Static task
static1
Behavioral task
behavioral1
Sample
dc41525121629f94d27ed41b2e868ca232704189871653b9615f0188d12da8f4.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
dc41525121629f94d27ed41b2e868ca232704189871653b9615f0188d12da8f4.exe
Resource
win10v2004-20220901-en
General
-
Target
dc41525121629f94d27ed41b2e868ca232704189871653b9615f0188d12da8f4
-
Size
1.2MB
-
MD5
9dbae93ac6d7e32b38bed212cc84abf3
-
SHA1
984afaaad6ffbdfe3fc907fd36fb54862732d584
-
SHA256
dc41525121629f94d27ed41b2e868ca232704189871653b9615f0188d12da8f4
-
SHA512
92ef95d1402436899cbd245708fdc64fa56032405da11d288042cc45122a3e4975be98cb48784db1ea4b28931b2abd977f5e207d51dec705baeab15810ed7f6e
-
SSDEEP
24576:SEhuZ3ihAgOo5QP1ZwZuI2+V6YRx1cGqeC0E6xGhrz2BOTNwoE:SEUBcAg7m1Z5kRxzfCP9OBOTyoE
Malware Config
Signatures
Files
-
dc41525121629f94d27ed41b2e868ca232704189871653b9615f0188d12da8f4.exe windows x86
cc69966b7ea701a0d8cd400bf41316db
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
CreateDCA
CreateICW
GetEnhMetaFileBits
UpdateICMRegKeyA
GetBoundsRect
GetGlyphOutlineW
DeleteDC
EndPath
PlayMetaFileRecord
CloseMetaFile
CopyMetaFileW
GetWorldTransform
RectInRegion
GetSystemPaletteUse
CreateEllipticRgn
GetBkColor
PlayEnhMetaFile
GetTextExtentExPointW
GetDeviceCaps
PolyBezierTo
GetArcDirection
comctl32
ImageList_Write
ImageList_GetDragImage
ImageList_Destroy
ImageList_LoadImageA
CreatePropertySheetPage
DrawStatusTextW
InitMUILanguage
CreateToolbar
DrawStatusTextA
ImageList_GetImageRect
ImageList_Replace
CreateToolbarEx
InitCommonControlsEx
ImageList_DragShowNolock
ImageList_SetIconSize
ImageList_GetImageCount
ImageList_GetIconSize
DestroyPropertySheetPage
ImageList_SetOverlayImage
ImageList_DrawIndirect
CreateUpDownControl
ImageList_DragMove
ImageList_DrawEx
ImageList_Read
user32
ShowWindow
CreateWindowExW
RegisterClassExA
CopyAcceleratorTableW
SetWindowLongA
CharToOemBuffA
UnpackDDElParam
SetUserObjectSecurity
EnumDesktopsA
RegisterClassA
MessageBoxW
kernel32
MultiByteToWideChar
HeapAlloc
GetProcAddress
InterlockedDecrement
TlsSetValue
GetProcessHeaps
RtlUnwind
GetEnvironmentStrings
UnhandledExceptionFilter
IsValidLocale
ReadFile
IsDebuggerPresent
HeapReAlloc
GetTickCount
OpenWaitableTimerA
FlushFileBuffers
GetCurrentProcess
SetConsoleCtrlHandler
IsValidCodePage
GetConsoleOutputCP
GetConsoleMode
GetStringTypeW
WriteFile
WriteConsoleA
GetCommandLineA
GetEnvironmentStringsW
HeapDestroy
FreeLibrary
LCMapStringA
WriteConsoleW
GetTimeZoneInformation
GetLastError
LoadLibraryA
SetHandleCount
FreeEnvironmentStringsW
TerminateProcess
EnumSystemLocalesA
RtlZeroMemory
GetCurrentProcessId
VirtualAlloc
CompareStringA
LeaveCriticalSection
GetConsoleCP
InterlockedIncrement
WideCharToMultiByte
TlsGetValue
HeapFree
lstrcmp
SetEnvironmentVariableA
VirtualFree
GetModuleHandleA
CompareStringW
SetStdHandle
GetStdHandle
FreeEnvironmentStringsA
GetCurrentThread
ExitProcess
GetSystemTimeAsFileTime
VirtualQuery
GetLocaleInfoW
GetOEMCP
GetStringTypeA
SetUnhandledExceptionFilter
GetUserDefaultLCID
HeapSize
EnterCriticalSection
LCMapStringW
TlsAlloc
CreateMutexA
GetProcessHeap
lstrcmpiW
CreateFileA
SetFilePointer
HeapCreate
Sleep
GetTimeFormatA
GetLocaleInfoA
InterlockedExchange
GetCPInfo
GetStartupInfoA
GetCurrentThreadId
InitializeCriticalSection
GetModuleFileNameA
SetLastError
CloseHandle
QueryPerformanceCounter
DeleteCriticalSection
GetDateFormatA
GetVersionExA
SetThreadPriority
TlsFree
GetACP
FileTimeToDosDateTime
OpenMutexA
GetFileType
Sections
.text Size: 312KB - Virtual size: 312KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 75KB - Virtual size: 96KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 808KB - Virtual size: 707KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ