Static task
static1
Behavioral task
behavioral1
Sample
f2dfc366679d6236c10a27ffa164cee01682142054eb95e6f8664e32c2f0bb8d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f2dfc366679d6236c10a27ffa164cee01682142054eb95e6f8664e32c2f0bb8d.exe
Resource
win10v2004-20220812-en
General
-
Target
f2dfc366679d6236c10a27ffa164cee01682142054eb95e6f8664e32c2f0bb8d
-
Size
133KB
-
MD5
69b1ea31a46b599311931a51aba919ce
-
SHA1
c5443d6fa226ad06dcc14c509f3c47a6fd86a311
-
SHA256
f2dfc366679d6236c10a27ffa164cee01682142054eb95e6f8664e32c2f0bb8d
-
SHA512
c2a176fe769daafe6d1582c0898e69120acf7b0dc699380c67e17ad2e759775bbabbe4c50d68ea0f3e458eabd4e236cab3609e9d7ea3d48dd46de013d5c069b2
-
SSDEEP
1536:AoUxr/vxznJZm4O2G3Zlb483Hlw8lccd6mbeSY6WFSOu1OVGr5BVXScSw:AtHBOJlb4+Fwdcdw6WFSB5B0Hw
Malware Config
Signatures
Files
-
f2dfc366679d6236c10a27ffa164cee01682142054eb95e6f8664e32c2f0bb8d.exe windows x86
ccba7c208dc01bafe5765e75fb975c2a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetClientRect
comdlg32
GetFileTitleW
shell32
SHGetPathFromIDListW
DragQueryFileW
DragFinish
CommandLineToArgvW
SHAppBarMessage
SHGetFileInfoW
ShellExecuteW
SHBrowseForFolderW
ole32
CoCreateInstance
OleDuplicateData
CoTaskMemAlloc
ReleaseStgMedium
CoTaskMemFree
RevokeDragDrop
CoLockObjectExternal
RegisterDragDrop
CreateStreamOnHGlobal
OleLockRunning
DoDragDrop
OleGetClipboard
CoUninitialize
CoInitializeEx
OleCreateMenuDescriptor
OleDestroyMenuDescriptor
IsAccelerator
OleTranslateAccelerator
wininet
HttpSendRequestW
InternetReadFile
InternetOpenW
InternetConnectW
HttpOpenRequestW
HttpAddRequestHeadersW
InternetCloseHandle
opengl32
wglDeleteContext
glMaterialf
glGetClipPlane
glEdgeFlag
glTexParameteri
glDisable
glTexCoord3s
glLoadMatrixf
comctl32
ImageList_GetIconSize
InitCommonControlsEx
shlwapi
PathFindFileNameW
PathIsUNCW
PathStripToRootW
PathFindExtensionW
PathRemoveFileSpecW
winmm
PlaySoundW
kernel32
LCMapStringW
LCMapStringA
GetStringTypeW
MultiByteToWideChar
GetStringTypeA
GetLocaleInfoA
LoadLibraryA
RtlUnwind
InitializeCriticalSectionAndSpinCount
IsValidCodePage
GetOEMCP
GetACP
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetFileType
SetHandleCount
GetEnvironmentStringsW
WideCharToMultiByte
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetModuleFileNameA
GetStdHandle
WriteFile
ExitProcess
Sleep
VirtualAlloc
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
VirtualFree
HeapCreate
GetCPInfo
CompareStringA
HeapReAlloc
HeapSize
HeapAlloc
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
InitializeSListHead
IsBadWritePtr
SetComputerNameExA
CreateDirectoryExA
ReadConsoleOutputCharacterA
SetThreadIdealProcessor
IsBadHugeReadPtr
FormatMessageW
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalSize
CopyFileW
GlobalFree
GetProcAddress
GetModuleHandleW
FreeLibrary
lstrcmpW
LoadLibraryExW
GetLocaleInfoW
lstrcmpA
EnumResourceLanguagesW
ConvertDefaultLocale
GetCurrentThreadId
GetCurrentThread
GlobalDeleteAtom
FreeResource
GetLastError
HeapFree
GetLocalTime
GetSystemTimeAsFileTime
GetCommandLineA
GetStartupInfoA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
InterlockedDecrement
Sections
.text Size: 27KB - Virtual size: 26KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 51KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 46KB - Virtual size: 46KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ