Static task
static1
Behavioral task
behavioral1
Sample
62ed2350c6d1220723137872e72f68f7c10f4b27758f977ab4cf4e9a60a0097a.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
62ed2350c6d1220723137872e72f68f7c10f4b27758f977ab4cf4e9a60a0097a.exe
Resource
win10v2004-20221111-en
General
-
Target
62ed2350c6d1220723137872e72f68f7c10f4b27758f977ab4cf4e9a60a0097a
-
Size
436KB
-
MD5
cb327bcc4af548c7f1ddfc2a5da7a87f
-
SHA1
b39b4d4268fe092475798056c708c6e33492f716
-
SHA256
62ed2350c6d1220723137872e72f68f7c10f4b27758f977ab4cf4e9a60a0097a
-
SHA512
4d5aa312e23920afbf7f0eb209234e1bef9320d23f6c96aba1dabe1d2583dceb841aeb8125b9146f6e13168655b259cf47bb81e63715517401533afce0d0f2a7
-
SSDEEP
6144:18UDwLi6tk58zPMmRPsYGCpRtamMzN4QD2n+Ykbv4S5cbgY9ySuwYDMTKxrNkpIo:1ki6tNkmCGAmgKQ37bfKbxySuDxKnaJ
Malware Config
Signatures
Files
-
62ed2350c6d1220723137872e72f68f7c10f4b27758f977ab4cf4e9a60a0097a.exe windows x86
04f3ba4d47190f357a4e6729e80a8749
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ole32
ReadFmtUserTypeStg
ReadClassStg
OleRun
StringFromGUID2
CreateItemMoniker
OleDuplicateData
CoRegisterMessageFilter
WriteFmtUserTypeStg
CoTreatAsClass
SetConvertStg
CoRevokeClassObject
comctl32
ord17
ImageList_Add
InitCommonControlsEx
ImageList_Remove
kernel32
DeleteCriticalSection
CreateFileMappingW
HeapCreate
GlobalLock
GetStartupInfoA
MulDiv
LocalAlloc
GlobalSize
GetSystemTimeAsFileTime
LCMapStringW
VirtualQuery
FlushFileBuffers
ExitThread
FreeEnvironmentStringsW
GetFileSize
RtlUnwind
GetCurrentDirectoryA
GetSystemInfo
GetLocaleInfoA
ReadFile
CreateFileW
lstrlenW
TlsAlloc
GetCurrentThread
ExitProcess
TlsSetValue
SetStdHandle
GetModuleFileNameA
GetOEMCP
SetHandleCount
CreateThread
CreateMutexW
FileTimeToSystemTime
lstrlenA
GetCommandLineA
IsBadCodePtr
SetFilePointer
GetCurrentProcessId
UnmapViewOfFile
HeapDestroy
CompareStringA
GetStdHandle
InitializeCriticalSection
HeapAlloc
GetDateFormatA
GetEnvironmentStringsW
CreateDirectoryW
HeapFree
GlobalFree
InterlockedIncrement
InterlockedDecrement
TlsFree
GetStartupInfoW
InterlockedCompareExchange
CreateDirectoryA
IsBadWritePtr
LockFile
GetVersionExW
VirtualFree
WideCharToMultiByte
GetModuleHandleW
GetCurrentThreadId
WaitForMultipleObjects
GetACP
ResumeThread
GetCurrentProcess
GetTimeFormatA
CompareStringW
WriteConsoleA
GetLocaleInfoW
FileTimeToLocalFileTime
FreeLibrary
GetProcAddress
FreeEnvironmentStringsA
GetCommandLineW
GetStringTypeW
MultiByteToWideChar
GetStringTypeA
WriteFile
SetCurrentDirectoryA
VirtualAlloc
IsDebuggerPresent
UnlockFile
GetThreadLocale
InterlockedExchange
RaiseException
LoadLibraryA
lstrcmpiW
VirtualProtect
CloseHandle
GetFileAttributesA
GetTempFileNameA
TerminateProcess
SetEndOfFile
DuplicateHandle
FormatMessageW
CopyFileW
GlobalUnlock
GetProcessHeap
SetUnhandledExceptionFilter
SetEvent
GlobalHandle
LoadLibraryW
HeapReAlloc
GetEnvironmentStrings
GetFileAttributesW
TlsGetValue
GetFileType
GetCPInfo
LCMapStringA
LeaveCriticalSection
GetModuleFileNameW
SetLastError
GetTickCount
GetFullPathNameW
SetFileAttributesW
ReleaseMutex
LocalFree
Sleep
GetLocalTime
SizeofResource
ExpandEnvironmentStringsA
SetEnvironmentVariableA
LoadResource
GetVersionExA
CreateFileA
FindClose
GetLastError
QueryPerformanceCounter
TerminateThread
GetTimeZoneInformation
EnterCriticalSection
HeapSize
GlobalMemoryStatus
GetModuleHandleA
GetUserDefaultLangID
UnhandledExceptionFilter
advapi32
RegSetValueExA
RegCreateKeyExA
RegOpenKeyExA
user32
GetDlgCtrlID
GetMenuItemID
InvalidateRect
GetCursorPos
SendDlgItemMessageA
GetDesktopWindow
ModifyMenuW
RegisterClassW
GetActiveWindow
WindowFromPoint
GetKeyState
GetScrollInfo
DefWindowProcW
LoadBitmapW
GetSysColor
UpdateWindow
TranslateMessage
LoadStringW
IsZoomed
LockWindowUpdate
GetForegroundWindow
DeleteMenu
OffsetRect
GetMessageW
SetTimer
EnableWindow
DestroyMenu
DestroyAcceleratorTable
IsWindowVisible
ScreenToClient
SetFocus
SetWindowPos
GetDlgItemTextW
WinHelpW
GetMenuItemInfoW
GetMessagePos
wsprintfW
LoadImageW
FillRect
GetMenu
SetMenu
SetCursor
LoadIconW
GetTopWindow
GetNextDlgGroupItem
SetForegroundWindow
CallWindowProcW
PostQuitMessage
EqualRect
CreateWindowExW
GrayStringW
SetRectEmpty
FindWindowW
GetWindowRect
SystemParametersInfoA
GetWindowLongW
IsDialogMessageW
MessageBeep
EndDialog
DestroyWindow
CopyRect
LoadCursorW
GetWindow
SetDlgItemTextW
IsWindow
RegisterClassExW
IsIconic
DestroyIcon
ShowWindow
DispatchMessageW
PtInRect
GetWindowDC
PostMessageW
FrameRect
MessageBoxW
SetWindowPlacement
RegisterClipboardFormatW
DrawStateW
SetScrollPos
UnregisterClassA
SetParent
LoadAcceleratorsW
UnhookWindowsHookEx
IntersectRect
ReleaseCapture
EmptyClipboard
PeekMessageW
SetMenuDefaultItem
SetWindowTextW
DrawFocusRect
GetDC
GetSubMenu
TabbedTextOutW
GetParent
GetDlgItem
GetCapture
SetMenuItemInfoW
GetClassNameW
InflateRect
KillTimer
shell32
ord155
SHGetSpecialFolderLocation
DragQueryFileA
DragAcceptFiles
DragQueryPoint
winmm
timeGetDevCaps
waveOutGetDevCapsA
waveOutReset
timeGetTime
waveOutWrite
waveOutPrepareHeader
Sections
.text Size: 92KB - Virtual size: 88KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 256KB - Virtual size: 255KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 68KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ