Static task
static1
Behavioral task
behavioral1
Sample
69520fa14b513a6f6b41c4eeeb0eee4681439bbe1de57ac2bd6edeb2bef0a920.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
69520fa14b513a6f6b41c4eeeb0eee4681439bbe1de57ac2bd6edeb2bef0a920.exe
Resource
win10v2004-20221111-en
General
-
Target
69520fa14b513a6f6b41c4eeeb0eee4681439bbe1de57ac2bd6edeb2bef0a920
-
Size
209KB
-
MD5
07c01dca14e496c2c697ba58d2249768
-
SHA1
b171eed14bec7e211de37bf3151ae89cb86f2a43
-
SHA256
69520fa14b513a6f6b41c4eeeb0eee4681439bbe1de57ac2bd6edeb2bef0a920
-
SHA512
2706e63300f743d4216ebffceb028444f843345fe255472593f930f8f7285858f6714de9fb9038d7d2fdade94c56a973289b64e0906e02fd1014ed14128d1002
-
SSDEEP
6144:rDWUQ0CGVUHU0JPrxT+aO1nZoPZ02D8u0x:+UtLVUHNjxJEgQ5x
Malware Config
Signatures
Files
-
69520fa14b513a6f6b41c4eeeb0eee4681439bbe1de57ac2bd6edeb2bef0a920.exe windows x86
f4417d88364313218dff1ec40b8a564b
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
EnterCriticalSection
SetEvent
GetProcessHeap
FreeLibrary
GetCurrentProcessId
MultiByteToWideChar
GetLastError
SetUnhandledExceptionFilter
GetModuleFileNameA
GetCurrentThread
lstrlenA
GetACP
SetThreadPriority
CreateEventW
WaitForMultipleObjects
WideCharToMultiByte
SetEndOfFile
IsBadWritePtr
GetDiskFreeSpaceW
GetProcAddress
WriteFile
GetFileSize
ReleaseSemaphore
InterlockedDecrement
GetFileAttributesW
CreateFileW
CreateSemaphoreW
InterlockedIncrement
SetLastError
GetProfileIntA
VirtualFree
GlobalFindAtomW
GetQueuedCompletionStatus
HeapAlloc
lstrcpynW
GetTickCount
CloseHandle
GetPrivateProfileStringW
ResetEvent
MulDiv
GlobalMemoryStatus
GlobalAlloc
GlobalFree
GlobalUnlock
lstrcpyA
SetFilePointer
GetThreadPriority
GetLocaleInfoA
lstrcpyW
GetSystemTimeAsFileTime
WaitForSingleObject
lstrcmpW
GetFullPathNameW
HeapFree
InitializeCriticalSection
ReadFile
GetVersionExW
InterlockedExchange
CreateThread
GlobalHandle
GlobalLock
IsBadCodePtr
GetCurrentProcess
IsBadReadPtr
LoadLibraryW
QueryPerformanceCounter
LeaveCriticalSection
lstrlenW
lstrcmpiW
DeleteCriticalSection
user32
GetDesktopWindow
LoadStringW
ShowWindow
GetDlgItemInt
GetDC
InvalidateRect
SetDlgItemInt
IsRectEmpty
SendMessageW
CreateDialogParamW
TranslateMessage
IsWindow
CheckRadioButton
IsWindowVisible
GetAsyncKeyState
SetCursor
PeekMessageW
DefWindowProcW
EnableWindow
SetWindowLongW
GetDlgItem
LoadCursorW
MoveWindow
ClientToScreen
GetWindowRect
GetClientRect
DestroyWindow
GetWindowLongW
ReleaseDC
CheckDlgButton
DispatchMessageW
SetDlgItemTextW
msnetobj
DllGetClassObject
DllCanUnloadNow
DllRegisterServer
oleaut32
VarBstrFromDate
VarBstrFromI2
VarBstrFromUI4
VarBstrFromI8
VarBstrFromR8
VarBstrFromUI8
VarBstrFromI4
VarBstrFromI1
VarBstrFromR4
VarBstrFromDisp
VarBstrFromCy
VarBstrFromUI1
VarBstrFromDec
VarBstrFromUI2
msls31
LssbGetObjDimSubline
LssbGetVisibleDcpInSubline
LsCompressSubline
LssbGetPlsrunsFromSubline
LssbGetDurTrailWithPensInSubline
LssbGetNumberDnodesInSubline
msoeacct
ValidEmailAddress
GetDllMajorVersion
HrCreateAccountManager
DllCanUnloadNow
DllGetClassObject
Sections
.text Size: 81KB - Virtual size: 81KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 117KB - Virtual size: 117KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 6.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 996B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ