Static task
static1
Behavioral task
behavioral1
Sample
df76a580344867adfd4994a6b3ab82e33d32c8ee840d738fe461fd9f5c8ac365.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
df76a580344867adfd4994a6b3ab82e33d32c8ee840d738fe461fd9f5c8ac365.exe
Resource
win10v2004-20221111-en
General
-
Target
df76a580344867adfd4994a6b3ab82e33d32c8ee840d738fe461fd9f5c8ac365
-
Size
630KB
-
MD5
7ca11876733fcff0a0d1bac8b2371954
-
SHA1
80fd45f36689284c7ee6422e39b323568f89edb6
-
SHA256
df76a580344867adfd4994a6b3ab82e33d32c8ee840d738fe461fd9f5c8ac365
-
SHA512
cdcd4a9adc381057fc1e55d9360222d5e51e041009e17c2d2bf9a1419f7db7e31c3a8d9101442403b5913a7fc41f4196d4002667c024159ecf36787b4f084fd8
-
SSDEEP
12288:x3PeNG7kbO0PEJbj2OgJ+yYYl52dE8Zu9ftJCbil0sRa79VAHwyU6:x3GNukbpPEJ+O8+y75H8ZofCbJQanAH7
Malware Config
Signatures
Files
-
df76a580344867adfd4994a6b3ab82e33d32c8ee840d738fe461fd9f5c8ac365.exe windows x86
f1de710971c2be834fc68375cd843aee
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
SetDIBits
GetGlyphOutline
CreateDCA
PtInRegion
GetBrushOrgEx
SetMapMode
SetStretchBltMode
ExtCreateRegion
StartDocA
UnrealizeObject
kernel32
GetModuleFileNameW
GetStringTypeA
SetStdHandle
QueryPerformanceCounter
SetFilePointer
HeapReAlloc
SetEnvironmentVariableA
GetEnvironmentStringsW
TlsGetValue
Sleep
GetModuleFileNameA
GetOEMCP
IsValidLocale
GetCommandLineA
GetFileType
GetCommandLineW
GetTickCount
ExitProcess
CreateFileA
RtlUnwind
GetCurrentThread
WriteConsoleW
InterlockedDecrement
TlsSetValue
ReadFile
CloseHandle
SetConsoleCP
GetCurrentThreadId
FreeLibrary
VirtualFree
GetModuleHandleA
GetEnvironmentStrings
HeapCreate
LeaveCriticalSection
WideCharToMultiByte
FreeEnvironmentStringsW
GetACP
GetTimeFormatA
GetProcessHeap
HeapDestroy
GetProcAddress
GetConsoleMode
CompareStringA
GetCompressedFileSizeW
LCMapStringA
WriteConsoleA
GetSystemTimeAsFileTime
InterlockedIncrement
InitializeCriticalSection
GetCPInfo
IsValidCodePage
SetConsoleCtrlHandler
InterlockedExchange
SetUnhandledExceptionFilter
GetLocaleInfoW
DeleteCriticalSection
HeapSize
GetConsoleOutputCP
TlsFree
TlsAlloc
GetStringTypeW
GetDateFormatA
IsDebuggerPresent
FlushFileBuffers
SetThreadLocale
LoadLibraryA
EnterCriticalSection
VirtualQuery
CreateMutexA
SetHandleCount
GetCurrentProcess
EnumTimeFormatsW
WriteConsoleOutputA
GetLocaleInfoA
EnumSystemLocalesA
GetConsoleCP
GetStartupInfoA
GetVersionExA
OpenMutexA
GetTimeZoneInformation
UnhandledExceptionFilter
CompareStringW
GetFullPathNameW
GetStdHandle
GetStartupInfoW
lstrcpyA
TerminateProcess
SetLastError
MultiByteToWideChar
VirtualAlloc
LCMapStringW
FreeEnvironmentStringsA
HeapFree
WriteFile
GetLastError
HeapAlloc
GetCurrentProcessId
GetUserDefaultLCID
user32
OpenWindowStationW
DefWindowProcA
GetKeyboardLayoutNameA
GetSubMenu
MessageBoxA
DestroyWindow
SetForegroundWindow
GetQueueStatus
GetAltTabInfo
ToUnicodeEx
IsWindow
ChangeDisplaySettingsExA
DefFrameProcA
ScrollWindowEx
ShowScrollBar
PeekMessageA
RegisterClassA
IsZoomed
DefDlgProcW
BeginPaint
ShowWindow
CreateWindowExA
ScrollWindow
RegisterClassExA
GetDesktopWindow
comctl32
ImageList_BeginDrag
CreateToolbar
CreatePropertySheetPageW
CreateStatusWindowW
InitCommonControlsEx
DrawInsert
ImageList_DrawIndirect
_TrackMouseEvent
CreatePropertySheetPageA
DrawStatusTextW
ImageList_SetFilter
Sections
.text Size: 249KB - Virtual size: 248KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 246KB - Virtual size: 246KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 121KB - Virtual size: 126KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ