Static task
static1
Behavioral task
behavioral1
Sample
d7abcf8bc25843b59ad6afba686bd32e0b34f3486edca033495ecec1c1416b8c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d7abcf8bc25843b59ad6afba686bd32e0b34f3486edca033495ecec1c1416b8c.exe
Resource
win10v2004-20220812-en
General
-
Target
d7abcf8bc25843b59ad6afba686bd32e0b34f3486edca033495ecec1c1416b8c
-
Size
102KB
-
MD5
dbcf6d36bd7eedbb2cd7720b39960c7f
-
SHA1
56f29db2016122359d1d8a71bcbb06573f0350c1
-
SHA256
d7abcf8bc25843b59ad6afba686bd32e0b34f3486edca033495ecec1c1416b8c
-
SHA512
963a7711cd4aa2d60486e7fb0d9f05e193073655c9426336f813c905c0cf6cd917ee72c20c6560ae9a0d093a99fbfb8e1b939c09d2bb0ba86cb64d75e7ee7117
-
SSDEEP
1536:8KIB3GOEsRZYlFww57h30CktP9vyO/S6HTVyAobKhOCtyvR8LnGWCH7aEKvQ:8rB3GDsRZOZQ9vd/3HRy0Ov8LnIaRvQ
Malware Config
Signatures
Files
-
d7abcf8bc25843b59ad6afba686bd32e0b34f3486edca033495ecec1c1416b8c.exe windows x86
7a8db12ace8af663fc3bf8d279508f1d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetClientRect
comdlg32
GetSaveFileNameW
GetOpenFileNameW
ChooseColorW
PrintDlgW
shell32
SHGetMalloc
ShellExecuteW
DragQueryPoint
DragQueryFileW
Shell_NotifyIconW
SHGetPathFromIDListW
SHBrowseForFolderW
DragFinish
SHGetSpecialFolderLocation
ole32
CoUninitialize
CoInitialize
advapi32
RegQueryValueExW
RegSetValueExW
RegCreateKeyExW
RegDeleteValueW
RegDeleteKeyW
IsTextUnicode
RegQueryInfoKeyW
RegEnumKeyExW
RegCloseKey
RegOpenKeyExW
dbghelp
SymGetSymFromAddr64
EnumerateLoadedModules64
FindDebugInfoFileEx
SymFromAddr
SymEnumSymbols
SymMatchString
comctl32
ImageList_Create
ImageList_ReplaceIcon
ImageList_Destroy
ImageList_GetImageInfo
ImageList_DragEnter
ImageList_Draw
ImageList_AddMasked
ImageList_SetIconSize
InitCommonControlsEx
ImageList_EndDrag
ImageList_BeginDrag
ImageList_GetImageCount
ImageList_DragMove
ImageList_DragShowNolock
ImageList_Add
_TrackMouseEvent
shlwapi
PathFindExtensionW
PathFindFileNameW
PathRemoveExtensionW
PathCompactPathExW
PathIsDirectoryW
PathMatchSpecW
PathRemoveFileSpecW
PathAppendW
PathAddExtensionW
PathIsRelativeW
PathStripPathW
PathFileExistsW
kernel32
GetStringTypeW
GetStringTypeA
LCMapStringW
FlushFileBuffers
SetFilePointer
CompareStringW
SetEnvironmentVariableA
CloseHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetStdHandle
GetConsoleMode
GetConsoleCP
CompareStringA
CreateFileA
GetModuleHandleW
MultiByteToWideChar
LCMapStringA
GetLocaleInfoA
HeapSize
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
RtlUnwind
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetProfileSectionA
SetCalendarInfoW
LocalHandle
QueueUserWorkItem
FindFirstFileExA
GetDiskFreeSpaceW
lstrcatA
lstrlenW
GetLastError
HeapFree
GetTimeZoneInformation
GetSystemTimeAsFileTime
Sleep
GetProcAddress
ExitProcess
GetCommandLineA
GetStartupInfoA
HeapCreate
VirtualFree
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
HeapAlloc
VirtualAlloc
HeapReAlloc
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
WideCharToMultiByte
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
WriteFile
GetStdHandle
GetModuleFileNameA
LoadLibraryA
InitializeCriticalSectionAndSpinCount
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
Sections
.text Size: 46KB - Virtual size: 45KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ