Static task
static1
Behavioral task
behavioral1
Sample
7d5359b3542d2c57a08053c322b19aa4d45fe0874be7c319bfa6208bbc4511e3.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7d5359b3542d2c57a08053c322b19aa4d45fe0874be7c319bfa6208bbc4511e3.exe
Resource
win10v2004-20221111-en
General
-
Target
7d5359b3542d2c57a08053c322b19aa4d45fe0874be7c319bfa6208bbc4511e3
-
Size
213KB
-
MD5
34f7df961608caf2e6f2ea97c7b3c037
-
SHA1
d00f4f942528d810ac7afae545c5228783f36d27
-
SHA256
7d5359b3542d2c57a08053c322b19aa4d45fe0874be7c319bfa6208bbc4511e3
-
SHA512
78e5cd9744503590dea3a56028efff6cfc28f262330770085c5833f052151c4ed46885274fef4b67c2ba57389cb8beec329dec74ab95689a476bc575e51cbd84
-
SSDEEP
3072:R/qHBjkOy1+CflhSLYbooadn53FwRiMSxa2Ev9xcjkeFFBGxZr:R8GV+uzboJ5KTIa2cs1FPGxp
Malware Config
Signatures
Files
-
7d5359b3542d2c57a08053c322b19aa4d45fe0874be7c319bfa6208bbc4511e3.exe windows x86
f414a8c8a7c2335fca0fdf0eefdeaaae
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetWindowLongA
wvsprintfA
SetWindowPos
FindWindowA
RedrawWindow
GetWindowTextA
EnableWindow
GetSystemMetrics
IsWindow
CheckRadioButton
UnregisterClassA
SetCursor
GetSysColorBrush
DialogBoxParamA
DestroyAcceleratorTable
DispatchMessageA
TranslateMessage
LoadIconA
EmptyClipboard
SetClipboardData
SetFocus
CharUpperA
OpenClipboard
IsDialogMessageA
TranslateAcceleratorA
GetMessageA
LoadAcceleratorsA
RemoveMenu
InvalidateRect
ChildWindowFromPoint
PostMessageA
DestroyCursor
CreateDialogParamA
GetWindowRect
IsMenu
GetSubMenu
SetDlgItemInt
GetWindowPlacement
CharLowerBuffA
EnableMenuItem
CheckMenuRadioItem
GetSysColor
KillTimer
DestroyIcon
DestroyWindow
PostQuitMessage
GetClientRect
MoveWindow
GetSystemMenu
SetTimer
SetWindowPlacement
InsertMenuItemA
GetMenu
CheckMenuItem
SetMenuItemInfoA
SetActiveWindow
DefDlgProcA
RegisterClassA
EndDialog
SetDlgItemTextA
EnumClipboardFormats
GetClipboardData
CloseClipboard
GetClassInfoA
CallWindowProcA
SetWindowLongA
IsDlgButtonChecked
SetWindowTextA
CheckDlgButton
GetActiveWindow
MessageBoxA
wsprintfA
GetDlgItemTextA
SendMessageA
GetCursorPos
TrackPopupMenu
ClientToScreen
DestroyMenu
CreatePopupMenu
AppendMenuA
SendDlgItemMessageA
GetDlgItem
LoadCursorA
comdlg32
GetSaveFileNameA
GetOpenFileNameA
shell32
SHBrowseForFolderA
SHGetPathFromIDListA
SHGetMalloc
SHGetFileInfoA
DragAcceptFiles
DragQueryFileA
DragFinish
ShellExecuteA
advapi32
RegSetValueA
RegQueryValueExA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegOpenKeyExA
RegCloseKey
RegCreateKeyA
RegDeleteKeyA
GetUserNameA
gdi32
DeleteObject
CreateFontIndirectA
SelectObject
GetStockObject
SetTextColor
SetBkMode
GetObjectA
opengl32
glVertex4fv
glTexParameteri
glPushMatrix
glMateriali
glRectdv
glColor3b
glMaterialf
comctl32
ImageList_Create
ImageList_Destroy
InitCommonControlsEx
ImageList_ReplaceIcon
ImageList_Remove
ImageList_SetBkColor
CreateToolbarEx
kernel32
DeleteCriticalSection
GetModuleHandleW
IsDebuggerPresent
lstrcatA
HeapAlloc
GetProcessHeap
HeapFree
ExitThread
Sleep
CreateThread
VirtualAlloc
VirtualFree
GetProcAddress
OpenProcess
IsBadStringPtrA
IsBadReadPtr
lstrcmpA
VirtualQuery
SetFilePointer
GetModuleFileNameA
GetSystemInfo
GetFileTime
GetFileSize
FileTimeToDosDateTime
FileTimeToLocalFileTime
GlobalMemoryStatus
GetSystemTimeAsFileTime
GlobalReAlloc
FlushFileBuffers
DeviceIoControl
MapViewOfFile
CreateFileMappingA
UnmapViewOfFile
FlushViewOfFile
SetEndOfFile
IsValidCodePage
TlsGetValue
ExitProcess
DeleteFileA
GetLocalTime
SetCurrentDirectoryA
WriteProcessMemory
GetLastError
GetCurrentProcess
SetPriorityClass
TerminateThread
LocalAlloc
SetFileAttributesA
CopyFileA
FileTimeToSystemTime
FindNextFileA
LoadLibraryA
FreeLibrary
HeapReAlloc
TlsAlloc
TlsSetValue
TlsFree
VirtualQueryEx
WritePrivateProfileStructA
GetPrivateProfileStructA
WideCharToMultiByte
SetStdHandle
GetStringTypeW
GetStringTypeA
IsBadCodePtr
IsBadWritePtr
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSectionAndSpinCount
GetLocaleInfoA
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
QueryPerformanceCounter
SetProcessShutdownParameters
GetCurrentProcessId
SetUnhandledExceptionFilter
HeapCreate
HeapDestroy
GetVersionExA
GetEnvironmentVariableA
GetFileType
GetStdHandle
SetHandleCount
LocalFree
lstrlenA
GetTapeStatus
FatalExit
IsSystemResumeAutomatic
CopyFileExW
GetCurrentDirectoryA
FindNextVolumeA
GetProcessIoCounters
GetPriorityClass
GetVersion
lstrcpyA
lstrcpynA
GetFileAttributesA
FindClose
FindFirstFileA
ReadFile
GetTempFileNameA
GetTickCount
GetTempPathA
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
TerminateProcess
ResumeThread
OutputDebugStringA
ReadProcessMemory
VirtualProtectEx
CreateProcessA
CloseHandle
WriteFile
CreateFileA
GetModuleHandleA
lstrcmpiA
RtlUnwind
GetStartupInfoA
GetCommandLineA
MultiByteToWideChar
LCMapStringA
LCMapStringW
HeapSize
GetCPInfo
GetACP
GetOEMCP
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
Sections
.text Size: 41KB - Virtual size: 41KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 149KB - Virtual size: 148KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ