4b1.exe
Resource
win10v2004-20220812-en
General
-
Target
8d29cc311017434e7c3b3233ff848d5b6c3a27a89d3a7164edfdd6819007b4b1
-
Size
720KB
-
MD5
077b73a4cf118c8a0b37b07807eda79c
-
SHA1
10e85bf7905bb3a29b3776bd6b3dbad72fc8fc52
-
SHA256
8d29cc311017434e7c3b3233ff848d5b6c3a27a89d3a7164edfdd6819007b4b1
-
SHA512
04acfa97a56aa763cd0f6c1f3126319e16efe3c5e493db10d5f1e0bf10c755a8d432df5c528cd944f4423a5582e89525dd2c731a6c75598759ee229e589314c4
-
SSDEEP
12288:G3OTFx2Lqiylu1IMRQn4uqKgjtJDQh1g9pS9fGnK903uqvuNRE/k:G+FDi6u1IR4XKgZJDQ7g9p+fGiWuNRy
Malware Config
Signatures
Files
-
8d29cc311017434e7c3b3233ff848d5b6c3a27a89d3a7164edfdd6819007b4b1.exe windows x86
5394ac93f1f0eee4a02eaa1f72470408
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
RestoreDC
RectVisible
GetRgnBox
CreateFontA
CreateCompatibleBitmap
SetTextColor
GetStockObject
ScaleViewportExtEx
SaveDC
SetViewportOrgEx
SetStretchBltMode
RectInRegion
CreateDCA
Escape
SetGraphicsMode
ExtSelectClipRgn
GetWindowExtEx
CreateRectRgn
GetTextExtentPointA
GetMapMode
SetWindowExtEx
CreateBitmap
SetTextJustification
StretchDIBits
EnumFontFamiliesExA
GetObjectA
CombineRgn
GetGlyphOutlineA
GetClipRgn
Pie
SetMapMode
MoveToEx
PatBlt
SetPolyFillMode
SelectObject
CreateSolidBrush
ScaleWindowExtEx
CreateRectRgnIndirect
IntersectClipRect
CreatePen
ExcludeClipRect
GetCharABCWidthsA
SetTextCharacterExtra
CreateCompatibleDC
DeleteDC
TextOutA
GetViewportExtEx
CreateDIBSection
EqualRgn
CreateFontIndirectA
SelectClipRgn
PtInRegion
SetWindowOrgEx
FloodFill
SetPixelV
SetBkMode
Polygon
SelectPalette
CreatePolygonRgn
SetViewportExtEx
RealizePalette
GetDeviceCaps
shell32
SHFileOperationA
DragQueryFileA
ord155
SHGetPathFromIDListA
SHGetFileInfoA
ExtractIconA
ShellExecuteA
SHBrowseForFolderA
user32
SetCursorPos
WinHelpA
SetFocus
TabbedTextOutA
SetScrollPos
GetWindowLongA
SetRect
RemoveMenu
GetCursorPos
GetForegroundWindow
GetFocus
KillTimer
GetSubMenu
MessageBoxA
DefWindowProcA
RegisterWindowMessageA
TranslateMessage
GetCursor
DrawFocusRect
LoadIconA
SetCapture
GetSysColor
ClientToScreen
PostThreadMessageA
DestroyWindow
IsWindow
RegisterClipboardFormatA
SetWindowLongA
GetMenuItemCount
DrawTextA
HideCaret
GetParent
IntersectRect
PeekMessageA
GetWindow
RedrawWindow
GetClassLongA
UnionRect
GetDlgItem
EnableMenuItem
SetParent
SetForegroundWindow
IsWindowVisible
GetDC
MapWindowPoints
SendDlgItemMessageA
GetClassInfoA
MoveWindow
SetTimer
CreateIconIndirect
RemovePropA
InflateRect
GetSystemMenu
ReuseDDElParam
CloseClipboard
GetDCEx
SetRectEmpty
GetDlgCtrlID
ShowWindow
GetWindowDC
SetMenuItemBitmaps
UnhookWindowsHookEx
RegisterClassExA
DestroyCursor
LoadCursorA
GetMessagePos
IsRectEmpty
ValidateRect
GetMenu
SetMenu
GetClientRect
SetWindowTextA
LoadStringA
ScrollWindow
BeginDeferWindowPos
EndDialog
CopyAcceleratorTableA
UnregisterClassA
CreateWindowExA
GetWindowPlacement
EnumWindows
IsChild
MapDialogRect
GetMessageA
ScreenToClient
SetWindowsHookExA
OpenClipboard
CreatePopupMenu
DrawFrameControl
InvalidateRect
RegisterClassA
GetTopWindow
EndDeferWindowPos
CallNextHookEx
CharUpperA
AppendMenuA
oleaut32
LoadTypeLi
winspool.drv
ClosePrinter
ord204
OpenPrinterA
comctl32
ImageList_ReplaceIcon
ImageList_GetImageCount
ImageList_Destroy
ImageList_LoadImageA
InitCommonControlsEx
ImageList_AddMasked
DestroyPropertySheetPage
ord17
ImageList_GetIcon
ImageList_Draw
ImageList_Create
ImageList_Replace
PropertySheetA
kernel32
IsValidLocale
InterlockedExchange
TlsAlloc
GetLocaleInfoW
VirtualProtect
GetCurrentProcess
SetEvent
CompareStringW
GetTickCount
GetFullPathNameA
FindFirstFileA
GetEnvironmentStrings
CreateMutexA
MultiByteToWideChar
GetACP
SetFileTime
ConvertDefaultLocale
HeapCreate
FatalAppExitA
SetStdHandle
GetFileType
HeapAlloc
GetModuleFileNameA
FreeEnvironmentStringsA
FindClose
WaitForSingleObject
SetHandleCount
GetStringTypeA
GetVersionExA
CopyFileA
RaiseException
GlobalMemoryStatus
SetThreadPriority
TlsSetValue
GetUserDefaultLCID
FlushFileBuffers
GlobalHandle
GetCPInfo
FindNextFileA
GetCurrentProcessId
GetOEMCP
HeapSize
SetFilePointer
GetStringTypeW
SetErrorMode
GetTimeZoneInformation
DeleteCriticalSection
VirtualFree
TlsFree
SetEndOfFile
UnhandledExceptionFilter
GetStdHandle
VirtualAlloc
RtlUnwind
GetLocalTime
SizeofResource
lstrlenA
HeapDestroy
EnumSystemLocalesA
GetEnvironmentStringsW
GetExitCodeProcess
GetSystemDirectoryA
GetCurrentThreadId
GetEnvironmentVariableW
GetLocaleInfoA
GetPrivateProfileStringA
EnterCriticalSection
IsValidCodePage
GetTimeFormatA
CloseHandle
TerminateProcess
SystemTimeToFileTime
CreateThread
LoadLibraryA
GetCommandLineA
GetSystemTimeAsFileTime
lstrcpynW
WideCharToMultiByte
GetProcAddress
SetFileAttributesA
GetCurrentThread
GetLastError
FreeEnvironmentStringsW
LCMapStringA
FreeLibrary
CompareFileTime
MulDiv
CompareStringA
WriteConsoleW
GetModuleHandleA
WriteFile
HeapFree
TlsGetValue
GetFileSize
GetSystemInfo
GetDateFormatA
CreateFileW
QueryPerformanceCounter
GetConsoleMode
ExitProcess
GetStartupInfoA
HeapReAlloc
MoveFileA
InitializeCriticalSection
VirtualQuery
LeaveCriticalSection
SetEnvironmentVariableA
IsBadWritePtr
FileTimeToSystemTime
GlobalLock
SetLastError
LCMapStringW
WriteConsoleA
InterlockedDecrement
ReadFile
Sections
.text Size: 88KB - Virtual size: 85KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 464KB - Virtual size: 463KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 96KB - Virtual size: 105KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 68KB - Virtual size: 67KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ