Static task
static1
Behavioral task
behavioral1
Sample
21f065df392ba2a5a126fcfcb3fb3043b23f293443c3a639bd1b9f6b0656ad01.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
21f065df392ba2a5a126fcfcb3fb3043b23f293443c3a639bd1b9f6b0656ad01.exe
Resource
win10v2004-20220812-en
General
-
Target
21f065df392ba2a5a126fcfcb3fb3043b23f293443c3a639bd1b9f6b0656ad01
-
Size
187KB
-
MD5
5d6307d1fe94a3c478baa60303a4a75a
-
SHA1
444e6f3c27eb8cbb372bc802057cfb71057cc005
-
SHA256
21f065df392ba2a5a126fcfcb3fb3043b23f293443c3a639bd1b9f6b0656ad01
-
SHA512
cd6b449cff0dde121b2f82636d3414175db96ec761c9686223e04c70f7bc87f313a18430ec4ac49b411383f02da9145cb20dfa38acc59fdf44c51c5a6b8700d8
-
SSDEEP
3072:VktT8BwXnpgXsWj1czLWVm71cBxIxH0+vWNBO65i0I91uev+LOrPtw9RlfnsyhGy:s8BwXgs3fU4cza08+5C3GKrP+3lfsyhY
Malware Config
Signatures
Files
-
21f065df392ba2a5a126fcfcb3fb3043b23f293443c3a639bd1b9f6b0656ad01.exe windows x86
5f8975336301a5caa84889f0f1eadd39
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetTempPathA
GlobalLock
GlobalAlloc
FindFirstVolumeMountPointW
GlobalReAlloc
GlobalSize
FreeResource
SizeofResource
LockResource
LoadResource
FindResourceA
LocalAlloc
LocalFree
CreateFileA
lstrcmpA
GetFileAttributesA
GetProcAddress
GetModuleFileNameA
GetTempPathA
DeleteFileA
CloseHandle
GetCurrentDirectoryA
GetLocalTime
FindClose
FindNextFileA
FindFirstFileA
EnumResourceLanguagesA
WideCharToMultiByte
ReadFile
WriteFile
SetFilePointer
GlobalHandle
IsDBCSLeadByte
GetModuleHandleA
VirtualProtect
QueryPerformanceCounter
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
GetProcessHeap
GetModuleHandleW
CreateProcessA
GetTempFileNameA
HeapFree
HeapAlloc
LoadLibraryW
InterlockedExchange
Sleep
InterlockedCompareExchange
GetStartupInfoA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetLastError
GlobalFree
GlobalUnlock
GetCurrentThread
lstrlenA
MulDiv
MultiByteToWideChar
FreeLibrary
RaiseException
LoadLibraryA
FormatMessageA
GetSystemDirectoryW
LoadLibraryExW
GetTickCount
GetLocaleInfoA
GetCPInfo
SetErrorMode
GetSystemDefaultLangID
GetVersion
lstrcmpiA
GetACP
GetSystemDirectoryW
InitializeCriticalSection
DeleteCriticalSection
GetCurrentThreadId
TlsGetValue
TlsSetValue
CreateMutexW
ReleaseMutex
WaitForSingleObject
user32
SetWindowLongA
DefWindowProcA
DestroyWindow
GetScrollPos
SetScrollRange
GetWindowLongA
GetParent
BringWindowToTop
GetScrollRange
UpdateWindow
ScrollWindow
SetScrollPos
GetClientRect
IntersectRect
OffsetRect
ShowCursor
MessageBeep
GetCapture
GetCursorPos
WindowFromPoint
SetCursor
SendMessageA
GetClassInfoExA
comctl32
PropertySheetA
comdlg32
GetOpenFileNameA
ChooseFontA
GetSaveFileNameA
CommDlgExtendedError
advapi32
RegQueryValueExW
RegEnumValueA
RegSetValueExA
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
RegOpenKeyExW
ole32
OleUninitialize
BindMoniker
CoCreateInstance
OleInitialize
CoGetMalloc
StringFromGUID2
shlwapi
wnsprintfA
oleaut32
DispGetIDsOfNames
DispGetIDsOfNames
VarUI4FromDec
SetErrorInfo
Sections
.text Size: 147KB - Virtual size: 147KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 34KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 318B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ