Static task
static1
Behavioral task
behavioral1
Sample
84c3b11513e60fec34d5cbe4727db8b3ce6b86fd8eeca15f113b396cb72fedab.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
84c3b11513e60fec34d5cbe4727db8b3ce6b86fd8eeca15f113b396cb72fedab.exe
Resource
win10v2004-20220812-en
General
-
Target
84c3b11513e60fec34d5cbe4727db8b3ce6b86fd8eeca15f113b396cb72fedab
-
Size
231KB
-
MD5
e3429ed7da7335629f633734835d5166
-
SHA1
d67bd65cb6c5e7e2d9909d49567288c7f98ced1b
-
SHA256
84c3b11513e60fec34d5cbe4727db8b3ce6b86fd8eeca15f113b396cb72fedab
-
SHA512
ea02c6cc560b60497de36852daddbfe479d0063ab2dae7aa836af72ef3a33f221e0e1f6b2a565bc831fa4fb0f97c0d0f732af6db957a4626948de82e77faede4
-
SSDEEP
3072:Q7pJhsSY8qC9bQEAmyrBxyLTtfunOOb44Fgm82P1JbbXuu4eleP6jvl10qFdmIEg:eFQCJyLyLZuO44bm82P1JbbnePs0
Malware Config
Signatures
Files
-
84c3b11513e60fec34d5cbe4727db8b3ce6b86fd8eeca15f113b396cb72fedab.exe windows x86
85ca3e5d61dbe8f7c4c795fd5cbba57e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comdlg32
GetFileTitleA
kernel32
DuplicateHandle
HeapReAlloc
GetProcessVersion
lstrcatA
FreeEnvironmentStringsA
GetStdHandle
GetFileSize
GetStringTypeA
SetFileTime
SetFileAttributesA
lstrcmpiA
GlobalGetAtomNameA
LockFile
LCMapStringW
GetWindowsDirectoryA
GetCurrentThread
GlobalFindAtomA
VirtualAlloc
GetFullPathNameA
RtlUnwind
SetStdHandle
DeleteFileA
GetCommandLineA
LeaveCriticalSection
GlobalFlags
LocalAlloc
GetEnvironmentStringsA
GetCPInfo
FreeLibrary
FindFirstFileA
GetModuleHandleA
GlobalDeleteAtom
CompareStringA
GetVersion
UnhandledExceptionFilter
IsBadReadPtr
GetFileType
LoadLibraryA
GlobalAlloc
lstrcpyA
ReadFile
TlsSetValue
EnterCriticalSection
GetModuleFileNameA
SetFilePointer
TlsGetValue
UnlockFile
CompareStringW
GlobalReAlloc
SystemTimeToFileTime
WideCharToMultiByte
HeapFree
DeleteCriticalSection
GetStringTypeW
SetErrorMode
LCMapStringA
TlsFree
SetLastError
SetUnhandledExceptionFilter
GetSystemDirectoryA
lstrcpynA
InterlockedDecrement
SetEndOfFile
FileTimeToLocalFileTime
FileTimeToSystemTime
GlobalHandle
LocalReAlloc
LocalFree
FreeEnvironmentStringsW
GetCurrentProcess
FindClose
HeapSize
GetTimeZoneInformation
GetStartupInfoA
RaiseException
GetLastError
GetProcAddress
LockResource
TlsAlloc
GetOEMCP
HeapAlloc
SetHandleCount
InterlockedIncrement
InitializeCriticalSection
WritePrivateProfileStringA
GetDriveTypeA
GetCurrentDirectoryA
GetVolumeInformationA
GlobalUnlock
LoadResource
lstrcmpA
HeapDestroy
GetCurrentThreadId
MulDiv
HeapCreate
GetVersionExA
VirtualFree
CreateFileA
GetACP
GlobalAddAtomA
lstrlenA
TerminateProcess
WriteFile
CloseHandle
SetEnvironmentVariableA
FindNextFileA
LocalFileTimeToFileTime
GlobalFree
IsBadWritePtr
GetFileAttributesA
FlushFileBuffers
SetCurrentDirectoryA
GetFileTime
Sleep
FindResourceA
OutputDebugStringA
GetEnvironmentVariableA
IsBadCodePtr
MultiByteToWideChar
GetEnvironmentStringsW
ExitProcess
GlobalLock
winspool.drv
DocumentPropertiesA
OpenPrinterA
ClosePrinter
user32
GetMessageA
IsDialogMessageA
GetMenuState
CallNextHookEx
LoadCursorA
EndDialog
PeekMessageA
UnregisterClassA
TabbedTextOutA
AdjustWindowRectEx
GrayStringA
UpdateWindow
SetCursor
GetWindowRect
WinHelpA
GetDlgItem
CheckMenuItem
ReleaseDC
RegisterClassA
PostQuitMessage
CreateWindowExA
GetCapture
GetForegroundWindow
SetWindowLongA
BeginPaint
GetWindow
DispatchMessageA
EndPaint
GetLastActivePopup
EnableMenuItem
SetWindowsHookExA
EnableWindow
GetFocus
GetClassNameA
GetWindowPlacement
GetPropA
DestroyMenu
GetWindowTextA
GetDlgCtrlID
GetNextDlgTabItem
GetMenu
SetWindowPos
GetClassLongA
wsprintfA
SetPropA
GetMessagePos
ExitWindowsEx
SendDlgItemMessageA
GetSysColorBrush
IsWindow
GetMenuCheckMarkDimensions
TranslateMessage
CreateDialogIndirectParamA
CopyRect
GetTopWindow
GetParent
IsWindowVisible
GetClientRect
GetSysColor
MessageBoxA
GetSystemMetrics
GetMenuItemID
CharUpperA
ModifyMenuA
SetForegroundWindow
IsIconic
ShowWindow
SetActiveWindow
PtInRect
GetMenuItemCount
IsWindowEnabled
GetKeyState
SystemParametersInfoA
GetCursorPos
UnhookWindowsHookEx
DefWindowProcA
DestroyWindow
GetMessageTime
PostMessageA
SetWindowTextA
LoadStringA
SetFocus
MapWindowPoints
ValidateRect
GetActiveWindow
LoadBitmapA
DrawTextA
RemovePropA
GetClassInfoA
RegisterWindowMessageA
SendMessageA
ClientToScreen
CallWindowProcA
GetDC
DrawIcon
SetMenuItemBitmaps
GetWindowLongA
GetWindowTextLengthA
LoadIconA
GetSubMenu
gdi32
SetMapMode
RectVisible
SetWindowExtEx
GetClipBox
SetBkColor
GetDeviceCaps
OffsetViewportOrgEx
SetViewportOrgEx
PtVisible
SelectObject
SetTextColor
CreateBitmap
Escape
GetObjectA
ExtTextOutA
DeleteDC
ScaleWindowExtEx
SaveDC
ScaleViewportExtEx
RestoreDC
DeleteObject
GetStockObject
TextOutA
SetViewportExtEx
advapi32
RegSetValueExA
RegOpenKeyExA
RegCloseKey
RegCreateKeyExA
RegDeleteValueA
Sections
.text Size: 163KB - Virtual size: 162KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 30KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 29KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ