Static task
static1
Behavioral task
behavioral1
Sample
d5d4051c2bcf89eccab06015780e302f21132187dc778c5b408ed81f52c15734.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
d5d4051c2bcf89eccab06015780e302f21132187dc778c5b408ed81f52c15734.exe
Resource
win10v2004-20221111-en
General
-
Target
d5d4051c2bcf89eccab06015780e302f21132187dc778c5b408ed81f52c15734
-
Size
346KB
-
MD5
8944274c3f2750241862f53b3b6adf7a
-
SHA1
e0027d79c523a3f85542667da05f52d121b839eb
-
SHA256
d5d4051c2bcf89eccab06015780e302f21132187dc778c5b408ed81f52c15734
-
SHA512
8612700d042714ae6b43803cebb06247da9fd7d6131bd05edd4c3c084a21d9fa054db5cf2e2b86ca02744e362398298469e8b79120c46b71817c2fd89f5c3861
-
SSDEEP
6144:2JCwIRZl8PVH1CiBnBew6eg7KjkGlq8BM:20w6l8LHBnBewiOjdo8O
Malware Config
Signatures
Files
-
d5d4051c2bcf89eccab06015780e302f21132187dc778c5b408ed81f52c15734.exe windows x86
4fa450d79efc8120ee63621fbb75185a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
MessageBeep
PeekMessageA
CharNextA
MessageBoxA
LoadStringA
GetKeyboardType
GetSystemMetrics
SetMenuItemBitmaps
SendMessageCallbackW
DdePostAdvise
SetLastErrorEx
UnionRect
DialogBoxParamA
EnumClipboardFormats
SystemParametersInfoA
DestroyWindow
UnhookWinEvent
SetMessageQueue
shell32
ShellExecuteExA
ole32
StgOpenStorageOnILockBytes
CoRegisterChannelHook
OleLoad
CoTaskMemFree
OleRegEnumVerbs
OleSetClipboard
CoGetTreatAsClass
OleCreateLinkToFileEx
advapi32
RegOpenKeyExA
RegCloseKey
RegQueryValueExA
dbghelp
SymGetTypeInfo
SymInitialize
SymGetSymFromAddr64
SymEnumerateSymbols
SymSetOptions
SymGetModuleInfoW64
kernel32
VirtualProtect
SetStdHandle
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
GetSystemInfo
GetStringTypeA
LCMapStringW
LCMapStringA
FlushFileBuffers
GetConsoleMode
GetConsoleCP
GetOEMCP
GetACP
GetTimeZoneInformation
GetCurrentProcessId
QueryPerformanceCounter
CompareStringW
SetEnvironmentVariableA
GetStringTypeW
GetModuleHandleA
InterlockedDecrement
SetLastError
InterlockedIncrement
TlsFree
TlsAlloc
GetModuleHandleW
SetHandleCount
CompareStringA
CreateEventA
EnumCalendarInfoA
FormatMessageA
GetCPInfo
GetDiskFreeSpaceA
GetExitCodeProcess
GetTempFileNameA
GetTempPathA
GetTickCount
GetVersionExA
GetWindowsDirectoryA
Sleep
TerminateProcess
WaitForSingleObject
TlsGetValue
TlsSetValue
CloseHandle
CreateFileA
GetFileType
GetFileSize
GetStdHandle
RaiseException
ReadFile
RtlUnwind
SetEndOfFile
SetFilePointer
UnhandledExceptionFilter
WriteFile
ExitProcess
FindClose
FindFirstFileA
FreeLibrary
GetCommandLineA
GetLastError
GetLocaleInfoA
GetModuleFileNameA
GetProcAddress
GetStartupInfoA
GetThreadLocale
LoadLibraryExA
lstrcpyA
lstrcpynA
lstrlenA
MultiByteToWideChar
WideCharToMultiByte
VirtualQuery
LocalAlloc
LocalFree
VirtualAlloc
VirtualFree
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
GetCurrentThreadId
SetEvent
LocalUnlock
GetVolumeInformationA
GetNumberFormatA
FindResourceW
GetVolumePathNameW
GetSystemTimeAsFileTime
HeapFree
HeapAlloc
HeapDestroy
HeapCreate
HeapReAlloc
OutputDebugStringA
GetCurrentProcess
SetUnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
Sections
.text Size: 117KB - Virtual size: 117KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 47KB - Virtual size: 46KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 174KB - Virtual size: 174KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ