Static task
static1
Behavioral task
behavioral1
Sample
d3f1728835dd183c15cfebdb17121d9bd47e44870b786138c47b540394c9a4a3.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d3f1728835dd183c15cfebdb17121d9bd47e44870b786138c47b540394c9a4a3.exe
Resource
win10v2004-20220901-en
General
-
Target
d3f1728835dd183c15cfebdb17121d9bd47e44870b786138c47b540394c9a4a3
-
Size
175KB
-
MD5
ce950ab477e181de40f7571c81602cce
-
SHA1
057731314926d52502445ea2ba92c7fa5d19e497
-
SHA256
d3f1728835dd183c15cfebdb17121d9bd47e44870b786138c47b540394c9a4a3
-
SHA512
d8e3a1031007ec2c4d935e96928fc77bd650b63641e3dfc4f7d3096a3264baefde22cef7634a5283cdd87840bc4d6b2aaf6c6d9e6c5729b45ef558844a410744
-
SSDEEP
3072:hNyGkyUmm3sMRz26l21xNVFyldT6sQTBf+uLqTcQdmjd3:jE0m3CrxN63hQTBWuLq1d6
Malware Config
Signatures
Files
-
d3f1728835dd183c15cfebdb17121d9bd47e44870b786138c47b540394c9a4a3.exe windows x86
0f4267fe5a6a3f0c9396df2210de5d7d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
memset
_strnicmp
strncmp
strncpy
_strdup
free
strcmp
memmove
strlen
strcpy
strcat
memcpy
fread
longjmp
_setjmp3
sprintf
fabs
ceil
malloc
floor
fclose
abort
_snprintf
__p__iob
fprintf
_CIpow
strtod
kernel32
GetModuleHandleA
HeapCreate
WinExec
HeapDestroy
ExitProcess
GetDriveTypeA
GetVolumeInformationA
CloseHandle
InitializeCriticalSection
GetModuleFileNameA
GetCurrentProcess
DuplicateHandle
CreatePipe
GetStdHandle
HeapAlloc
CreateProcessA
WaitForSingleObject
EnterCriticalSection
LeaveCriticalSection
HeapFree
PeekNamedPipe
ReadFile
Sleep
SetLastError
LoadLibraryA
GetProcAddress
FreeLibrary
GetVersionExA
GlobalAlloc
GlobalFree
TlsAlloc
MulDiv
FindFirstFileA
FindClose
GetFileAttributesA
SetFileAttributesA
WriteFile
CreateFileA
SetFilePointer
GetFileSize
HeapReAlloc
TlsGetValue
TlsSetValue
DeleteCriticalSection
InterlockedCompareExchange
InterlockedExchange
WaitForMultipleObjects
GetCurrentThreadId
GetCurrentThread
CreateSemaphoreA
CreateThread
ReleaseSemaphore
user32
OpenWindowStationA
SetProcessWindowStation
CreateDesktopA
SetThreadDesktop
SwitchDesktop
MessageBoxA
OpenDesktopA
CloseDesktop
CloseWindowStation
CharLowerA
DestroyWindow
SendMessageA
GetWindowRect
ScreenToClient
RedrawWindow
GetWindowLongA
GetIconInfo
SetWindowPos
InvalidateRect
UpdateWindow
ReleaseCapture
BeginPaint
DrawStateA
EndPaint
SetCapture
CallWindowProcA
GetSystemMetrics
CreateWindowExA
SetWindowLongA
GetSysColor
GetSysColorBrush
IsWindowEnabled
GetWindowTextLengthA
GetWindowTextA
RemovePropA
DefWindowProcA
SetPropA
GetParent
GetPropA
GetWindow
SetActiveWindow
UnregisterClassA
DestroyAcceleratorTable
LoadIconA
LoadCursorA
RegisterClassA
AdjustWindowRectEx
GetActiveWindow
ShowWindow
CreateAcceleratorTableA
SetCursorPos
LoadImageA
SetCursor
MapWindowPoints
MoveWindow
SystemParametersInfoA
GetKeyState
PostMessageA
GetCursorPos
SetFocus
GetFocus
GetClientRect
FillRect
EnumChildWindows
DefFrameProcA
PeekMessageA
MsgWaitForMultipleObjects
GetMessageA
TranslateAcceleratorA
TranslateMessage
DispatchMessageA
IsWindowVisible
IsChild
GetClassNameA
DestroyIcon
CreateIconFromResourceEx
CreateIconFromResource
gdi32
GetStockObject
GetObjectType
GetObjectA
DeleteObject
SetBkColor
SetTextColor
CreateSolidBrush
CreateCompatibleDC
GetDIBits
DeleteDC
CreateDIBSection
SelectObject
BitBlt
CreateBitmap
SetPixel
SetDIBits
CreateDCA
GetDeviceCaps
CreateFontA
comctl32
InitCommonControlsEx
shell32
SHGetSpecialFolderLocation
SHGetPathFromIDListA
ShellExecuteExA
winmm
timeBeginPeriod
timeEndPeriod
ole32
CoTaskMemFree
RevokeDragDrop
Sections
.code Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 96KB - Virtual size: 96KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 53KB - Virtual size: 54KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE