Static task
static1
Behavioral task
behavioral1
Sample
dfd8dfa9c6d241465c6a5d9c2afdbe04148324ec3e4783b9240c4e33263ed11b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
dfd8dfa9c6d241465c6a5d9c2afdbe04148324ec3e4783b9240c4e33263ed11b.exe
Resource
win10v2004-20221111-en
General
-
Target
dfd8dfa9c6d241465c6a5d9c2afdbe04148324ec3e4783b9240c4e33263ed11b
-
Size
336KB
-
MD5
137180310fcd9858729ed4058e4623b1
-
SHA1
f7c7804820a53469ca99439f1971696990213fcc
-
SHA256
dfd8dfa9c6d241465c6a5d9c2afdbe04148324ec3e4783b9240c4e33263ed11b
-
SHA512
6f62b34ae6ec3beae9fd55067d4277f5299660fe7223da751637e434ea9b63ee98d0cbbb7625f85a92c700a96c439743098e649832d11bfc198ce4244fcda7a1
-
SSDEEP
6144:myC2LUzBhpAKwcqGJrlwoyBkeks8QCFKcR6SqpLWpnAaJ3cKMO7f:3C2LMAKUiwoQkacKcR/q5DaJ3uO7f
Malware Config
Signatures
Files
-
dfd8dfa9c6d241465c6a5d9c2afdbe04148324ec3e4783b9240c4e33263ed11b.exe windows x86
85fd93e0ef8e4b2871bc6b7c54b4a6d3
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
InitCommonControlsEx
user32
RegisterClassA
GetClipboardData
LoadIconA
GetInputState
DlgDirSelectComboBoxExA
RegisterClassExA
DdeImpersonateClient
GetMenuItemInfoA
EndDeferWindowPos
ReleaseDC
comdlg32
ChooseColorW
ReplaceTextA
ChooseFontW
kernel32
EnumSystemLocalesA
CompareStringA
TlsGetValue
GetVersionExA
CreateMutexA
CompareStringW
LeaveCriticalSection
TlsSetValue
GetLastError
VirtualFree
OpenSemaphoreA
SetStdHandle
WriteFile
FileTimeToDosDateTime
HeapAlloc
LoadLibraryA
GetACP
VirtualProtect
GetModuleFileNameA
HeapFree
lstrcmpW
GetPrivateProfileStringW
GetThreadLocale
FlushFileBuffers
AddAtomW
GetEnvironmentStrings
GetTimeZoneInformation
LCMapStringA
SetHandleCount
GetCurrentProcess
GetEnvironmentStringsW
GetTempPathA
HeapCreate
GetLogicalDrives
OpenMutexA
FreeEnvironmentStringsW
TlsFree
GetCurrentThread
GetStdHandle
GetTimeFormatA
GetUserDefaultLCID
GetProcAddress
GetTickCount
DeleteCriticalSection
ReadFile
GetDateFormatA
CloseHandle
QueryPerformanceCounter
GetLocaleInfoA
GetCurrentProcessId
GetCurrentThreadId
TlsAlloc
InterlockedExchange
GetSystemInfo
EnumResourceLanguagesW
HeapDestroy
GetLocaleInfoW
LCMapStringW
IsValidLocale
VirtualAlloc
GetCurrentDirectoryA
GetStartupInfoA
CreateRemoteThread
WideCharToMultiByte
GetOEMCP
lstrcmp
VirtualQuery
ExitProcess
IsValidCodePage
GetFileType
SetFilePointer
GetStringTypeW
HeapReAlloc
RtlUnwind
UnhandledExceptionFilter
EnterCriticalSection
FreeEnvironmentStringsA
SetLastError
TerminateProcess
SetEnvironmentVariableA
GetModuleHandleA
HeapSize
GetCommandLineA
SetThreadLocale
IsBadWritePtr
InitializeCriticalSection
EnumDateFormatsExA
GetSystemTimeAsFileTime
MultiByteToWideChar
GetStringTypeA
GetCPInfo
Sections
.text Size: 214KB - Virtual size: 214KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 15KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 89KB - Virtual size: 88KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ