Static task
static1
Behavioral task
behavioral1
Sample
11a32b5c4a9e8768d04b0cbedb32f3373b2b7d3b27bfc8f96979141c9e543a22.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
11a32b5c4a9e8768d04b0cbedb32f3373b2b7d3b27bfc8f96979141c9e543a22.exe
Resource
win10v2004-20220901-en
General
-
Target
11a32b5c4a9e8768d04b0cbedb32f3373b2b7d3b27bfc8f96979141c9e543a22
-
Size
312KB
-
MD5
7db0abb1ebb5f3d11507d353ee9cd605
-
SHA1
94a25055b1f43b5063f016cbcd4dc981da6708b2
-
SHA256
11a32b5c4a9e8768d04b0cbedb32f3373b2b7d3b27bfc8f96979141c9e543a22
-
SHA512
936b88e59fc92a3919d22379fe05a4bfe40245dd8a57f0b5af518fd9c80a40cfeffff12d77ccaea37f218c76dc5915baf9f7e0e65969eaaabf91ec06c38c5733
-
SSDEEP
6144:oxhFkcBEJUuPKXq7XgrXh+csFXQy43GQ8hlnoGfUhBKq3fQA1:YkuEhCXQgEPp+38hlnoGCBKqv
Malware Config
Signatures
Files
-
11a32b5c4a9e8768d04b0cbedb32f3373b2b7d3b27bfc8f96979141c9e543a22.exe windows x86
9a9ed677b5089eb4d6d97b7f3987101b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
_lread
QueryDosDeviceW
FillConsoleOutputCharacterA
CreateMutexW
GlobalFindAtomW
ReadDirectoryChangesW
SetEnvironmentVariableW
GetSystemInfo
GetConsoleCursorInfo
GetCurrentProcess
GetCommState
FreeResource
lstrcmpiW
TryEnterCriticalSection
GetStartupInfoA
FreeLibraryAndExitThread
OpenSemaphoreW
GetModuleFileNameW
ReadConsoleInputW
CreatePipe
EnumDateFormatsW
IsValidLocale
FlushConsoleInputBuffer
SetProcessShutdownParameters
ReadFile
GetAtomNameA
PeekConsoleInputW
AreFileApisANSI
PulseEvent
CancelIo
DeleteFiber
GetFileInformationByHandle
FindResourceExA
CreateEventA
GetACP
LoadLibraryExW
ClearCommBreak
GetProcessTimes
WritePrivateProfileStructA
GetCurrentProcessId
GetProfileIntA
WritePrivateProfileStringW
AllocConsole
SetSystemTime
SetFileAttributesA
WriteProcessMemory
ReadFileScatter
EnumResourceNamesW
PeekNamedPipe
GetEnvironmentVariableW
GetBinaryTypeA
GetShortPathNameA
GetTapeStatus
SetProcessWorkingSetSize
SetConsoleMode
ReleaseSemaphore
WritePrivateProfileSectionA
GenerateConsoleCtrlEvent
CompareStringW
CompareStringA
EraseTape
Beep
GetTempFileNameA
VirtualLock
CreateFileW
CreateWaitableTimerA
SetConsoleOutputCP
SetFileTime
GetProcessHeap
ExitThread
VirtualAllocEx
CreateMutexA
GetPrivateProfileStringW
GetTimeZoneInformation
SetVolumeLabelA
GetFileType
GlobalFindAtomA
GetConsoleMode
GetHandleInformation
GetDriveTypeW
GetStringTypeExW
GetUserDefaultLangID
GetShortPathNameW
GetTickCount
VirtualUnlock
UnhandledExceptionFilter
GlobalFree
SizeofResource
QueryDosDeviceA
WritePrivateProfileSectionW
ExpandEnvironmentStringsW
GlobalReAlloc
ScrollConsoleScreenBufferA
ConnectNamedPipe
DosDateTimeToFileTime
IsDBCSLeadByteEx
GetSystemDirectoryW
SwitchToFiber
DeleteCriticalSection
GetCommandLineA
lstrlenA
VirtualAlloc
RemoveDirectoryA
ExitProcess
user32
PostMessageA
TabbedTextOutW
GetCursorPos
AdjustWindowRectEx
SwapMouseButton
GetGuiResources
TrackMouseEvent
GetClassNameW
GetMenuItemID
EnumDisplaySettingsA
UnionRect
VkKeyScanW
MessageBoxA
DefWindowProcA
GetClipboardFormatNameW
FindWindowA
DestroyMenu
InsertMenuItemW
DefDlgProcA
FlashWindow
IsWindowVisible
LoadImageW
CloseWindow
IsChild
MsgWaitForMultipleObjects
CloseDesktop
CharToOemA
FindWindowW
SetClassLongW
RegisterHotKey
EnableMenuItem
CreateIcon
CloseClipboard
LoadCursorW
IsZoomed
CreateMDIWindowW
BroadcastSystemMessageW
EnumChildWindows
BroadcastSystemMessageA
GetMenuItemInfoA
GetSysColorBrush
CreateCaret
CharUpperBuffW
GetTabbedTextExtentW
SetScrollInfo
CreateDialogParamA
EnumDesktopWindows
DefDlgProcW
GetKeyboardState
GetMenuDefaultItem
SendMessageCallbackW
RemovePropW
GetDialogBaseUnits
DrawFocusRect
MonitorFromPoint
EnumDisplaySettingsExW
PostQuitMessage
FindWindowExW
CreateWindowExW
DrawEdge
gdi32
GetWindowOrgEx
WidenPath
GetViewportOrgEx
SetEnhMetaFileBits
StartDocW
CopyMetaFileW
CreateFontA
GetBkMode
comdlg32
ChooseFontW
FindTextA
advapi32
GetUserNameW
AccessCheck
RegConnectRegistryA
SetEntriesInAclA
ImpersonateSelf
CryptImportKey
BuildTrusteeWithSidW
EnumDependentServicesW
StartServiceW
GetNamedSecurityInfoA
CryptGetKeyParam
RevertToSelf
GetPrivateObjectSecurity
GetLengthSid
CreateServiceA
ControlService
GetSecurityInfo
RegCreateKeyExA
RegQueryInfoKeyW
CreatePrivateObjectSecurity
shell32
ShellExecuteA
SHGetSpecialFolderPathA
DragFinish
SHGetSpecialFolderLocation
SHBrowseForFolderA
DragAcceptFiles
SHAddToRecentDocs
SHGetPathFromIDListA
SHGetSpecialFolderPathW
ExtractIconA
ole32
OleInitialize
CoInitializeEx
OleSave
CoGetClassObject
OleCreate
CoFreeUnusedLibraries
CoGetObject
StringFromGUID2
IIDFromString
OleSetMenuDescriptor
comctl32
CreatePropertySheetPageW
ImageList_DragLeave
ImageList_GetBkColor
shlwapi
StrCmpW
SHSetValueW
StrRChrA
SHOpenRegStream2W
PathCompactPathExW
UrlGetPartA
StrStrW
StrTrimA
PathGetCharTypeA
PathStripToRootW
PathFindNextComponentW
PathCanonicalizeA
SHRegGetUSValueW
PathRemoveBlanksW
PathRelativePathToA
PathIsDirectoryW
PathRemoveBlanksA
StrCmpLogicalW
msvcrt
_finite
wcslen
getenv
_strdup
_mbscmp
_getdcwd
_wtol
putchar
_wcsrev
_mbsinc
fgetws
isspace
perror
_popen
_tempnam
vswprintf
_beginthreadex
Sections
.text Size: 236KB - Virtual size: 235KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 68KB - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE