Static task
static1
Behavioral task
behavioral1
Sample
812df3a7e4dbe366e8030a4f0d629cde70b16e7d1cb05a655194b2d24d3af3a7.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
812df3a7e4dbe366e8030a4f0d629cde70b16e7d1cb05a655194b2d24d3af3a7.exe
Resource
win10v2004-20221111-en
General
-
Target
812df3a7e4dbe366e8030a4f0d629cde70b16e7d1cb05a655194b2d24d3af3a7
-
Size
491KB
-
MD5
843dd7456f56ce24c6cdc0e4f86ee90b
-
SHA1
0be4a0faa2a6e49c1271bdcdbe58945fdbcfd30c
-
SHA256
812df3a7e4dbe366e8030a4f0d629cde70b16e7d1cb05a655194b2d24d3af3a7
-
SHA512
43c17fb0725a2b1f25516a5dd848178a354a9afecf6510b5495682e9aa96b17b44321be6b8fe759367a3455a389fa256d963458a4282be735165089d1d83feee
-
SSDEEP
12288:R9WhmMQcKcah3vj2ShmBk3+mvSSSjl4HAO5cgN:/htcKrhKGsGmSOaAO5cgN
Malware Config
Signatures
Files
-
812df3a7e4dbe366e8030a4f0d629cde70b16e7d1cb05a655194b2d24d3af3a7.exe windows x86
f69749a1c039e50a0a7a3c9cecd02f4c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
ResetDCA
GetDeviceCaps
DeleteObject
GetObjectW
SelectObject
CreateDCW
DeleteDC
CreatePen
user32
CreateWindowExW
PostThreadMessageW
EnumChildWindows
DestroyWindow
RegisterClassA
IsCharLowerA
GetUpdateRect
EnumThreadWindows
ShowWindow
SetDlgItemInt
CreateIconFromResourceEx
ArrangeIconicWindows
MessageBoxW
IsCharAlphaA
EndDialog
SetSystemCursor
TabbedTextOutA
SetCaretPos
DefWindowProcA
GetCaretBlinkTime
SetPropW
WaitForInputIdle
GetMonitorInfoW
RegisterClassExA
OffsetRect
GetNextDlgTabItem
comdlg32
GetFileTitleA
ChooseFontA
GetOpenFileNameW
PageSetupDlgW
comctl32
CreateUpDownControl
InitCommonControlsEx
ImageList_LoadImage
CreatePropertySheetPageA
ImageList_Replace
InitMUILanguage
ImageList_EndDrag
CreateStatusWindow
ImageList_Copy
ImageList_SetIconSize
ImageList_DrawIndirect
MakeDragList
CreateToolbarEx
kernel32
RtlUnwind
GetLastError
CompareStringW
InitializeCriticalSection
SetStdHandle
TlsAlloc
TlsSetValue
GetTickCount
SetFilePointer
FreeEnvironmentStringsA
HeapAlloc
GetFileType
WideCharToMultiByte
IsBadWritePtr
TlsGetValue
ExitProcess
IsValidCodePage
LCMapStringA
HeapReAlloc
FlushFileBuffers
HeapDestroy
GetUserDefaultLCID
GetLocaleInfoA
HeapCreate
LeaveCriticalSection
VirtualFree
GetFullPathNameW
LoadLibraryA
InterlockedExchange
GetCurrentProcessId
CloseHandle
DeleteCriticalSection
GetSystemTimeAsFileTime
GetStringTypeW
TerminateProcess
SetConsoleCP
OpenMutexA
CreateMutexA
CompareStringA
GetTimeZoneInformation
GetSystemInfo
VirtualProtect
GetVersionExA
GetProcAddress
LCMapStringW
GetModuleFileNameW
HeapSize
HeapFree
EnterCriticalSection
SetHandleCount
GetModuleHandleA
GetACP
GetStartupInfoA
GetEnvironmentStrings
MultiByteToWideChar
GetDiskFreeSpaceA
GetCommandLineW
SetLastError
UnhandledExceptionFilter
FreeEnvironmentStringsW
GetStringTypeA
SetEnvironmentVariableA
GetModuleFileNameA
ReadFile
QueryPerformanceCounter
WriteFile
GetOEMCP
GetCurrentThreadId
GetStdHandle
GetEnvironmentStringsW
GetTimeFormatA
GlobalLock
VirtualAlloc
VirtualQuery
TlsFree
GetCommandLineA
GetLocaleInfoW
GetCurrentThread
GetCPInfo
GetDateFormatA
GetCurrentProcess
GetStartupInfoW
IsValidLocale
EnumSystemLocalesA
shell32
SHAddToRecentDocs
wininet
InternetUnlockRequestFile
InternetHangUp
Sections
.text Size: 162KB - Virtual size: 162KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 203KB - Virtual size: 218KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 110KB - Virtual size: 109KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ