Static task
static1
Behavioral task
behavioral1
Sample
d3a82615912c47ef6bec49db7910b895a616ab6a77a002a945c2afe1d1b4d102.exe
Resource
win7-20220812-en
General
-
Target
d3a82615912c47ef6bec49db7910b895a616ab6a77a002a945c2afe1d1b4d102
-
Size
199KB
-
MD5
0b616907e87cfd6e67d310559c9767e5
-
SHA1
068793371a404fb129fa4cb7f12babac7290f4aa
-
SHA256
d3a82615912c47ef6bec49db7910b895a616ab6a77a002a945c2afe1d1b4d102
-
SHA512
9acb7b30f9170f5c9cbaa0a9e1f96dc8a48252a028cd5ec1fc204b287c21c9176b98caeb680537523cfeb57d19d67c63cd328eebc9d540cd3195cee2c80db766
-
SSDEEP
3072:csSQwrnFjIOgZE7XPNdCyIZTMQhHOXYJIgTp7oZEb3gsnec/SEqKkNPXz:cHDFjFgZuXBIdMQmgoXsKEryr
Malware Config
Signatures
Files
-
d3a82615912c47ef6bec49db7910b895a616ab6a77a002a945c2afe1d1b4d102.exe windows x86
7066f4f27c96febb09a8f0422446a402
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
GetStockObject
SetTextColor
CreateFontIndirectA
DeleteObject
GetDeviceCaps
SetBkColor
SelectObject
GetTextMetricsA
shell32
SHGetSpecialFolderLocation
SHGetPathFromIDListA
SHGetMalloc
user32
UnregisterClassA
GetWindowLongA
MessageBoxA
CharNextA
DispatchMessageA
PeekMessageA
PostMessageA
PackDDElParam
DestroyWindow
UpdateWindow
GetClientRect
CharPrevA
BeginPaint
OffsetRect
SetWindowTextA
DrawTextA
FindWindowA
EndPaint
PostQuitMessage
GetDC
IsWindow
ShowCursor
ReleaseDC
GetSystemMetrics
MoveWindow
TranslateMessage
ShowWindow
GetMessageA
wvsprintfA
BringWindowToTop
SetFocus
LoadStringA
LoadCursorA
LoadIconA
UnpackDDElParam
ExitWindowsEx
wsprintfA
CreateWindowExA
DefWindowProcA
RegisterClassA
SendMessageA
comdlg32
GetOpenFileNameA
advapi32
AdjustTokenPrivileges
RegEnumKeyExA
OpenProcessToken
RegCloseKey
LookupPrivilegeValueA
RegSetValueExA
RegCreateKeyA
RegQueryInfoKeyA
RegOpenKeyExA
RegQueryValueExA
ole32
OleUninitialize
OleInitialize
CoCreateInstance
oleaut32
RegisterTypeLi
LoadTypeLi
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
VerInstallFileA
kernel32
WriteFile
GlobalUnlock
LocalAlloc
GetOEMCP
GlobalDeleteAtom
GetCPInfo
LCMapStringW
GetACP
GetCurrentProcessId
VirtualAlloc
LCMapStringA
HeapCreate
HeapDestroy
VirtualFree
GetStdHandle
SetHandleCount
SetStdHandle
GetCommandLineA
GetStartupInfoA
SetEndOfFile
GetCurrentDirectoryA
SetEnvironmentVariableA
SetCurrentDirectoryA
GetSystemTime
GetTimeZoneInformation
GetLocalTime
HeapAlloc
TerminateProcess
HeapFree
FileTimeToLocalFileTime
FileTimeToSystemTime
ExitProcess
GetVersion
GetFileType
RemoveDirectoryA
GetVersionExA
HeapReAlloc
GlobalAddAtomA
GetFileAttributesA
GetWindowsDirectoryA
GetSystemDirectoryA
CreateDirectoryA
SetFileAttributesA
GetModuleHandleA
GetDriveTypeA
SetErrorMode
LoadLibraryA
CreateProcessA
FlushFileBuffers
CompareStringW
GetStringTypeW
GetStringTypeA
RtlUnwind
GlobalAlloc
lstrcpynA
GlobalFree
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
lstrcatA
lstrcpyA
lstrlenA
lstrcmpiA
OutputDebugStringA
CopyFileA
GetModuleFileNameA
OpenFile
Sleep
IsDBCSLeadByte
GetExitCodeProcess
CloseHandle
SetFilePointer
CreateFileA
LocalFree
GetProcAddress
GetFullPathNameA
FindFirstFileA
FindClose
GetTempPathA
GetTempFileNameA
FreeLibrary
GlobalLock
GlobalFindAtomA
CompareStringA
GetShortPathNameA
MoveFileExA
MoveFileA
DeleteFileA
ReadFile
_lwrite
_lread
GetLastError
GetCurrentProcess
MultiByteToWideChar
WideCharToMultiByte
LocalUnlock
LocalLock
GetPrivateProfileStringA
GetFileSize
_lclose
Sections
.text Size: 90KB - Virtual size: 89KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 14KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.prdata Size: 72KB - Virtual size: 72KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE