Static task
static1
Behavioral task
behavioral1
Sample
72795e2d0459824319976a0a9394f41e23e6667a202d6a1066ff2591bd6571fa.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
72795e2d0459824319976a0a9394f41e23e6667a202d6a1066ff2591bd6571fa.exe
Resource
win10v2004-20221111-en
General
-
Target
72795e2d0459824319976a0a9394f41e23e6667a202d6a1066ff2591bd6571fa
-
Size
212KB
-
MD5
405b66b980a2bf06302a825dfbd841fa
-
SHA1
5c1eab443516dc0279b8ee3476529ff1910f0352
-
SHA256
72795e2d0459824319976a0a9394f41e23e6667a202d6a1066ff2591bd6571fa
-
SHA512
72677fe8caecec15c99870803120330789a8ab79fae6daea52c731c0230a33bf43a7f8647e0b466f09231d173b7b9750f2d8c0257ff3d9b4a10f2ee51d97d38a
-
SSDEEP
6144:/spXB4cCNQUD1Fkac7//Ax2iTuYmEdIHUSXqXzLXOEXBl:/s1RvVqt5JIHsOERl
Malware Config
Signatures
Files
-
72795e2d0459824319976a0a9394f41e23e6667a202d6a1066ff2591bd6571fa.exe windows x86
a61597f1213390c18bd5b0c00a608b62
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetLastError
GetCurrentProcessId
GetPrivateProfileStringW
VirtualFree
GetSystemTimeAsFileTime
GetTickCount
GetACP
lstrcpyA
lstrcmpW
InterlockedDecrement
CreateEventW
lstrlenA
CreateThread
InterlockedExchange
GetLastError
MultiByteToWideChar
GetVersionExW
InterlockedIncrement
FreeLibrary
SetUnhandledExceptionFilter
WideCharToMultiByte
GlobalAlloc
GlobalLock
lstrlenW
GlobalFindAtomW
lstrcpynW
SetEvent
GlobalFree
GlobalMemoryStatus
EnterCriticalSection
GlobalHandle
WriteFile
HeapFree
CloseHandle
ResetEvent
GetFileSize
DeleteCriticalSection
GetProcAddress
IsBadReadPtr
SetFilePointer
CreateFileW
GetProcessHeap
GetModuleFileNameA
IsBadCodePtr
QueryPerformanceCounter
ReleaseSemaphore
GetDiskFreeSpaceW
SetEndOfFile
GetFileAttributesW
HeapAlloc
MulDiv
GetCurrentThread
SetThreadPriority
WaitForSingleObject
GetProfileIntA
CreateSemaphoreW
WaitForMultipleObjects
ReadFile
GetQueuedCompletionStatus
IsBadWritePtr
LeaveCriticalSection
InitializeCriticalSection
GetFullPathNameW
GetThreadPriority
GetCurrentProcess
lstrcmpiW
LoadLibraryW
GlobalUnlock
lstrcpyW
user32
ClientToScreen
IsWindow
PeekMessageW
GetWindowLongW
GetClientRect
IsRectEmpty
CreateDialogParamW
ReleaseDC
GetDesktopWindow
SendMessageW
TranslateMessage
InvalidateRect
IsWindowVisible
SetDlgItemInt
CheckDlgButton
CheckRadioButton
GetDC
GetDlgItem
SetCursor
MoveWindow
LoadCursorW
EnableWindow
SetWindowLongW
GetDlgItemInt
LoadStringW
DefWindowProcW
SetDlgItemTextW
ShowWindow
DestroyWindow
GetAsyncKeyState
DispatchMessageW
GetWindowRect
oleaut32
VarBstrFromDec
VarBstrFromR8
VarBstrFromUI4
VarBstrFromI2
VarBstrFromR4
VarBstrFromI1
VarBstrFromUI1
VarBstrFromI4
VarBstrFromDate
VarBstrFromUI8
VarBstrFromCy
VarBstrFromUI2
VarBstrFromDisp
VarBstrFromI8
msoeacct
HrCreateAccountManager
DllGetClassObject
ValidEmailAddress
DllCanUnloadNow
GetDllMajorVersion
nddeapi
NDdeIsValidAppTopicListA
NDdeGetErrorStringA
NDdeGetShareSecurityW
NDdeGetTrustedShareW
NDdeIsValidAppTopicListW
NDdeGetTrustedShareA
msls31
LssbGetObjDimSubline
LssbGetPlsrunsFromSubline
LssbGetVisibleDcpInSubline
LssbGetNumberDnodesInSubline
LsCompressSubline
LssbGetDurTrailWithPensInSubline
msnetobj
DllUnregisterServer
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
Sections
.text Size: 82KB - Virtual size: 82KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 117KB - Virtual size: 117KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 6.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ