Static task
static1
Behavioral task
behavioral1
Sample
d2d759c864d633e424399a054e8aa25cb1c046a7b1ddae61ff6e8a9327d5b5bd.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d2d759c864d633e424399a054e8aa25cb1c046a7b1ddae61ff6e8a9327d5b5bd.exe
Resource
win10v2004-20220901-en
General
-
Target
d2d759c864d633e424399a054e8aa25cb1c046a7b1ddae61ff6e8a9327d5b5bd
-
Size
236KB
-
MD5
01cf4d9246bd1d82e932d41a3cc28fa3
-
SHA1
299821d91cb1e6330d5d81533e5d9e7a3cb6a44f
-
SHA256
d2d759c864d633e424399a054e8aa25cb1c046a7b1ddae61ff6e8a9327d5b5bd
-
SHA512
f6bb2807f1addfade4094e063d125cab0d1c7a3f80fa75beb4b7a059c7578b75d2d97e13d1e79a5669ed2c95a6c3f38480a3789e79d87bf1bc1c2a7492521f12
-
SSDEEP
3072:knxe4DphzvR/y5DBP4pKF44Tg6ByNKhCvwOdQ7ae3JmIWwlLygRjZqMNfQ:knnwDpuMuySKWoQIdB5vY
Malware Config
Signatures
Files
-
d2d759c864d633e424399a054e8aa25cb1c046a7b1ddae61ff6e8a9327d5b5bd.exe windows x86
50ec47d0bf6417d066480feb01d3686e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
ShellExecuteExW
SHGetFileInfoW
SHBrowseForFolderW
SHGetPathFromIDListW
SHGetSpecialFolderPathW
ShellExecuteW
SHGetMalloc
ole32
CoCreateInstance
CreateStreamOnHGlobal
CoInitialize
gdi32
StretchBlt
CreateFontIndirectW
DeleteObject
GetDeviceCaps
GetObjectW
CreateCompatibleDC
SelectObject
CreateCompatibleBitmap
SetStretchBltMode
DeleteDC
GetCurrentObject
kernel32
GetStringTypeA
GetStringTypeW
DecodePointer
GlobalUnWire
SetProcessPriorityBoost
BindIoCompletionCallback
GetModuleFileNameW
GetThreadTimes
LockFileEx
MapUserPhysicalPages
SetLastError
CloseHandle
FreeUserPhysicalPages
AreFileApisANSI
ClearCommBreak
GetCurrentProcessId
GetFileAttributesExW
GlobalWire
QueryInformationJobObject
PurgeComm
LockFile
CreateFileMappingW
IsWow64Process
LocalCompact
ReplaceFileA
CreateNamedPipeW
GetEnvironmentStringsW
CreateFiber
SetTapePosition
CreateMemoryResourceNotification
GetFileType
SetSystemTimeAdjustment
WTSGetActiveConsoleSessionId
GetCommandLineW
EscapeCommFunction
GetNamedPipeInfo
RemoveVectoredExceptionHandler
GetVersion
CreateIoCompletionPort
EncodePointer
ConvertThreadToFiber
SetMessageWaitingIndicator
GetMailslotInfo
ReleaseMutex
GetLastError
PulseEvent
GetCommModemStatus
ReleaseSemaphore
FlushFileBuffers
SetFileApisToOEM
GetProcessHeap
ResetWriteWatch
FlushViewOfFile
GetNamedPipeHandleStateA
GetCommandLineA
GetStartupInfoA
RtlUnwind
SetUnhandledExceptionFilter
GetModuleHandleW
Sleep
GetProcAddress
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
SetHandleCount
DeleteCriticalSection
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
InterlockedDecrement
HeapCreate
VirtualFree
HeapFree
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
LeaveCriticalSection
EnterCriticalSection
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
IsDebuggerPresent
LoadLibraryA
InitializeCriticalSectionAndSpinCount
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
HeapAlloc
VirtualAlloc
HeapReAlloc
HeapSize
GetLocaleInfoA
LCMapStringA
MultiByteToWideChar
LCMapStringW
Sections
.text Size: 55KB - Virtual size: 54KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 121KB - Virtual size: 120KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ