Static task
static1
Behavioral task
behavioral1
Sample
d3314440e36606373c67cd88f12596ea51adf3e2c22e1d0c8cff58954fed194f.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
d3314440e36606373c67cd88f12596ea51adf3e2c22e1d0c8cff58954fed194f.exe
Resource
win10v2004-20220812-en
General
-
Target
d3314440e36606373c67cd88f12596ea51adf3e2c22e1d0c8cff58954fed194f
-
Size
91KB
-
MD5
b47f9975477c9e34888715790fef904e
-
SHA1
3218a1ccf34b36dd4905784c92d5dbacfa57440f
-
SHA256
d3314440e36606373c67cd88f12596ea51adf3e2c22e1d0c8cff58954fed194f
-
SHA512
661e60d03a886f226229a957c17958627bb8b7da74c0ca8fbd64fa4d54a7d4836a34e516ed11d61fa9188c16ca1af9da1d9fff6d132c40384a6851d3c287f5b7
-
SSDEEP
1536:Sis6p2vIiYKgIEUDCr6cPul409JPNAMDIohMpAZQPNTZSf7:Sd6p2vIi7gIFCbmK09JVDIEMpyQPNTZe
Malware Config
Signatures
Files
-
d3314440e36606373c67cd88f12596ea51adf3e2c22e1d0c8cff58954fed194f.exe windows x86
b39de9b3fa33631b4685abecebd56520
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
IsDBCSLeadByte
InterlockedCompareExchange
FindFirstFileA
GetCurrentProcess
MulDiv
GlobalLock
GetFileTime
lstrcmpiA
LoadLibraryA
GetCurrentDirectoryA
DeleteCriticalSection
lstrcmpA
CopyFileA
CompareFileTime
SetFileTime
GlobalHandle
UnhandledExceptionFilter
GetFileAttributesA
GetExitCodeProcess
SetFileAttributesA
WaitForSingleObject
HeapSetInformation
GlobalAlloc
DeleteFileA
SetUnhandledExceptionFilter
CreateFileA
GetTempFileNameA
InitializeCriticalSection
SetCurrentDirectoryA
FlushFileBuffers
GetStdHandle
GetTickCount
MultiByteToWideChar
GetThreadLocale
InterlockedExchange
GetSystemTimeAsFileTime
OutputDebugStringA
QueryPerformanceCounter
LeaveCriticalSection
Sleep
GlobalFree
GetStartupInfoA
CreateProcessA
FindClose
EnterCriticalSection
GetModuleHandleA
ReadFile
ExpandEnvironmentStringsA
GlobalUnlock
FreeLibrary
GetCurrentThreadId
SetFilePointer
RtlUnwind
GetFullPathNameA
GetCurrentProcessId
GetTempPathA
TerminateProcess
GetFileSize
FindNextFileA
CreateThread
CloseHandle
GetACP
WideCharToMultiByte
GlobalAddAtomW
GetVersion
FindAtomW
VirtualProtect
LoadLibraryExA
GetProcAddress
SetLastError
lstrlenA
WriteFile
ExitProcess
user32
PeekMessageA
CheckRadioButton
SetWindowLongA
MessageBoxA
DestroyMenu
SetScrollInfo
SetFocus
PostQuitMessage
LoadIconA
SetScrollRange
InvertRect
SetClipboardData
GetDlgItem
RegisterWindowMessageA
CharPrevA
UpdateWindow
GetWindowRect
ReleaseCapture
LoadStringA
GetDesktopWindow
SetDlgItemTextA
GetParent
TrackPopupMenu
DefWindowProcA
GetSubMenu
GetDlgItemTextA
CopyRect
EndPaint
AttachThreadInput
SetWindowPos
EndDialog
SetCursor
LoadCursorA
LoadAcceleratorsA
GetCursorPos
DrawFocusRect
ReleaseDC
GetMessageA
GetKeyState
EnableWindow
CreateDialogParamA
PtInRect
InvalidateRect
SendDlgItemMessageA
RegisterClassA
FillRect
IsDialogMessageA
DrawTextA
GetFocus
SetScrollPos
OpenClipboard
CharNextA
SendMessageA
LoadMenuA
CloseClipboard
TranslateMessage
TranslateAcceleratorA
ScreenToClient
PostMessageA
RedrawWindow
CharLowerBuffA
ScrollWindow
GetWindowLongA
GetClientRect
SetWindowPlacement
GetSysColor
BeginPaint
ValidateRect
GetDC
CheckDlgButton
DialogBoxParamA
ClientToScreen
DispatchMessageA
EnableMenuItem
SetCapture
GetWindowPlacement
EmptyClipboard
SetWindowTextA
GetMenu
CheckMenuItem
GetWindowTextLengthA
MoveWindow
DestroyWindow
IsDlgButtonChecked
ShowWindow
CreateWindowExA
IsWindowUnicode
OffsetRect
gdi32
GetStockObject
SelectObject
DeleteDC
GetDeviceCaps
StartDocA
SetROP2
Rectangle
EndPage
CreateSolidBrush
CreateFontA
GetTextExtentPointA
GetTextExtentPoint32W
ExtTextOutA
EndDoc
ExtTextOutW
AbortDoc
MoveToEx
SetAbortProc
SetTextColor
SetBkColor
LineTo
DeleteObject
GetTextMetricsA
StartPage
GetTextExtentPoint32A
CreatePen
comdlg32
GetOpenFileNameA
PrintDlgA
GetSaveFileNameA
ChooseFontA
advapi32
RegOpenKeyA
RegSetValueExA
RegQueryValueExA
RegDeleteValueA
RegCreateKeyA
RegOpenKeyExA
RegCloseKey
shell32
ShellAboutA
ole32
CoInitialize
msvcrt
_cexit
_lseeki64
atoi
strtol
isprint
isleadbyte
__set_app_type
memset
_strnicmp
_write
isalpha
__pioinfo
memcpy
__getmainargs
__badioinfo
_ltoa
strcspn
_itoa
_initterm
_fullpath
_isatty
calloc
wctomb
free
__p__fmode
exit
strtok
_stricmp
isdigit
strstr
_controlfp
_exit
__p__commode
memmove
toupper
islower
strchr
isspace
_mkdir
strrchr
strpbrk
_snprintf
malloc
_amsg_exit
tolower
system
_acmdln
_getcwd
_errno
_XcptFilter
_ismbblead
__setusermatherr
wcspbrk
?terminate@@YAXXZ
_fileno
_iob
_strdup
strncmp
Sections
COde Size: 60KB - Virtual size: 59KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ