Static task
static1
Behavioral task
behavioral1
Sample
328f60e65363905f42eeb20ee85bb2281decde88cf8af2edc7de170f314934cd.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
328f60e65363905f42eeb20ee85bb2281decde88cf8af2edc7de170f314934cd.exe
Resource
win10v2004-20220812-en
General
-
Target
328f60e65363905f42eeb20ee85bb2281decde88cf8af2edc7de170f314934cd
-
Size
138KB
-
MD5
0d254ab10ef9079b6c87e408dc154b30
-
SHA1
7aa79e8afc77b95bb7c7ec4a8163b1dd7079558a
-
SHA256
328f60e65363905f42eeb20ee85bb2281decde88cf8af2edc7de170f314934cd
-
SHA512
dfc3f4c358989f8c2a5fb54be23cd7cf8988a427b1498d66931a066201b546ca95635ce3096d102ab31ac82e6603a117939c0362d2c6f291ca8a4bfebbb76d44
-
SSDEEP
3072:e8ja7ASQoLnL4lxgJAsh4KLSHfnqjnmsDyUCfR:f0QUL6fKL9nms
Malware Config
Signatures
Files
-
328f60e65363905f42eeb20ee85bb2281decde88cf8af2edc7de170f314934cd.exe windows x86
1a12aeaa76315f9340279f100a33e037
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadLibraryA
LoadResource
LocalFree
LocalLock
LocalReAlloc
LocalSize
LocalUnlock
MapViewOfFile
MulDiv
MultiByteToWideChar
OpenProcess
OpenSemaphoreW
ProcessIdToSessionId
QueryPerformanceCounter
ReadFile
ReleaseSemaphore
SetEndOfFile
InterlockedCompareExchange
SetEvent
SetFilePointer
SetLastError
SetUnhandledExceptionFilter
Sleep
TerminateProcess
TerminateThread
UnhandledExceptionFilter
UnmapViewOfFile
WaitForSingleObject
WideCharToMultiByte
WriteFile
lstrcmpW
lstrcmpiW
lstrcpyW
lstrcpynW
GlobalUnlock
GlobalLock
GlobalFree
GetVersion
GetUserDefaultUILanguage
GetUserDefaultLCID
GetTimeFormatW
GetTickCount
GetSystemTimeAsFileTime
GetSystemInfo
GetStartupInfoA
GetProcAddress
GetModuleHandleW
GetModuleHandleA
GetModuleFileNameW
GetLocaleInfoW
GetLocalTime
GetLastError
GetFileInformationByHandle
GetFileAttributesW
GetDateFormatW
GetCurrentThreadId
GetCurrentProcessId
GetComputerNameW
GetCommandLineW
GetACP
FreeLibrary
FormatMessageW
FoldStringW
FindResourceExW
FindFirstFileW
FindClose
ExpandEnvironmentStringsW
ExitProcess
DeleteFileW
CreateThread
CreateSemaphoreW
CreateFileMappingW
CreateDirectoryW
CompareStringW
CloseHandle
VirtualAlloc
GetCurrentProcess
GlobalAlloc
CreateFileW
GetWindowsDirectoryW
SetErrorMode
lstrcatW
user32
RegisterClassExW
RegisterWindowMessageW
ReleaseDC
ScreenToClient
SendDlgItemMessageW
SendMessageW
SetActiveWindow
SetCursor
SetDlgItemTextW
SetFocus
SetScrollPos
SetWinEventHook
SetWindowLongW
SetWindowPlacement
SetWindowTextW
ShowWindow
TranslateAcceleratorW
TranslateMessage
UnhookWinEvent
UpdateWindow
WinHelpW
wsprintfW
PostQuitMessage
PostMessageW
PeekMessageW
OpenClipboard
MoveWindow
MessageBoxW
MessageBeep
LoadStringW
LoadImageW
LoadIconW
LoadCursorW
LoadAcceleratorsW
IsIconic
IsDialogMessageW
IsClipboardFormatAvailable
InvalidateRect
GetWindowTextW
GetWindowPlacement
GetWindowLongW
GetSystemMetrics
GetSystemMenu
GetSubMenu
GetParent
GetMessageW
GetMenuState
GetMenu
GetKeyboardLayout
GetForegroundWindow
GetFocus
GetDlgItem
GetDlgCtrlID
GetDesktopWindow
GetDC
GetCursorPos
GetClientRect
EndDialog
EnableWindow
EnableMenuItem
DrawTextExW
DispatchMessageW
DialogBoxParamW
DestroyWindow
DefWindowProcW
CreateWindowExW
CreateDialogParamW
CloseClipboard
ChildWindowFromPoint
CheckMenuItem
CharUpperW
CharNextW
CharLowerW
GetSysColor
GetDlgItemTextW
gdi32
EndDoc
TextOutW
StartPage
StartDocW
SetWindowExtEx
SetViewportExtEx
SetMapMode
SetBkMode
SetAbortProc
SelectObject
LPtoDP
GetTextMetricsW
GetTextFaceW
GetTextExtentPointW
GetTextExtentPoint32W
GetStockObject
GetObjectW
GetDeviceCaps
EnumFontsW
AbortDoc
DeleteObject
DeleteDC
CreateFontIndirectW
CreateDCW
EndPage
advapi32
ClearEventLogW
SetSecurityDescriptorDacl
ReportEventW
RegisterEventSourceW
RegSetValueExW
RegQueryValueExW
RegQueryValueExA
RegOpenKeyExW
RegOpenKeyExA
RegDeleteValueW
RegCreateKeyW
RegCreateKeyExW
RegCloseKey
ReadEventLogW
OpenEventLogW
IsTextUnicode
InitializeSecurityDescriptor
GetUserNameW
DeregisterEventSource
CloseEventLog
RegOpenKeyA
shell32
DragQueryFileW
DragFinish
DragAcceptFiles
ShellAboutW
msvcrt
memcpy
_XcptFilter
__getmainargs
__initenv
__p__commode
__p__fmode
__set_app_type
__setusermatherr
_acmdln
_adjust_fdiv
_c_exit
_cexit
_controlfp
_except_handler3
_exit
_initterm
_snwprintf
_vsnwprintf
_wcsicmp
_wgetcwd
_wmakepath
_wsplitpath
_wtoi
_wtol
calloc
exit
free
isdigit
isprint
iswctype
localtime
malloc
realloc
sprintf
strchr
swprintf
swscanf
time
tolower
wcscat
wcscmp
wcscpy
wcslen
wcsncmp
wcsncpy
wprintf
Sections
.text Size: 117KB - Virtual size: 116KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ