Static task
static1
Behavioral task
behavioral1
Sample
d2c678eb6e2e364b7bac39a4d8268876e7baefe5422b6dd57211b3cfb5dd787c.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
d2c678eb6e2e364b7bac39a4d8268876e7baefe5422b6dd57211b3cfb5dd787c.exe
Resource
win10v2004-20220812-en
General
-
Target
d2c678eb6e2e364b7bac39a4d8268876e7baefe5422b6dd57211b3cfb5dd787c
-
Size
388KB
-
MD5
6f2517a7241f07d1a659db0eef3deb78
-
SHA1
38b51e6bffdd327adf52f840cce1f2000f4304bf
-
SHA256
d2c678eb6e2e364b7bac39a4d8268876e7baefe5422b6dd57211b3cfb5dd787c
-
SHA512
61de07c65fd0ce201f9bfa6162962c8860bedbf7f7deba456dced30a054592df68a5ddda90083b2bc08cb5331002685ab4900225f0e2544f6812d4da98042773
-
SSDEEP
6144:KhBSEuMRjqIQ3EpjmqT00Oj25fZ4o767ennvmPlSB2DncC:2Wgjq5vqhOj2Io7Menvy/
Malware Config
Signatures
Files
-
d2c678eb6e2e364b7bac39a4d8268876e7baefe5422b6dd57211b3cfb5dd787c.exe windows x86
c3be84964c4ecaf2ce54bee403554de3
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
EmptyClipboard
ReleaseDC
RegisterClassA
RegisterClassExA
LoadIconA
InternalGetWindowText
ImpersonateDdeClientWindow
DefFrameProcW
EnableScrollBar
GetPropA
CreateWindowExA
CreateDialogIndirectParamA
TabbedTextOutA
CreateDialogParamA
SetWindowTextW
CloseWindowStation
CreateIconIndirect
MsgWaitForMultipleObjects
DestroyWindow
MessageBoxW
DefWindowProcA
ShowWindow
GetWindowTextLengthW
wininet
InternetGoOnlineA
FtpOpenFileW
SetUrlCacheHeaderData
InternetCombineUrlA
SetUrlCacheEntryInfoW
kernel32
GetNamedPipeHandleStateW
GetProcessHeaps
DeleteCriticalSection
GetModuleFileNameW
SetFilePointer
GetUserDefaultLangID
ConvertDefaultLocale
LoadLibraryA
EnumCalendarInfoA
GetStartupInfoW
TlsGetValue
WriteFile
OpenWaitableTimerW
HeapAlloc
WriteProfileSectionW
GetModuleHandleA
CompareStringA
LCMapStringA
GetEnvironmentStrings
TerminateProcess
EnumCalendarInfoExA
SetConsoleScreenBufferSize
UnlockFile
HeapDestroy
GlobalDeleteAtom
CreateToolhelp32Snapshot
GetConsoleOutputCP
GetPrivateProfileSectionA
LCMapStringW
SetHandleCount
GetSystemTime
GetCurrentProcess
FindNextFileW
CompareStringW
OpenMutexA
GetStdHandle
DebugBreak
FreeEnvironmentStringsW
GetStringTypeW
SetLastError
VirtualFree
FreeEnvironmentStringsA
SetVolumeLabelW
SetEnvironmentVariableW
SetStdHandle
TlsAlloc
FindResourceW
OpenEventA
HeapCreate
TlsSetValue
WideCharToMultiByte
WritePrivateProfileStructA
FindFirstFileExW
GetSystemTimeAsFileTime
UnhandledExceptionFilter
GetCurrentProcessId
GetVersion
FlushFileBuffers
LeaveCriticalSection
SetEnvironmentVariableA
InitializeCriticalSection
SetFileAttributesA
UnmapViewOfFile
EnumResourceTypesW
GetCurrentThreadId
GetEnvironmentStringsW
GetTimeZoneInformation
ReadFile
VirtualAlloc
GetSystemDefaultLangID
GetTickCount
ExitProcess
GetStartupInfoA
GetCPInfo
CreateMutexA
CreateMailslotA
AddAtomA
GetStringTypeA
GetProcessAffinityMask
WriteProfileSectionA
EnumSystemLocalesW
InterlockedIncrement
HeapReAlloc
AddAtomW
VirtualQuery
QueryPerformanceCounter
LoadLibraryExA
CreateProcessW
GetModuleFileNameA
GetCurrentThread
OpenProcess
GetCommandLineW
EnterCriticalSection
WriteConsoleInputA
InterlockedDecrement
RtlUnwind
GlobalGetAtomNameA
DosDateTimeToFileTime
GetLocalTime
GetProcAddress
GetTempPathA
GlobalSize
IsBadWritePtr
GetProfileStringA
FindClose
WritePrivateProfileSectionA
SetEndOfFile
CloseHandle
GetDiskFreeSpaceExW
WaitNamedPipeA
MultiByteToWideChar
GetCommandLineA
GetLastError
TlsFree
GetFileType
ExpandEnvironmentStringsW
Sleep
InterlockedExchange
HeapFree
comctl32
ImageList_SetOverlayImage
DrawStatusTextA
InitCommonControlsEx
CreateStatusWindow
DrawStatusText
CreateMappedBitmap
ImageList_SetDragCursorImage
Sections
.text Size: 128KB - Virtual size: 127KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 96KB - Virtual size: 95KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 88KB - Virtual size: 102KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 72KB - Virtual size: 70KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ