Static task
static1
Behavioral task
behavioral1
Sample
d33ba4f4be16187eb4f8986e736462ddce83a5a0826ce60ca0a37fe7d0a2f642.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
d33ba4f4be16187eb4f8986e736462ddce83a5a0826ce60ca0a37fe7d0a2f642.exe
Resource
win10v2004-20221111-en
General
-
Target
d33ba4f4be16187eb4f8986e736462ddce83a5a0826ce60ca0a37fe7d0a2f642
-
Size
179KB
-
MD5
55f309fc11b602dd367d73c9d0144094
-
SHA1
fe7e90a105714abf4ba1a4a189748711c2bbc852
-
SHA256
d33ba4f4be16187eb4f8986e736462ddce83a5a0826ce60ca0a37fe7d0a2f642
-
SHA512
4f213acc70a68be49eb69d8e85c7654a05ec3f0b2230cf5b4cfa94ec2b7253f6765f14f8e92926f5167109eb56ce72438e075fffa10a8f1d3b9e0733b2f44490
-
SSDEEP
3072:qtLJogRsyi4A9790BFHBixbG0zfa6Ko9koszpBvLQpCQZ9t:qtLJsb990BFQi0zwoCpJQ7t
Malware Config
Signatures
Files
-
d33ba4f4be16187eb4f8986e736462ddce83a5a0826ce60ca0a37fe7d0a2f642.exe windows x86
130ee4efe7f86d04cbde744efd88c7a8
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
comdlg32
FindTextW
GetOpenFileNameW
GetSaveFileNameW
shell32
ShellExecuteW
SHGetFileInfoW
Shell_NotifyIconW
ShellExecuteExW
ole32
CoInitialize
CoUninitialize
advapi32
GetFileSecurityW
gdi32
SetTextColor
SetBkMode
DeleteObject
GetStockObject
GetTextExtentPoint32W
SetBkColor
SelectObject
GetDeviceCaps
CreateFontIndirectW
kernel32
EncodeSystemPointer
InitAtomTable
FlushViewOfFile
GetProcessTimes
TlsSetValue
FindCloseChangeNotification
GetProcessPriorityBoost
GetCommandLineA
GetStdHandle
GetComputerNameExW
DefineDosDeviceW
SetSystemTimeAdjustment
ClearCommError
GlobalDeleteAtom
GetVersion
FindFirstFileExW
EraseTape
GetCurrentProcess
GetThreadTimes
LocalUnlock
DeleteAtom
ReplaceFileW
FindNextChangeNotification
GetCommTimeouts
ResetWriteWatch
SetFileValidData
GetAtomNameW
GetEnvironmentStrings
GetNumaNodeProcessorMask
MapUserPhysicalPagesScatter
GetThreadSelectorEntry
CreateIoCompletionPort
GetLogicalDrives
GlobalUnlock
RemoveVectoredExceptionHandler
WTSGetActiveConsoleSessionId
UpdateResourceW
EscapeCommFunction
CancelDeviceWakeupRequest
ResetEvent
GetFileInformationByHandle
SetProcessPriorityBoost
SetTapePosition
PulseEvent
GetExitCodeProcess
FlushInstructionCache
RequestWakeupLatency
GetExitCodeThread
GetProcessAffinityMask
PrepareTape
AssignProcessToJobObject
GetFileSize
LocalShrink
UnlockFile
ReadFileScatter
GetProcessHeap
GetModuleFileNameA
CreateFileMappingW
GetNamedPipeHandleStateA
GetProcessHandleCount
ConvertFiberToThread
GlobalUnWire
GetFileType
GetStartupInfoA
SetUnhandledExceptionFilter
GetModuleHandleW
Sleep
GetProcAddress
ExitProcess
WriteFile
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetLastError
GetEnvironmentStringsW
SetHandleCount
DeleteCriticalSection
TlsGetValue
TlsAlloc
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
HeapCreate
VirtualFree
HeapFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LeaveCriticalSection
EnterCriticalSection
TerminateProcess
UnhandledExceptionFilter
IsDebuggerPresent
LoadLibraryA
InitializeCriticalSectionAndSpinCount
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
HeapAlloc
VirtualAlloc
HeapReAlloc
RtlUnwind
HeapSize
GetLocaleInfoA
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetStringTypeA
GetStringTypeW
Sections
.text Size: 39KB - Virtual size: 39KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 123KB - Virtual size: 122KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ