Static task
static1
Behavioral task
behavioral1
Sample
d22dc5490788c7bc0981bd03fbd4da36f381f067d300eaa8a649b17561e81e4f.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
d22dc5490788c7bc0981bd03fbd4da36f381f067d300eaa8a649b17561e81e4f.exe
Resource
win10v2004-20220812-en
General
-
Target
d22dc5490788c7bc0981bd03fbd4da36f381f067d300eaa8a649b17561e81e4f
-
Size
3.0MB
-
MD5
5ae1586e9ef0d3d874b060a5035d5e5a
-
SHA1
eaedd3fc5baabcb6c99e050dbcd104cfeb94c884
-
SHA256
d22dc5490788c7bc0981bd03fbd4da36f381f067d300eaa8a649b17561e81e4f
-
SHA512
c82a20c1ed9d516eec7d76065fc1c52e1f30f73e0d9228ce7c509fd850853454350e373974f4de3b84b42e129ee879b5cb7e3fb93bd5433edb2bd506013b25e2
-
SSDEEP
49152://q2e82Cq43BBSpJV9j7nzFCdNTT74ca6VdVZjzNGRL8:/q4xBCJHjLzFCTT74ca6VdVZjzNeI
Malware Config
Signatures
Files
-
d22dc5490788c7bc0981bd03fbd4da36f381f067d300eaa8a649b17561e81e4f.exe windows x86
ebea6fe9622d84dd00cc02c21afbabb6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
memset
_strnicmp
strncmp
strncpy
_strdup
free
_isnan
sprintf
_stricmp
strlen
strcmp
memmove
strcpy
strcat
memcmp
memcpy
localtime
mktime
gmtime
fabs
ceil
malloc
floor
fclose
fmod
sin
cos
abs
kernel32
GetModuleHandleA
HeapCreate
FindResourceA
HeapDestroy
ExitProcess
HeapValidate
WaitForSingleObject
GetStartupInfoA
CreateProcessA
ExpandEnvironmentStringsA
SetErrorMode
GetDiskFreeSpaceExA
GetLocaleInfoA
GetDriveTypeA
CloseHandle
GetVersionExA
WritePrivateProfileSectionA
WritePrivateProfileStringA
WideCharToMultiByte
GetCurrentProcess
SetFileAttributesA
RemoveDirectoryA
CreateFileMappingA
CreateMutexA
OpenMutexA
OpenFileMappingA
MapViewOfFile
UnmapViewOfFile
ReleaseMutex
GlobalMemoryStatus
GetComputerNameA
GetLastError
LoadResource
LockResource
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
CreateThread
SuspendThread
ResumeThread
HeapAlloc
HeapFree
LoadLibraryA
GetProcAddress
FreeLibrary
GetCurrentThreadId
GetCurrentProcessId
GetModuleFileNameA
GetCommandLineA
GetEnvironmentVariableA
SetEnvironmentVariableA
DuplicateHandle
CreatePipe
GetStdHandle
PeekNamedPipe
GetExitCodeProcess
CreateFileA
SetFilePointer
SetEndOfFile
WriteFile
GetFileSize
ReadFile
TerminateProcess
SetUnhandledExceptionFilter
Sleep
GetTickCount
TlsAlloc
TlsSetValue
TlsGetValue
HeapSize
HeapReAlloc
SetLastError
MulDiv
FindFirstFileA
FindClose
GetFileAttributesA
GetTempPathA
DeleteFileA
CreateDirectoryA
FindNextFileA
CopyFileA
SetCurrentDirectoryA
FileTimeToLocalFileTime
FileTimeToSystemTime
MultiByteToWideChar
GetLocalTime
GlobalAlloc
GlobalFree
DeleteCriticalSection
TlsFree
WaitForMultipleObjects
GetCurrentThread
CreateSemaphoreA
ReleaseSemaphore
user32
SendMessageA
DestroyIcon
GetDesktopWindow
GetWindow
GetWindowTextA
GetClassNameA
GetDC
ReleaseDC
PostMessageA
GetSysColor
SetFocus
MapWindowPoints
ExitWindowsEx
LoadIconA
GetWindowLongA
SetWindowLongA
SetWindowPos
SendMessageTimeoutA
GetSystemMenu
EnableMenuItem
DrawMenuBar
GetCursorPos
WindowFromPoint
CallWindowProcA
GetDlgCtrlID
GetWindowTextLengthA
IsWindow
DestroyWindow
GetParent
SetPropA
CharLowerA
MessageBoxA
GetWindowThreadProcessId
IsWindowVisible
GetForegroundWindow
IsWindowEnabled
EnableWindow
EnumWindows
CreateWindowExA
GetWindowRect
SetWindowTextA
GetClientRect
FillRect
DefWindowProcA
RedrawWindow
LoadCursorA
RegisterClassExA
SetClassLongA
InvalidateRect
InflateRect
GetPropA
GetWindowDC
RemovePropA
ValidateRect
SetCursor
BeginPaint
DrawStateA
EndPaint
SetTimer
GetMessagePos
ScreenToClient
KillTimer
ShowWindow
GetIconInfo
UpdateWindow
ReleaseCapture
SetCapture
GetSystemMetrics
GetSysColorBrush
GetFocus
MoveWindow
PeekMessageA
TranslateMessage
DispatchMessageA
EnumPropsExA
DrawFrameControl
SetActiveWindow
UnregisterClassA
DestroyAcceleratorTable
RegisterClassA
AdjustWindowRectEx
GetActiveWindow
CreateAcceleratorTableA
IsZoomed
IsIconic
MsgWaitForMultipleObjects
GetMessageA
TranslateAcceleratorA
EnumChildWindows
DefFrameProcA
IsChild
GetKeyState
SetCursorPos
LoadImageA
SystemParametersInfoA
EnumDisplaySettingsA
CopyImage
CreateIconFromResourceEx
CreateIconFromResource
DrawIconEx
gdi32
CreateSolidBrush
GetStockObject
SelectObject
GetTextExtentPoint32A
GetDeviceCaps
AddFontResourceA
ExcludeClipRect
CreateRectRgnIndirect
SelectClipRgn
DeleteObject
SetBkMode
SetTextColor
TextOutA
CreatePen
MoveToEx
LineTo
GetObjectType
GetObjectA
SetBkColor
CreateCompatibleBitmap
CreateDCA
CreateCompatibleDC
DeleteDC
StretchBlt
CreateDIBSection
CreateFontA
SetDIBits
BitBlt
GdiSetBatchLimit
GdiGetBatchLimit
SetStretchBltMode
SetBrushOrgEx
GetDIBits
CreateBitmap
SetPixel
SetTextAlign
GetPixel
CreateFontIndirectA
GetTextMetricsA
advapi32
GetUserNameA
OpenSCManagerA
CloseServiceHandle
RegOpenKeyExA
RegEnumKeyExA
RegCloseKey
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegCreateKeyExA
RegDeleteKeyA
RegQueryValueExA
RegCreateKeyA
RegSetValueExA
RegDeleteValueA
comctl32
InitCommonControlsEx
ImageList_Destroy
ImageList_Remove
ImageList_AddMasked
ImageList_Create
ImageList_Add
ImageList_ReplaceIcon
ImageList_GetIconSize
ole32
CoInitialize
CoCreateInstance
CoUninitialize
CoInitializeEx
CoTaskMemFree
RevokeDragDrop
shell32
ExtractIconA
ShellExecuteExA
SHGetFileInfoA
ShellExecuteA
SHChangeNotify
SHGetSpecialFolderLocation
SHGetPathFromIDListA
winmm
timeBeginPeriod
timeEndPeriod
Sections
.code Size: 279KB - Virtual size: 279KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 106KB - Virtual size: 106KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 58KB - Virtual size: 62KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ