Static task
static1
Behavioral task
behavioral1
Sample
d87cbb12038ffa3f7b40e95c435d489ef9c43ffe785b8b00cbd9c6397c88a806.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
d87cbb12038ffa3f7b40e95c435d489ef9c43ffe785b8b00cbd9c6397c88a806.exe
Resource
win10v2004-20220812-en
General
-
Target
d87cbb12038ffa3f7b40e95c435d489ef9c43ffe785b8b00cbd9c6397c88a806
-
Size
110KB
-
MD5
b6790b1c698b844b64c465f3513d5163
-
SHA1
ad0042ed1a2a5ed71abb751d63ecb782947808e4
-
SHA256
d87cbb12038ffa3f7b40e95c435d489ef9c43ffe785b8b00cbd9c6397c88a806
-
SHA512
07d6eb4b9a136f7a10ca80f50f873c1f87dba8ba36a8c2adf83008a70567a0e32d049b1ee645f33d71d7369c77f33893fe577f5a19966561806d1f42412c9f5b
-
SSDEEP
3072:y0B2rqrKx6Y19PBHEyMwnJ0XfEg3fjuRrl46q:y0yqU96SJAPjutav
Malware Config
Signatures
Files
-
d87cbb12038ffa3f7b40e95c435d489ef9c43ffe785b8b00cbd9c6397c88a806.exe windows x86
034fd95aa41a1eadfc4c8aa61f215a5e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetClientRect
comdlg32
GetSaveFileNameW
GetOpenFileNameW
ChooseColorW
PrintDlgW
shell32
Shell_NotifyIconW
ShellExecuteW
DragQueryPoint
DragQueryFileW
SHGetPathFromIDListW
SHBrowseForFolderW
DragFinish
SHGetMalloc
SHGetSpecialFolderLocation
ole32
CoUninitialize
CoInitialize
advapi32
RegQueryValueExW
RegSetValueExW
RegCreateKeyExW
RegDeleteValueW
RegDeleteKeyW
IsTextUnicode
RegQueryInfoKeyW
RegEnumKeyExW
RegCloseKey
RegOpenKeyExW
dbghelp
SymLoadModule64
SymRegisterFunctionEntryCallback64
SymCleanup
StackWalk
SymFromName
comctl32
ImageList_Create
ImageList_ReplaceIcon
ImageList_Destroy
ImageList_GetImageInfo
ImageList_DragEnter
ImageList_Draw
ImageList_AddMasked
ImageList_SetIconSize
InitCommonControlsEx
ImageList_EndDrag
ImageList_BeginDrag
ImageList_GetImageCount
ImageList_DragMove
ImageList_DragShowNolock
ImageList_Add
_TrackMouseEvent
shlwapi
PathFindExtensionW
PathFindFileNameW
PathRemoveExtensionW
PathCompactPathExW
PathIsDirectoryW
PathMatchSpecW
PathRemoveFileSpecW
PathAppendW
PathAddExtensionW
PathIsRelativeW
PathStripPathW
PathFileExistsW
kernel32
GetStringTypeW
GetStringTypeA
LCMapStringW
FlushFileBuffers
SetFilePointer
CompareStringW
SetEnvironmentVariableA
CloseHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetStdHandle
GetConsoleMode
GetConsoleCP
CompareStringA
CreateFileA
Sleep
MultiByteToWideChar
LCMapStringA
GetLocaleInfoA
HeapSize
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
RtlUnwind
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
VirtualProtectEx
FindFirstChangeNotificationA
GetExitCodeThread
GetTimeFormatA
WriteProfileStringA
ReleaseMutex
GetLastError
HeapFree
GetTimeZoneInformation
GetSystemTimeAsFileTime
GetModuleHandleW
GetProcAddress
ExitProcess
GetCommandLineA
GetStartupInfoA
HeapCreate
VirtualFree
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
HeapAlloc
VirtualAlloc
HeapReAlloc
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
WideCharToMultiByte
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
WriteFile
GetStdHandle
GetModuleFileNameA
LoadLibraryA
InitializeCriticalSectionAndSpinCount
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
Sections
.text Size: 46KB - Virtual size: 45KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ