Static task
static1
Behavioral task
behavioral1
Sample
d0b4494270a4f1b3266fed2c3984747b1e0e1b68a8d4b7257e1ae3b50370781b.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
d0b4494270a4f1b3266fed2c3984747b1e0e1b68a8d4b7257e1ae3b50370781b.exe
Resource
win10v2004-20221111-en
General
-
Target
d0b4494270a4f1b3266fed2c3984747b1e0e1b68a8d4b7257e1ae3b50370781b
-
Size
216KB
-
MD5
309e78480ffcd0515d71683bd0d17b3a
-
SHA1
d51023a30a022dfe84a889b5918ee565c6b7ca62
-
SHA256
d0b4494270a4f1b3266fed2c3984747b1e0e1b68a8d4b7257e1ae3b50370781b
-
SHA512
12c46e353f96881ad87a3cdcadaedd47343216644d59671260526577589bfe20252156aa72639ae0db2b44ac0d4fce63f189c88ebe9f4160d849615e45a1d94a
-
SSDEEP
6144:4nOls3MwasCakDx6v4k/U2b6/OAI2TzK/4:plgBasCaQx6gk/1OoY2
Malware Config
Signatures
Files
-
d0b4494270a4f1b3266fed2c3984747b1e0e1b68a8d4b7257e1ae3b50370781b.exe windows x86
f84657370d9350a6ee10429a5b97c930
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
ExitProcess
lstrcmpA
GetLongPathNameW
IsBadStringPtrA
LoadLibraryA
GetExpandedNameW
MoveFileA
OpenSemaphoreW
FindResourceW
SetCurrentDirectoryA
GetFileAttributesA
TlsAlloc
GetDateFormatW
GetSystemDefaultLangID
GetExitCodeProcess
GetCurrentThreadId
GetThreadLocale
FileTimeToLocalFileTime
WaitForSingleObject
EnumCalendarInfoA
SetEvent
GetNamedPipeInfo
GetFileTime
GetTimeFormatW
OpenEventA
FreeResource
IsBadStringPtrW
GetStartupInfoA
RemoveDirectoryA
user32
EndDialog
GetClassInfoA
GetSysColorBrush
ShowCursor
RegisterClassW
GetCapture
CreateDesktopW
CharNextA
EnumDesktopsA
LoadIconA
CopyImage
FindWindowW
GetActiveWindow
DrawIcon
EnumDesktopsW
SetWindowPos
CallWindowProcW
WaitForInputIdle
GetCursorPos
DestroyMenu
IsIconic
MessageBoxW
GetSystemMetrics
GetKeyboardLayout
DestroyWindow
GetDlgItemTextW
wsprintfW
GetForegroundWindow
UnregisterClassW
LoadBitmapA
GetWindowTextA
GetDlgItemInt
DefDlgProcA
MessageBoxA
DialogBoxParamA
SetWindowTextW
PostQuitMessage
SetDlgItemInt
PostMessageW
IsDlgButtonChecked
SetWindowLongW
EnumWindows
CheckDlgButton
ArrangeIconicWindows
CharPrevW
CreateAcceleratorTableW
FlashWindow
CreateWindowExW
DefFrameProcW
CascadeWindows
gdi32
GetDCBrushColor
DescribePixelFormat
CreateDCA
OffsetRgn
GetMetaFileBitsEx
CreateDIBPatternBrush
LineTo
CreateFontIndirectA
advapi32
RegSaveKeyA
RegEnumValueA
RegQueryValueW
RegOpenKeyW
RegOpenKeyA
shlwapi
SHDeleteKeyW
SHGetValueA
UrlCompareW
UrlApplySchemeW
SHRegSetUSValueW
PathRemoveBackslashA
PathFindExtensionA
StrRStrIW
setupapi
SetupDiInstallDriverFiles
CM_Reenumerate_DevNode
pSetupIsUserAdmin
CM_Open_Class_KeyA
SetupQueueDefaultCopyA
SetupSetDirectoryIdExW
SetupSetNonInteractiveMode
CM_Get_Device_Interface_List_ExW
inetcomm
MimeEditDocumentFromStream
MimeOleSetBodyPropA
Sections
.E Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.RBa Size: 1024B - Virtual size: 257KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.CHuD Size: 85KB - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.ob Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.Lsn Size: 3KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.ImngtM Size: 2KB - Virtual size: 165KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.hQKXy Size: 83KB - Virtual size: 82KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 123KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ