Static task
static1
Behavioral task
behavioral1
Sample
d3ced5a698ece1b1dd4277acb9cae652211488487a0fc4102fe56129e56f18ce.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d3ced5a698ece1b1dd4277acb9cae652211488487a0fc4102fe56129e56f18ce.exe
Resource
win10v2004-20220812-en
General
-
Target
d3ced5a698ece1b1dd4277acb9cae652211488487a0fc4102fe56129e56f18ce
-
Size
252KB
-
MD5
03ff84f36474c2577e94bcd82e2d6150
-
SHA1
95c9184bddccc07a298ec6342e5b0dd09670ff4b
-
SHA256
d3ced5a698ece1b1dd4277acb9cae652211488487a0fc4102fe56129e56f18ce
-
SHA512
2ef4b903587a0a4bc8869ee543322d1cd7910111e4c76a5566d206d2856156e8b25486c67e0d9874a62d9fbd5d59731d1032956a5a0990fbf78bcb64e3a592e4
-
SSDEEP
6144:rjfn2snj/eAx+p/iguLu46fpE9Dranm86q2S:rjf2snj/exFGuxfuDiD6bS
Malware Config
Signatures
Files
-
d3ced5a698ece1b1dd4277acb9cae652211488487a0fc4102fe56129e56f18ce.exe windows x86
81c0c7460b1c40216dc5ed1fd04140ec
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetUserDefaultLCID
GetPrivateProfileStringW
WriteFile
CreateFileW
GlobalUnlock
GetNumberFormatW
WriteConsoleOutputW
GetProcessTimes
EnumResourceNamesA
SetThreadLocale
FindCloseChangeNotification
CreateDirectoryA
GetSystemTime
VirtualAlloc
lstrcpyA
GetEnvironmentStringsW
VirtualQueryEx
FillConsoleOutputCharacterA
VirtualLock
GetThreadContext
CreateMutexA
LoadLibraryExW
EnumSystemCodePagesW
SetErrorMode
QueryDosDeviceA
SetEnvironmentVariableW
IsBadWritePtr
GetEnvironmentVariableW
GetShortPathNameA
GetModuleHandleA
CreateDirectoryW
GetOverlappedResult
LoadResource
GetLogicalDriveStringsA
GetCommConfig
GetDriveTypeW
EnumCalendarInfoA
LocalAlloc
DuplicateHandle
CopyFileExW
PurgeComm
VirtualProtect
UnmapViewOfFile
GetPrivateProfileSectionW
GetTapeParameters
GetBinaryTypeW
GetSystemTimeAsFileTime
QueryDosDeviceW
GlobalFindAtomA
FreeEnvironmentStringsA
GetCommandLineA
GetVersionExA
lstrlenA
GetConsoleMode
ExitProcess
user32
CountClipboardFormats
EnableScrollBar
GetDlgItemTextA
GetClipboardOwner
EnumWindowStationsW
OpenInputDesktop
GetAsyncKeyState
SetMenuInfo
DeferWindowPos
IsCharLowerW
SendMessageTimeoutA
EndMenu
IsCharAlphaW
GetSubMenu
GetInputState
CharLowerBuffA
InsertMenuW
IsDlgButtonChecked
SetClipboardData
LoadKeyboardLayoutA
KillTimer
TrackPopupMenuEx
UnregisterClassA
CharToOemBuffA
CharLowerA
DialogBoxParamA
wvsprintfW
DefDlgProcW
IsRectEmpty
SendMessageW
UnregisterClassW
GetMonitorInfoW
GetTopWindow
SetWinEventHook
CharToOemW
SetScrollInfo
ChangeDisplaySettingsW
OpenDesktopA
CopyImage
GetWindowThreadProcessId
RegisterClipboardFormatA
SetMenu
SetWindowsHookExA
GetDCEx
wsprintfA
CreateWindowExW
ShowCursor
CreateDialogParamW
ChangeDisplaySettingsExA
SetParent
LoadCursorFromFileW
CharUpperA
GetScrollBarInfo
SetWindowRgn
DestroyWindow
gdi32
StartDocW
StrokeAndFillPath
CreateFontIndirectA
Polyline
GetTextFaceA
ExtCreatePen
CloseFigure
EnumObjects
CombineRgn
GetEnhMetaFileBits
GetTextExtentPoint32W
CreateSolidBrush
comdlg32
CommDlgExtendedError
ReplaceTextW
GetOpenFileNameA
shell32
SHAddToRecentDocs
DragQueryPoint
ole32
CreateOleAdviseHolder
CoSwitchCallContext
OleCreateMenuDescriptor
oleaut32
SysAllocStringLen
QueryPathOfRegTypeLi
SafeArrayGetLBound
VariantChangeType
SysFreeString
SysStringLen
SetErrorInfo
LoadTypeLi
LoadTypeLibEx
shlwapi
UrlIsW
PathIsUNCServerW
PathIsSameRootW
StrToIntW
PathFileExistsW
StrRetToBufW
StrFormatKBSizeW
StrFormatByteSize64A
PathIsFileSpecW
StrChrIW
PathCanonicalizeW
PathRemoveBlanksA
StrDupA
HashData
Sections
.text Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 232KB - Virtual size: 228KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE