Static task
static1
Behavioral task
behavioral1
Sample
da4b3e9aa05f182bceb8f7f99683b73cb1048d44cd843b3b490c66707eeaf175.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
da4b3e9aa05f182bceb8f7f99683b73cb1048d44cd843b3b490c66707eeaf175.exe
Resource
win10v2004-20220812-en
General
-
Target
da4b3e9aa05f182bceb8f7f99683b73cb1048d44cd843b3b490c66707eeaf175
-
Size
316KB
-
MD5
e096d0e889c3e5e687f8980980dea4df
-
SHA1
61526ad3448a82d4d35f4af0d0f3d28c241f99fe
-
SHA256
da4b3e9aa05f182bceb8f7f99683b73cb1048d44cd843b3b490c66707eeaf175
-
SHA512
9dd325311211261b9f7decbe89e121ded459a8a143389fab63ee92aae730193fb7aa7c6034234aad1a23677bd9fc95a86fffb720d327df58dcbc2848e9f588ce
-
SSDEEP
6144:99TmlaN22SH+Ig/wEFFKMqqCfpiml3jAtxt:99aRHo/KiChimpG
Malware Config
Signatures
Files
-
da4b3e9aa05f182bceb8f7f99683b73cb1048d44cd843b3b490c66707eeaf175.exe windows x86
b38151f3071a13b1ba73c000941d98da
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapSize
FreeEnvironmentStringsW
GetNamedPipeHandleStateW
GetModuleFileNameW
RtlUnwind
LoadLibraryA
CreateToolhelp32Snapshot
HeapReAlloc
ExitProcess
RaiseException
CompareStringA
IsValidCodePage
GetTimeZoneInformation
IsBadWritePtr
VirtualFree
GetModuleFileNameA
GetDateFormatW
HeapFree
SetLastError
GetVersionExA
EnumResourceNamesA
GetProcessHeaps
OpenMutexA
FillConsoleOutputAttribute
GetCPInfo
TlsGetValue
FlushFileBuffers
LeaveCriticalSection
TerminateProcess
GetProcAddress
UnhandledExceptionFilter
TlsAlloc
GetSystemInfo
AddAtomA
GetPrivateProfileIntW
HeapCreate
GetStringTypeA
GetProfileIntW
GetCurrentProcessId
SetFileTime
FreeEnvironmentStringsA
IsValidLocale
MultiByteToWideChar
QueryPerformanceCounter
WriteConsoleW
GetEnvironmentStringsW
GlobalGetAtomNameA
LoadLibraryExA
GetOEMCP
WriteFile
HeapDestroy
CopyFileExA
WideCharToMultiByte
InterlockedExchange
GetLastError
CreateMutexA
GetFullPathNameA
GetStdHandle
HeapAlloc
InitializeCriticalSection
TlsSetValue
SetConsoleMode
GetEnvironmentStrings
GetUserDefaultLCID
SetEnvironmentVariableA
GetCurrentProcess
EnumCalendarInfoExW
CreateProcessA
LCMapStringW
VirtualQuery
EnumSystemLocalesA
SetHandleCount
GetProcessHeap
GetStringTypeW
DeleteFileW
GlobalLock
LCMapStringA
GetDateFormatA
GetSystemTimeAsFileTime
GetCommandLineA
TlsFree
CreateEventA
GetTimeFormatA
GetPrivateProfileSectionA
GetACP
GetStartupInfoA
GetProfileStringW
GetLocaleInfoA
GetCurrentThread
WriteProfileSectionW
GetModuleHandleA
WaitForSingleObject
EnterCriticalSection
GetLocaleInfoW
VirtualAlloc
GetTickCount
CompareStringW
SetStdHandle
GetCurrentThreadId
GetFileType
ReadConsoleOutputW
ReadFile
CloseHandle
DeleteCriticalSection
VirtualProtect
SetFilePointer
comctl32
DestroyPropertySheetPage
ImageList_SetImageCount
ImageList_GetImageCount
_TrackMouseEvent
ImageList_GetIcon
ImageList_AddIcon
ImageList_Duplicate
CreatePropertySheetPageW
ImageList_GetImageRect
InitMUILanguage
ImageList_BeginDrag
CreateUpDownControl
DrawInsert
GetEffectiveClientRect
InitCommonControlsEx
ImageList_GetBkColor
CreateStatusWindowA
DrawStatusTextA
ImageList_GetImageInfo
user32
GetQueueStatus
PostQuitMessage
MessageBoxA
DrawStateW
GetMenuCheckMarkDimensions
GetMenuItemCount
SendNotifyMessageA
RegisterClassExA
GetKeyNameTextW
TileWindows
OffsetRect
ShowWindow
LoadCursorA
DdeGetLastError
SendInput
DestroyWindow
SendMessageTimeoutW
SetScrollPos
ChangeDisplaySettingsExW
FillRect
CallMsgFilter
RegisterClassA
ChangeClipboardChain
DdeGetData
DefWindowProcA
CreateWindowExA
advapi32
LookupPrivilegeNameW
LookupAccountSidA
CryptDeriveKey
CryptDestroyKey
CryptSetHashParam
RegReplaceKeyW
CreateServiceA
InitiateSystemShutdownW
RegQueryInfoKeyW
Sections
.text Size: 84KB - Virtual size: 80KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 96KB - Virtual size: 94KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 92KB - Virtual size: 115KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 40KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ