Static task
static1
Behavioral task
behavioral1
Sample
da050932f318bbe0a368dd699619c77257369bf865d56e54a2c59b487d8072c1.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
da050932f318bbe0a368dd699619c77257369bf865d56e54a2c59b487d8072c1.exe
Resource
win10v2004-20220901-en
General
-
Target
da050932f318bbe0a368dd699619c77257369bf865d56e54a2c59b487d8072c1
-
Size
384KB
-
MD5
e019ac2729c78252ebc0b324afe2c45f
-
SHA1
77c9032935546f634eab4290541d78dbc03d5089
-
SHA256
da050932f318bbe0a368dd699619c77257369bf865d56e54a2c59b487d8072c1
-
SHA512
f9b3d989dbdf72de32cf02b09d6c24a509a476865f50955c5b84424a8d98acc15ebb615f2d0f250615970576aec9af9345ed69b06778761bc773a3787e13546b
-
SSDEEP
6144:0M07OqABHvHepad3x5HSuHgENzoyncZYStlBrK8ZXVK7s70/0vsMCMV0+M:Y7cP+pad33hNdYYStTVXys7CUsMCMy+M
Malware Config
Signatures
Files
-
da050932f318bbe0a368dd699619c77257369bf865d56e54a2c59b487d8072c1.exe windows x86
875fd1cd7f416c6002dd7a48cda7dc68
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
ImageList_GetImageRect
CreateUpDownControl
ImageList_LoadImageW
ImageList_LoadImage
ImageList_AddMasked
DrawInsert
InitCommonControlsEx
ImageList_SetDragCursorImage
CreateToolbarEx
CreatePropertySheetPageW
ImageList_Add
ImageList_BeginDrag
ImageList_AddIcon
DestroyPropertySheetPage
shell32
SHGetPathFromIDListA
kernel32
CreateDirectoryExW
MoveFileExA
LCMapStringA
TlsAlloc
GetModuleHandleA
GetThreadLocale
EnumCalendarInfoExA
GetStartupInfoW
RtlUnwind
HeapDestroy
ReadConsoleOutputA
GetCommandLineW
GetModuleFileNameA
TerminateProcess
SetFilePointer
HeapCreate
GetSystemTimeAsFileTime
CreateMutexA
VirtualQuery
LoadLibraryA
GlobalGetAtomNameA
HeapAlloc
WaitForMultipleObjectsEx
InterlockedCompareExchange
lstrcmpW
FreeEnvironmentStringsA
WritePrivateProfileStructW
IsValidCodePage
GetStdHandle
SetHandleCount
UnmapViewOfFile
GetFileType
HeapReAlloc
VirtualFree
UnhandledExceptionFilter
SetLastError
GetConsoleTitleW
GetTimeZoneInformation
GetProfileSectionA
GetStartupInfoA
GetCurrentThreadId
GetDiskFreeSpaceW
LeaveCriticalSection
GetEnvironmentStringsW
InitializeCriticalSection
GetCurrentProcessId
WriteFile
InterlockedExchangeAdd
TlsGetValue
SetEnvironmentVariableA
lstrcpynW
ExitProcess
QueryPerformanceCounter
VirtualAlloc
GetSystemTime
GetLocaleInfoW
SetConsoleCP
SuspendThread
GetProcAddress
HeapFree
GetFileTime
IsBadWritePtr
VirtualProtect
GetEnvironmentStrings
GetTimeFormatW
GetModuleFileNameW
DeleteCriticalSection
GlobalFlags
LoadLibraryW
GetVersion
ReadFile
EnumSystemCodePagesA
WriteProfileSectionW
CompareStringW
FlushFileBuffers
OpenMutexA
TlsFree
GetCurrentProcess
GetTickCount
CreatePipe
VirtualFreeEx
GetTempFileNameA
GetLocalTime
TlsSetValue
GetStringTypeA
WideCharToMultiByte
EnterCriticalSection
MultiByteToWideChar
GetVolumeInformationA
CloseHandle
FreeEnvironmentStringsW
SetStdHandle
LCMapStringW
GetLogicalDrives
InterlockedExchange
InterlockedDecrement
VirtualAllocEx
GetLastError
SetTimeZoneInformation
GetCommandLineA
GetCurrentThread
GetCPInfo
CompareStringA
GetStringTypeW
CreateNamedPipeA
InterlockedIncrement
EnumSystemCodePagesW
GetComputerNameW
user32
RegisterClassExA
ShowWindow
DrawFocusRect
CreatePopupMenu
MessageBoxA
LoadMenuW
ChangeDisplaySettingsExA
GetKeyboardLayoutList
CallMsgFilterA
WindowFromPoint
IsCharLowerW
SendIMEMessageExA
EnumDisplayMonitors
CopyRect
OpenInputDesktop
GetKeyboardType
OpenDesktopW
WinHelpA
SetMessageQueue
MonitorFromPoint
SetWindowLongW
EnumPropsExW
RegisterClassA
DestroyWindow
GetClassInfoExA
BlockInput
SetRect
DefWindowProcW
SetWindowWord
CreateWindowExW
GetSubMenu
WindowFromDC
CharUpperA
Sections
.text Size: 64KB - Virtual size: 63KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 140KB - Virtual size: 136KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 88KB - Virtual size: 107KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 88KB - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ