Static task
static1
Behavioral task
behavioral1
Sample
d3e15e756d1ab0256cc1a1c4e728a49126b0e71dd483ee01a5262fb84110f17f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d3e15e756d1ab0256cc1a1c4e728a49126b0e71dd483ee01a5262fb84110f17f.exe
Resource
win10v2004-20220901-en
General
-
Target
d3e15e756d1ab0256cc1a1c4e728a49126b0e71dd483ee01a5262fb84110f17f
-
Size
295KB
-
MD5
7ca302a6a5cfec04f356b7443d45d729
-
SHA1
a3c3a46e9bd2aac7ba3448523cfccff5dc27811b
-
SHA256
d3e15e756d1ab0256cc1a1c4e728a49126b0e71dd483ee01a5262fb84110f17f
-
SHA512
26db1ac1dcd0d344a96fbb267fa86c169e546ad457bf66109b8f9b1ae95f27677a431ef2e64ad4080a9321206cbbd75ca1039eebeffd91cf5f175e9ef142c636
-
SSDEEP
6144:CQF0dYmjCHciji2pBbhylDLbEquJehM9ZZz0yvFo:xO48kbYPbEqu0M7Zz0Ku
Malware Config
Signatures
Files
-
d3e15e756d1ab0256cc1a1c4e728a49126b0e71dd483ee01a5262fb84110f17f.exe windows x86
edeebe24bdcb24f972576b61c32ddfa7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetConsoleWindowInfo
SetSystemTime
ConnectNamedPipe
GetHandleInformation
WriteConsoleOutputCharacterA
GetModuleFileNameW
FreeLibraryAndExitThread
FindNextChangeNotification
GetConsoleMode
EnumResourceNamesW
GlobalAddAtomA
MoveFileW
CreateDirectoryExA
GetTempPathW
ReleaseMutex
lstrcmpiW
LoadLibraryExA
ReleaseSemaphore
GetProfileIntA
SetProcessAffinityMask
SetStdHandle
GetFileType
CreateNamedPipeW
Beep
VirtualUnlock
FindResourceExW
GetSystemTime
QueryDosDeviceA
FindFirstFileExW
VirtualProtect
SetThreadLocale
PeekConsoleInputW
SizeofResource
FreeResource
GetCurrentProcess
GetLongPathNameA
ExitThread
EndUpdateResourceA
FlushConsoleInputBuffer
SetEnvironmentVariableW
WriteProcessMemory
SetProcessWorkingSetSize
GetSystemTimeAsFileTime
_llseek
GetWindowsDirectoryA
lstrcatW
UnhandledExceptionFilter
GetDiskFreeSpaceW
GetSystemTimeAdjustment
EnumTimeFormatsW
PulseEvent
GetOEMCP
IsValidLocale
PeekNamedPipe
WritePrivateProfileStructA
GetBinaryTypeA
SetConsoleCursorPosition
lstrcpynA
ReadFile
GlobalUnlock
GetFileAttributesExA
FindCloseChangeNotification
GetStringTypeExW
MoveFileExA
SetCurrentDirectoryA
PrepareTape
EnumSystemCodePagesA
GetSystemInfo
OpenMutexA
EnumResourceNamesA
SetNamedPipeHandleState
GetLogicalDriveStringsA
GetCommandLineA
VirtualAlloc
IsBadWritePtr
ExitProcess
user32
GetSystemMetrics
SetWindowLongA
RegisterClipboardFormatA
IsCharLowerA
SendMessageCallbackW
CreateWindowExA
SetCursorPos
gdi32
StartDocA
GetEnhMetaFileDescriptionA
GetDIBits
CreateRoundRectRgn
ExtTextOutW
EndPath
CreateCompatibleBitmap
DPtoLP
GetWindowOrgEx
OffsetClipRgn
GetRegionData
comdlg32
CommDlgExtendedError
GetOpenFileNameW
PrintDlgW
PageSetupDlgW
advapi32
StartServiceCtrlDispatcherW
CryptGenKey
RegSetValueExA
RegCloseKey
GetSidIdentifierAuthority
PrivilegeCheck
RegDeleteValueA
IsValidSid
RegNotifyChangeKeyValue
MakeSelfRelativeSD
EnumDependentServicesA
DeleteAce
EqualSid
GetSecurityInfo
SetEntriesInAclA
RegCreateKeyA
LookupAccountNameW
RegUnLoadKeyA
GetSecurityDescriptorLength
ReadEventLogW
RegEnumValueW
GetLengthSid
QueryServiceLockStatusW
SetSecurityDescriptorDacl
ImpersonateSelf
LogonUserW
GetExplicitEntriesFromAclW
InitializeSid
shell32
SHGetDesktopFolder
SHFileOperationA
SHChangeNotify
ole32
CoReleaseMarshalData
oleaut32
SafeArrayRedim
SysStringLen
SetErrorInfo
SafeArrayCreate
comctl32
InitCommonControlsEx
shlwapi
PathFindFileNameW
StrCmpNIA
Sections
.text Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 287KB - Virtual size: 286KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE