Static task
static1
Behavioral task
behavioral1
Sample
0348f1182fdd516fbddc12172d0cc6091340661bee0a58ea728a519e22e51e7a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0348f1182fdd516fbddc12172d0cc6091340661bee0a58ea728a519e22e51e7a.exe
Resource
win10v2004-20220812-en
General
-
Target
0348f1182fdd516fbddc12172d0cc6091340661bee0a58ea728a519e22e51e7a
-
Size
612KB
-
MD5
8b5c8faf406b8d1820f7cd763abde89f
-
SHA1
c2bfff23f7c7d90bfd01232aa7591c13f6abdaff
-
SHA256
0348f1182fdd516fbddc12172d0cc6091340661bee0a58ea728a519e22e51e7a
-
SHA512
e6bd138d7c94fdc617196dae49eaf6cab8dcc4416251bb5c7d21a4d2d953a323f6d94185f8b9c0b334c6cf5dd551f11b464c880182cb1a23c65c404cd6902286
-
SSDEEP
12288:hxYAluReiIymr373gnDai9InasMMvoSVu0FnP2zy:hxYHeipq73gDBInaHaoqu0d
Malware Config
Signatures
Files
-
0348f1182fdd516fbddc12172d0cc6091340661bee0a58ea728a519e22e51e7a.exe windows x86
4265fd6889a9e12135dca6f83fc92eed
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
ExtractIconW
ExtractAssociatedIconW
advapi32
InitializeSecurityDescriptor
LookupAccountSidW
RegEnumKeyExW
CryptVerifySignatureA
CryptContextAddRef
CryptCreateHash
comctl32
DrawStatusText
CreateToolbarEx
ImageList_DragMove
InitCommonControlsEx
ImageList_DragLeave
DestroyPropertySheetPage
ImageList_DrawEx
ImageList_SetOverlayImage
ImageList_Write
DrawStatusTextW
ImageList_SetImageCount
ImageList_EndDrag
CreateUpDownControl
CreateStatusWindowA
user32
UnionRect
DdeQueryStringW
PaintDesktop
ShowOwnedPopups
CharLowerA
CreateWindowStationA
WindowFromDC
SendMessageTimeoutW
GetPriorityClipboardFormat
RegisterClassExA
GetCapture
CreateAcceleratorTableA
MessageBoxA
DdeAddData
DdeNameService
GetMenuItemInfoW
MoveWindow
RegisterClassA
EndDialog
GetWindowInfo
EnumDisplayDevicesW
CheckRadioButton
MonitorFromWindow
OpenWindowStationW
FlashWindow
WinHelpA
GetCursor
DrawFrame
kernel32
ReadConsoleOutputCharacterA
InitializeCriticalSection
HeapReAlloc
HeapFree
EnterCriticalSection
SetUnhandledExceptionFilter
VirtualQuery
TerminateProcess
GetModuleFileNameA
GetDateFormatA
WriteFile
VirtualAlloc
SetEnvironmentVariableA
GetProcessHeap
GetVersionExA
LoadResource
TlsGetValue
LoadLibraryA
WriteConsoleA
WritePrivateProfileStructA
GetStdHandle
GetSystemTimeAsFileTime
IsValidLocale
FindClose
HeapAlloc
GetModuleFileNameW
HeapSize
GetUserDefaultLCID
GetConsoleCP
FreeEnvironmentStringsW
InterlockedExchange
VirtualFree
GetStringTypeW
GetPrivateProfileIntW
GetConsoleMode
SetConsoleCtrlHandler
WriteConsoleW
UnhandledExceptionFilter
ExitProcess
HeapCreate
CreateFileA
GetACP
SetFilePointer
CompareStringA
GetCPInfo
GetCurrentThreadId
GetDiskFreeSpaceA
OpenWaitableTimerW
GetConsoleOutputCP
LCMapStringW
RtlUnwind
GetLocaleInfoA
WideCharToMultiByte
EnumSystemLocalesA
GetExitCodeProcess
GetLastError
GetOEMCP
WritePrivateProfileStringA
CompareFileTime
CompareStringW
GetTickCount
GetThreadPriority
GetCommandLineA
CreateFileMappingW
GetStartupInfoA
TlsSetValue
ReadFile
ContinueDebugEvent
GetTimeZoneInformation
MultiByteToWideChar
GetSystemInfo
LeaveCriticalSection
SetCriticalSectionSpinCount
OpenMutexA
SetLastError
IsDebuggerPresent
RtlZeroMemory
GetProcAddress
GetEnvironmentStringsW
lstrcmpiA
GetEnvironmentStrings
GetFileType
GetLocaleInfoW
SetLocaleInfoW
FlushViewOfFile
WriteFileEx
GlobalUnfix
GetPrivateProfileStructA
FreeEnvironmentStringsA
GlobalHandle
GetStringTypeExW
GetMailslotInfo
SetPriorityClass
QueryPerformanceCounter
TlsFree
InterlockedExchangeAdd
CloseHandle
Sleep
FreeLibrary
SetHandleCount
InterlockedDecrement
DeleteCriticalSection
GetDriveTypeA
SetStdHandle
GetCurrentThread
GetThreadSelectorEntry
GetTimeFormatA
GetStringTypeA
GetNumberFormatA
FlushFileBuffers
LCMapStringA
InterlockedIncrement
GetCurrentProcess
CreateMutexA
ReadConsoleOutputW
GetCommandLineW
TlsAlloc
HeapDestroy
GetModuleHandleA
GetStartupInfoW
IsValidCodePage
GetCurrentProcessId
gdi32
GetDeviceCaps
SelectObject
ResetDCA
CreateScalableFontResourceW
SetViewportExtEx
CreateDCW
GetObjectA
DeleteDC
GdiPlayScript
PolyDraw
DeleteObject
Sections
.text Size: 148KB - Virtual size: 147KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 304KB - Virtual size: 303KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 128KB - Virtual size: 135KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ