Static task
static1
Behavioral task
behavioral1
Sample
d2b3fc04cd8bc69e46be87d957198472b10801b07792b1b17f4aa76336a5e04a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d2b3fc04cd8bc69e46be87d957198472b10801b07792b1b17f4aa76336a5e04a.exe
Resource
win10v2004-20221111-en
General
-
Target
d2b3fc04cd8bc69e46be87d957198472b10801b07792b1b17f4aa76336a5e04a
-
Size
320KB
-
MD5
d5e0f20e4b6060d1206d73dae9c81625
-
SHA1
4ec52dbfd0897729b9995aac549a11ec82f87136
-
SHA256
d2b3fc04cd8bc69e46be87d957198472b10801b07792b1b17f4aa76336a5e04a
-
SHA512
43aeb6cd0eb894da1489fe28b282ee0b9187fd0e0cd02610a190a5e5ad5ad60607bf470455e0115ef82136d921bad5bf0c9bcb9a2b517d6a1ed63da7aa5187e8
-
SSDEEP
6144:fkzcu9K2Ar5xDiVn2HbJ5kg7Hpb/Epsb9Qtd7DAtZReh:8w3HlHRbU70XReh
Malware Config
Signatures
Files
-
d2b3fc04cd8bc69e46be87d957198472b10801b07792b1b17f4aa76336a5e04a.exe windows x86
a5abb91737ef1046504aba544eae35f4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ReadFile
WriteFile
SetFilePointer
FlushFileBuffers
SetEndOfFile
GetCurrentProcess
CreateFileA
SetErrorMode
HeapFree
HeapAlloc
VirtualAlloc
HeapReAlloc
GetSystemTimeAsFileTime
GetCommandLineA
GetProcessHeap
GetStartupInfoA
RtlUnwind
GetOEMCP
HeapSize
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
HeapDestroy
HeapCreate
VirtualFree
GetStdHandle
SetHandleCount
GetFileType
Sleep
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
GetConsoleCP
GetConsoleMode
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetCPInfo
GlobalFlags
GetThreadLocale
InterlockedIncrement
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
WritePrivateProfileStringA
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesA
lstrcmpA
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
lstrcmpW
InterlockedDecrement
GetModuleFileNameW
LocalFree
UnmapViewOfFile
MapViewOfFile
OpenFileMappingA
CreateFileMappingA
GetSystemInfo
IsDebuggerPresent
GetCurrentThreadId
ResetEvent
SetEvent
OpenEventA
GlobalAlloc
GlobalFree
OpenProcess
GetCurrentProcessId
WaitForSingleObject
DeleteFileW
GetTempPathA
CloseHandle
LockResource
SetLastError
GlobalUnlock
FileTimeToSystemTime
SizeofResource
GlobalLock
LoadResource
FindResourceA
DosDateTimeToFileTime
LoadLibraryA
FreeLibrary
FormatMessageA
RaiseException
GetACP
GetLocaleInfoA
GlobalMemoryStatus
GetModuleFileNameA
GetLocalTime
GetVersionExA
GetProcAddress
GetModuleHandleA
GetVersion
CompareStringA
GetLastError
InterlockedExchange
MultiByteToWideChar
WideCharToMultiByte
lstrlenA
ExitProcess
user32
GetSysColorBrush
SetCursor
GetMessageA
GetActiveWindow
GetCursorPos
ValidateRect
PostQuitMessage
IsWindowEnabled
ShowWindow
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
ModifyMenuA
EnableMenuItem
CheckMenuItem
ReleaseDC
GetDC
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
RegisterWindowMessageA
LoadIconA
WinHelpA
GetCapture
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassNameA
SetPropA
GetPropA
RemovePropA
GetFocus
LoadCursorA
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
GetDlgItem
DestroyWindow
GetMessageTime
GetMessagePos
MapWindowPoints
GetKeyState
SetForegroundWindow
IsWindowVisible
GetClientRect
GetMenu
PostMessageA
CreateWindowExA
GetClassInfoExA
GetClassInfoA
CharNextA
MessageBoxA
RegisterClassA
GetSysColor
AdjustWindowRectEx
GetParent
CopyRect
PtInRect
GetDlgCtrlID
UnregisterClassA
DefWindowProcA
CallWindowProcA
DestroyMenu
IsWindow
DispatchMessageA
PeekMessageA
TranslateMessage
KillTimer
SetTimer
SendMessageA
FindWindowA
GetWindowThreadProcessId
EnableWindow
SetWindowTextA
UpdateWindow
GetSubMenu
GetMenuItemCount
GetMenuItemID
GetMenuState
GetWindowLongA
SetWindowLongA
SetWindowPos
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowRect
GetSystemMetrics
GetWindow
UnhookWindowsHookEx
GetTopWindow
gdi32
ScaleWindowExtEx
DeleteDC
CreateBitmap
GetStockObject
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
CreateCompatibleDC
DeleteObject
SetMapMode
RestoreDC
SaveDC
SetBkColor
SetTextColor
GetClipBox
GetDeviceCaps
GetDIBits
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
advapi32
RegSetValueExA
RegQueryValueA
RegEnumKeyA
RegDeleteKeyA
RegCloseKey
RegCreateKeyExA
RegOpenKeyExA
RegQueryValueExA
RegOpenKeyA
shell32
SHGetSpecialFolderLocation
SHGetMalloc
SHChangeNotify
SHGetPathFromIDListA
comctl32
InitCommonControlsEx
shlwapi
PathFindFileNameA
PathFindExtensionA
ole32
CreateStreamOnHGlobal
oleaut32
VariantClear
VariantChangeType
VariantInit
Sections
.text Size: 188KB - Virtual size: 186KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 40KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 76KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE