Static task
static1
Behavioral task
behavioral1
Sample
d782287e6ac1512b55ce101ff755ba027200ce0584c462d90f56b025a6c3fc41.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d782287e6ac1512b55ce101ff755ba027200ce0584c462d90f56b025a6c3fc41.exe
Resource
win10v2004-20221111-en
General
-
Target
d782287e6ac1512b55ce101ff755ba027200ce0584c462d90f56b025a6c3fc41
-
Size
592KB
-
MD5
40bc74c88c6273b60d2c392b3a934d55
-
SHA1
8a3d4b40b3b2f9ead1d8835c4e7952d767cf5ba8
-
SHA256
d782287e6ac1512b55ce101ff755ba027200ce0584c462d90f56b025a6c3fc41
-
SHA512
a4f83694af0fcacd491453dc2a7e56bb0a77cecd982284ab3f4b332fd7f1484ac8c8cf74325ad56cdd60c9776cc5859442141b4bd8aaf318a6f4356097e244b9
-
SSDEEP
12288:sjEqzlZM2u7bqG7Gp6wfh0t/zBTuvz5hOVrTHB39XHo/Y:Jqzl5u7bqEGp6w4b8reVHJpo/Y
Malware Config
Signatures
Files
-
d782287e6ac1512b55ce101ff755ba027200ce0584c462d90f56b025a6c3fc41.exe windows x86
0fef9f76401883c41cfb435734d5962f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetEnvironmentVariableA
FreeLibrary
OpenFileMappingW
WaitNamedPipeW
GetFileAttributesExA
GetShortPathNameW
TlsSetValue
GetStartupInfoA
GetModuleFileNameA
GetCurrentProcess
LeaveCriticalSection
IsValidLocale
GetFileType
GetDiskFreeSpaceW
GetACP
FlushFileBuffers
GetTimeFormatA
GetLogicalDriveStringsA
SetLastError
DosDateTimeToFileTime
HeapAlloc
RtlUnwind
InterlockedIncrement
GetCPInfo
lstrcmpA
GetProfileIntW
HeapCreate
OpenProcess
LocalShrink
SetStdHandle
ContinueDebugEvent
SetLocaleInfoA
GetThreadPriorityBoost
SetFileAttributesW
GetCommandLineA
GetCurrentProcessId
GetPrivateProfileSectionNamesA
GetStdHandle
HeapFree
DeleteCriticalSection
TlsFree
GetComputerNameW
IsBadWritePtr
SetThreadLocale
GetLastError
CreateSemaphoreA
GetCurrentThread
WaitNamedPipeA
TerminateProcess
InitializeCriticalSection
CompareFileTime
HeapReAlloc
GetStringTypeA
OpenFileMappingA
GetStringTypeW
GetProcAddress
GetSystemTime
lstrcmpi
LCMapStringW
GetVersion
EnterCriticalSection
GetOEMCP
EnumResourceTypesA
SetThreadIdealProcessor
WriteConsoleOutputA
InterlockedDecrement
GetExitCodeThread
LocalUnlock
WriteFile
CreateProcessW
VirtualFree
lstrcatA
CreateNamedPipeA
VirtualQuery
FindResourceExA
RtlMoveMemory
OpenWaitableTimerA
MultiByteToWideChar
GetNamedPipeHandleStateW
GetCommandLineW
GetModuleFileNameW
TlsAlloc
SetFilePointer
CompareStringA
ReadFile
CloseHandle
EnumSystemCodePagesW
LoadLibraryA
LCMapStringA
GlobalFlags
RemoveDirectoryW
OpenMutexA
GetThreadLocale
SetLocaleInfoW
EnumCalendarInfoExA
CompareStringW
SetHandleCount
GetStartupInfoW
VirtualFreeEx
SetEvent
GlobalUnfix
GetPriorityClass
RtlZeroMemory
FreeEnvironmentStringsA
WaitForMultipleObjectsEx
QueryPerformanceCounter
GetVolumeInformationA
GetSystemTimeAsFileTime
lstrcpynW
LocalReAlloc
WideCharToMultiByte
VirtualAlloc
GetLocalTime
MoveFileExA
FreeEnvironmentStringsW
HeapDestroy
LocalLock
GetTimeZoneInformation
CreateMutexA
ExitProcess
TlsGetValue
UnlockFile
FindAtomW
GetFileAttributesA
GetEnvironmentStrings
InterlockedExchange
GetCurrentThreadId
UnhandledExceptionFilter
GetModuleHandleA
WriteConsoleOutputAttribute
GetEnvironmentStringsW
GetTickCount
HeapSize
SetConsoleOutputCP
FindClose
user32
ShowWindow
RegisterClassA
GetUpdateRgn
CharLowerBuffA
DefWindowProcA
RegisterDeviceNotificationW
GetMenu
GetInputState
GetDlgItemTextW
DestroyWindow
GetMessageA
WINNLSGetIMEHotkey
PeekMessageA
RegisterClassExA
GetWindowRgn
InsertMenuA
FlashWindow
LookupIconIdFromDirectoryEx
SetMenuItemInfoA
ChangeDisplaySettingsExA
CallMsgFilter
PostQuitMessage
CreateWindowExA
CascadeWindows
TileWindows
MsgWaitForMultipleObjects
GetFocus
MessageBoxA
comctl32
ImageList_SetImageCount
ImageList_DragShowNolock
ImageList_GetDragImage
DestroyPropertySheetPage
ImageList_AddMasked
ImageList_GetImageCount
CreateMappedBitmap
InitCommonControlsEx
ImageList_LoadImageA
InitMUILanguage
ImageList_EndDrag
ImageList_SetBkColor
CreateStatusWindow
DrawStatusTextW
ImageList_Copy
ImageList_Add
ImageList_Duplicate
CreateToolbarEx
ImageList_DrawEx
Sections
.text Size: 148KB - Virtual size: 146KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 248KB - Virtual size: 247KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 116KB - Virtual size: 117KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 76KB - Virtual size: 74KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ