Static task
static1
Behavioral task
behavioral1
Sample
0dbd5822b4f2b2cf067c28f58fa7a17d9aba2d49d9dc541033a94c3d81d4f30d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0dbd5822b4f2b2cf067c28f58fa7a17d9aba2d49d9dc541033a94c3d81d4f30d.exe
Resource
win10v2004-20220812-en
General
-
Target
0dbd5822b4f2b2cf067c28f58fa7a17d9aba2d49d9dc541033a94c3d81d4f30d
-
Size
214KB
-
MD5
222305921a2ed80bdbc3be1e2bb54b10
-
SHA1
6ded03f00348d8d0a50dabcca6c82395ecc25732
-
SHA256
0dbd5822b4f2b2cf067c28f58fa7a17d9aba2d49d9dc541033a94c3d81d4f30d
-
SHA512
863d5a5f268051b4d8ec65ff150c697d57b8bce9c5345a18eacda0056fe34f3832e68b797f0b5a8cc2958fe90a360a62e4d7cc7655d040aff407818532ee9300
-
SSDEEP
6144:TPbd2yYzNPcFkZuEl9E/NmZwOAU/WPan0O/vw:TPINzayZDAewHWHl/
Malware Config
Signatures
Files
-
0dbd5822b4f2b2cf067c28f58fa7a17d9aba2d49d9dc541033a94c3d81d4f30d.exe windows x86
1296e53958613460ff9fb85c2f7a3403
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ole32
CreateStreamOnHGlobal
CoResumeClassObjects
CoRegisterClassObject
CLSIDFromString
CoReleaseMarshalData
gdi32
PolyPolyline
comctl32
ImageList_SetDragCursorImage
ImageList_GetImageCount
ImageList_Duplicate
ImageList_Replace
oleaut32
SafeArrayRedim
SafeArrayGetLBound
SafeArrayUnaccessData
SafeArrayGetElement
SysStringLen
SetErrorInfo
VariantCopy
SafeArrayCreate
LoadTypeLibEx
SafeArrayPutElement
QueryPathOfRegTypeLi
user32
ChildWindowFromPoint
CloseWindow
TabbedTextOutA
SetWindowPlacement
GetGuiResources
SetScrollInfo
IsZoomed
GetParent
DefFrameProcW
ModifyMenuA
GetDoubleClickTime
SendMessageTimeoutA
DrawFrameControl
SetClipboardData
TrackPopupMenu
UnregisterDeviceNotification
GrayStringW
CreateDesktopW
IsWindowVisible
FlashWindowEx
LoadImageA
FillRect
CreateIconFromResource
GetClassInfoA
DialogBoxParamA
GetSubMenu
LoadKeyboardLayoutA
DestroyAcceleratorTable
CreateWindowStationW
DrawTextExA
version
VerFindFileA
GetFileVersionInfoSizeA
VerQueryValueA
kernel32
GetModuleHandleA
SizeofResource
WritePrivateProfileSectionW
GetHandleInformation
GlobalFree
CopyFileExW
OutputDebugStringA
SetEndOfFile
ReadDirectoryChangesW
WritePrivateProfileStringA
SetErrorMode
TlsGetValue
GlobalGetAtomNameW
InitializeCriticalSection
UnhandledExceptionFilter
DeleteCriticalSection
EnumDateFormatsW
ExpandEnvironmentStringsW
GetDriveTypeW
GetCurrentProcessId
_llseek
EnumTimeFormatsW
GetTapeParameters
GetStartupInfoA
GetSystemDirectoryW
IsDBCSLeadByteEx
_lclose
VirtualAlloc
advapi32
RegSaveKeyA
LookupAccountSidW
LockServiceDatabase
RegLoadKeyW
EqualSid
RegFlushKey
AccessCheckAndAuditAlarmW
SetFileSecurityA
RegUnLoadKeyW
RegRestoreKeyA
RegNotifyChangeKeyValue
GetSidLengthRequired
MakeSelfRelativeSD
CryptSetProvParam
ws2_32
WSASetBlockingHook
closesocket
WSASetLastError
WSASetServiceW
gethostbyaddr
WSALookupServiceEnd
WSARecvFrom
shell32
Shell_NotifyIconA
FindExecutableW
DragQueryPoint
SHGetSpecialFolderLocation
SHChangeNotify
SHGetSpecialFolderPathW
FindExecutableA
msvcrt
__setusermatherr
isprint
_ismbcdigit
__doserrno
_mbschr
_controlfp
fwscanf
floor
fputc
ferror
_wtol
_i64tow
_mbsdec
_wsystem
_mbctolower
strftime
wcscpy
_wspawnvp
isdigit
_wcsupr
_mbsnbcpy
_stat
_errno
_read
_cwait
_wopen
_mbslen
fputs
perror
mbtowc
qsort
wcslen
vwprintf
fflush
vfwprintf
atol
_beginthread
strrchr
wcscmp
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
_fcvt
_initterm
Sections
.text Size: 197KB - Virtual size: 196KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE