Static task
static1
Behavioral task
behavioral1
Sample
de0ebdaff8dd0a885d76501409d5d7dff56f56432984c290ef7c769a20af6337.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
de0ebdaff8dd0a885d76501409d5d7dff56f56432984c290ef7c769a20af6337.exe
Resource
win10v2004-20220812-en
General
-
Target
de0ebdaff8dd0a885d76501409d5d7dff56f56432984c290ef7c769a20af6337
-
Size
908KB
-
MD5
91cd320a0d6d48e117bfba4cfa2740bc
-
SHA1
9197509f287cde829f3d89403b22bbc974246bd1
-
SHA256
de0ebdaff8dd0a885d76501409d5d7dff56f56432984c290ef7c769a20af6337
-
SHA512
6670c4221fdf4ea64c57adc000aababb0cbd272a3934042911f5aeeb897ad4c6b38c7f26bb565b24bf90e920a62473967581a1429eb991561a691e0b657a14c2
-
SSDEEP
12288:bwKjkpTY7YIAK/f5YX5ZOwl9lz4CG5DUI0pYk28GjQmzT04:jkp2YIr091rGGI0p92HjQmn0
Malware Config
Signatures
Files
-
de0ebdaff8dd0a885d76501409d5d7dff56f56432984c290ef7c769a20af6337.exe windows x86
02f18b3a26350ff89a997a8c44703df9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetStartupInfoA
GetThreadLocale
GetVersionExA
GetVersionExW
GetWindowsDirectoryA
GetWindowsDirectoryW
HeapAlloc
HeapFree
HeapReAlloc
InitializeCriticalSection
InterlockedExchange
InterlockedIncrement
LeaveCriticalSection
LocalAlloc
LocalFree
MoveFileExW
MultiByteToWideChar
GetProcessHeap
RaiseException
ReleaseMutex
SetEvent
SetFileAttributesA
SetFilePointer
SetLastError
SetThreadExecutionState
SetThreadLocale
Sleep
WaitForMultipleObjects
WideCharToMultiByte
WriteFile
lstrcmpW
lstrcpyA
lstrlenA
GetModuleHandleW
VirtualAllocEx
GetModuleHandleA
GetModuleFileNameW
GetLastError
GetCurrentThreadId
GetComputerNameW
FormatMessageW
FormatMessageA
ExitProcess
EnterCriticalSection
DeleteFileA
DeleteCriticalSection
CreateProcessW
CreateMutexA
CreateFileA
CreateEventA
OutputDebugStringW
CloseHandle
user32
SetTimer
SetWindowTextW
LoadIconA
LoadIconW
SetFocus
SetCursor
SendMessageW
PostMessageW
MessageBoxW
MessageBoxA
MapDialogRect
LoadCursorW
KillTimer
GetWindowTextW
GetWindowRect
GetForegroundWindow
GetDlgItem
EndDialog
DialogBoxParamW
CharLowerW
SetForegroundWindow
gdi32
GetTextMetricsW
GetTextExtentPointW
DeleteDC
SelectObject
CreateDCW
advapi32
RegOpenKeyA
RegSetValueExW
RegQueryValueExW
RegOpenKeyExW
RegEnumValueW
GetUserNameW
RegCloseKey
RegDeleteKeyW
RegDeleteValueW
RegQueryValueExA
msvcrt
_XcptFilter
__getmainargs
__p__commode
__p__fmode
__set_app_type
__setusermatherr
_abnormal_termination
_acmdln
_adjust_fdiv
_c_exit
_cexit
_controlfp
_except_handler3
_exit
_initterm
_iob
_mbscmp
_mbscpy
_mbsicmp
_mbsinc
_mbslwr
_mbsnbcmp
_mbsnbicmp
_snwprintf
_vsnwprintf
_wcsicmp
_wcsnicmp
exit
fwprintf
iswctype
memmove
setlocale
wcschr
wcscmp
wcscpy
wcslen
wcsncmp
wcsrchr
Sections
.text Size: 41KB - Virtual size: 40KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 827KB - Virtual size: 827KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.aa Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ