Static task
static1
Behavioral task
behavioral1
Sample
da3579010191adc0aa1bdc287fbb338d9c4aea5b0ce39bb4f8af3d27bfc097ac.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
da3579010191adc0aa1bdc287fbb338d9c4aea5b0ce39bb4f8af3d27bfc097ac.exe
Resource
win10v2004-20220812-en
General
-
Target
da3579010191adc0aa1bdc287fbb338d9c4aea5b0ce39bb4f8af3d27bfc097ac
-
Size
334KB
-
MD5
bbffe40abd328fb813488525582a739c
-
SHA1
e2d911da1f333a890224f5a2a64ff2519ffcd62c
-
SHA256
da3579010191adc0aa1bdc287fbb338d9c4aea5b0ce39bb4f8af3d27bfc097ac
-
SHA512
6b37392fbdfff463aca6e58a83cbaf7a7da4dddebe09fb0f442e503cda1a3d1c6501e054c6b6c921d1bcfa5bf41f3be9d0ed87cbceec51fe85bd113bf74020b5
-
SSDEEP
6144:P8hbjRDRuvYSggJCsiQbFzjRLdQPanA9fcW7DWaF:P8qYlcCVQbVjNK7/7DWaF
Malware Config
Signatures
Files
-
da3579010191adc0aa1bdc287fbb338d9c4aea5b0ce39bb4f8af3d27bfc097ac.exe windows x86
9615aee98ca7a2804b79ed1ef6f51872
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetParent
GetClipCursor
GetProcessWindowStation
RegisterClassA
DestroyMenu
DestroyWindow
IsClipboardFormatAvailable
ScreenToClient
CreateDialogParamA
GetCaretBlinkTime
DispatchMessageW
GetDlgItemTextW
GetDC
CheckMenuItem
GetClassLongW
IsDialogMessageA
OemToCharA
SetDlgItemTextW
GetClassInfoA
CreateMenu
GetScrollBarInfo
GetActiveWindow
CreateAcceleratorTableW
IsWindowEnabled
GetAncestor
InSendMessageEx
IsWindowVisible
PrintWindow
AnyPopup
PaintDesktop
GetSystemMenu
GetPriorityClipboardFormat
IsWinEventHookInstalled
GetMenuItemRect
MapVirtualKeyExA
IsWindowUnicode
OemKeyScan
GetMenuContextHelpId
MoveWindow
GetWindowTextLengthW
CloseClipboard
MonitorFromWindow
BeginDeferWindowPos
RealChildWindowFromPoint
GetDCEx
VkKeyScanW
GetClassLongA
GetAsyncKeyState
DrawIcon
GetMouseMovePointsEx
shell32
SHGetPathFromIDListW
ole32
OleUninitialize
OleCreateMenuDescriptor
advapi32
RegEnumValueA
RegEnumKeyW
CryptHashData
RegOpenKeyA
CryptDestroyHash
gdi32
DeleteMetaFile
CreateRectRgn
DeleteDC
CreateBrushIndirect
GetStockObject
MoveToEx
SetRectRgn
crypt32
CryptHashToBeSigned
kernel32
HeapReAlloc
VirtualAlloc
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
InitializeCriticalSectionAndSpinCount
IsDebuggerPresent
GetCurrentProcess
TerminateProcess
EnterCriticalSection
LeaveCriticalSection
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
HeapCreate
RtlUnwind
InterlockedDecrement
GetCurrentThreadId
SetLastError
InterlockedIncrement
TlsFree
TlsSetValue
TlsGetValue
DeleteCriticalSection
SetHandleCount
GetEnvironmentStringsW
WideCharToMultiByte
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStdHandle
WriteFile
HeapSize
GetLocaleInfoA
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetStringTypeA
HeapFree
ReplaceFileA
FlushViewOfFile
FlushFileBuffers
EncodePointer
PostQueuedCompletionStatus
FlushInstructionCache
GetCommMask
PrepareTape
GetLogicalDrives
CreateTimerQueue
DisconnectNamedPipe
SetFilePointerEx
GetDevicePowerState
FreeUserPhysicalPages
CreateNamedPipeW
ClearCommBreak
SetCommBreak
GetFileType
OpenProcess
GetNumaNodeProcessorMask
GetWriteWatch
GetModuleFileNameA
HeapAlloc
FindFirstFileExW
RemoveVectoredExceptionHandler
LocalShrink
GetProcessHeap
DecodeSystemPointer
LoadLibraryA
LoadResource
GetStringTypeW
GetShortPathNameA
VirtualFree
ReadFile
GetFullPathNameW
GetLocaleInfoW
CompareStringA
RemoveDirectoryA
IsDBCSLeadByteEx
RemoveDirectoryW
GetCurrentDirectoryA
TlsAlloc
WaitForDebugEvent
GetFileSize
MoveFileA
GlobalUnlock
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCommandLineA
GetStartupInfoA
GetModuleHandleW
Sleep
GetProcAddress
ExitProcess
GetLastError
Sections
.text Size: 39KB - Virtual size: 39KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 15KB - Virtual size: 157KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 269KB - Virtual size: 268KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ