Static task
static1
Behavioral task
behavioral1
Sample
42936ada182d153fb0d8607792a83d447a07f4d5e4b68744bb9e0f4aa9aa7a03.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
42936ada182d153fb0d8607792a83d447a07f4d5e4b68744bb9e0f4aa9aa7a03.exe
Resource
win10v2004-20220812-en
General
-
Target
42936ada182d153fb0d8607792a83d447a07f4d5e4b68744bb9e0f4aa9aa7a03
-
Size
245KB
-
MD5
d02a571d281d550f65e633d38084408c
-
SHA1
0b6a211159435115aca451ff0c8020f6f103af15
-
SHA256
42936ada182d153fb0d8607792a83d447a07f4d5e4b68744bb9e0f4aa9aa7a03
-
SHA512
d5a7120f9368d3384d0d9b26ab5e6605b77755e389fee1f9252fb06d494055299bb925caa2f5753b48aec89b809ef0953a1e4a793ebcb8b02b231d0a2c50cfc0
-
SSDEEP
6144:SrgBKDtEVp59EAlEeOd/aHAhaEbSPh0n1:u4KD2759EASJaghu0n
Malware Config
Signatures
Files
-
42936ada182d153fb0d8607792a83d447a07f4d5e4b68744bb9e0f4aa9aa7a03.exe windows x86
008ebacb3cf7d5b7b1ac64aa94a49645
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
winspool.drv
ExtDeviceMode
QueryRemoteFonts
OpenPrinterA
ClosePrinter
PlayGdiScriptOnPrinterIC
DocumentPropertiesA
EndDocPrinter
QuerySpoolMode
DeletePrinterIC
gdi32
GetDCPenColor
ExtTextOutA
CreateDIBitmap
SaveDC
RoundRect
GetClipBox
DeleteDC
EnumEnhMetaFile
CreateEllipticRgn
TextOutA
SelectClipRgn
SetWindowExtEx
SetViewportExtEx
PtInRegion
SetTextColor
CreateBitmap
GetRelAbs
GdiPlayDCScript
ScaleViewportExtEx
DeleteObject
SetMapMode
RestoreDC
GetDeviceCaps
kernel32
WideCharToMultiByte
GetEnvironmentStringsA
IsBadWritePtr
GetStdHandle
GetVolumeInformationA
FileTimeToSystemTime
GetCurrentProcess
LCMapStringA
GetOEMCP
FindResourceA
GetFileSize
GetSystemDirectoryA
LocalAlloc
GetModuleHandleA
InitializeSListHead
SetCurrentDirectoryA
LCMapStringW
LocalReAlloc
FlushInstructionCache
lstrcpyA
SetLastError
SetUnhandledExceptionFilter
GetLastError
LockFile
HeapFree
LeaveCriticalSection
HeapSize
TlsSetValue
GetEnvironmentVariableA
SetErrorMode
SetEndOfFile
GetACP
FreeEnvironmentStringsA
WriteFile
GetStringTypeW
lstrcatA
lstrcmpiA
GetCommandLineA
GetCurrentThreadId
HeapCreate
Sleep
LoadLibraryA
GlobalUnlock
IsValidLocale
FileTimeToLocalFileTime
VirtualAlloc
GetVersionExA
GetFileType
HeapDestroy
GlobalAlloc
DuplicateHandle
LocalFileTimeToFileTime
FindClose
ClearCommError
IsBadCodePtr
GlobalFlags
HeapReAlloc
GetFileTime
FindNextFileA
UnhandledExceptionFilter
SystemTimeToFileTime
TlsFree
GlobalAddAtomA
GetThreadLocale
RaiseException
TlsGetValue
VirtualFree
LoadResource
GetModuleFileNameA
IsBadReadPtr
Toolhelp32ReadProcessMemory
SetHandleCount
SetSystemTime
GetProcAddress
LocalFree
FindFirstFileA
FatalExit
SetConsoleTextAttribute
ReleaseActCtx
InitializeCriticalSection
ReadFile
LockResource
SetFileAttributesA
InterlockedDecrement
FlushFileBuffers
FreeLibrary
GlobalFree
SetConsoleCursorPosition
GetVersion
GetCurrentThread
RtlUnwind
EnterCriticalSection
FreeEnvironmentStringsW
CompareStringW
DosDateTimeToFileTime
GetStringTypeA
lstrcmpA
GlobalFindAtomA
LocalUnlock
SetFilePointer
GetDriveTypeA
SystemTimeToTzSpecificLocalTime
GetStartupInfoA
SetEnvironmentVariableA
InterlockedIncrement
GlobalLock
GlobalHandle
UnlockFile
GetCPInfo
lstrlenA
SetConsoleCursorInfo
GetCurrentDirectoryA
GetWindowsDirectoryA
WritePrivateProfileStringA
SetStdHandle
Beep
MultiByteToWideChar
CloseHandle
lstrcpynA
TlsAlloc
GetFullPathNameA
MulDiv
TerminateProcess
CompareStringA
SetTimeZoneInformation
GetFileAttributesA
GetTimeZoneInformation
SetConsoleScreenBufferSize
GlobalDeleteAtom
DeleteFileA
CreateFileA
ExitProcess
GetProcessVersion
GlobalGetAtomNameA
HeapAlloc
GetEnvironmentStringsW
DeleteCriticalSection
IsDebuggerPresent
user32
GetClassInfoA
CharUpperA
GetDC
BeginPaint
IsWindowVisible
ValidateRect
CheckMenuItem
GetActiveWindow
GetTopWindow
UpdateWindow
DefWindowProcA
GetClientRect
GetPropA
DrawIcon
GetParent
EnableMenuItem
EndPaint
SetActiveWindow
CreateWindowExA
UnregisterClassA
GetMessageA
SetPropA
SetWindowTextA
GetMenu
CallWindowProcA
MapWindowPoints
GetMenuItemID
IsDialogMessageA
PostQuitMessage
UnhookWindowsHookEx
GetDlgItem
LoadStringA
LoadIconA
CopyRect
GetWindowTextLengthA
DestroyWindow
IsWindow
GetWindowLongA
MessageBoxA
GetWindow
CreateDialogIndirectParamA
WinHelpA
GetMessagePos
SystemParametersInfoA
TabbedTextOutA
IsWindowEnabled
GetKeyState
GetLastActivePopup
SetWindowPos
SetMenuItemBitmaps
DispatchMessageA
GetMenuState
PostMessageA
GetFocus
GetSubMenu
GetSysColorBrush
GetSystemMetrics
GetSysColor
IsIconic
GetMenuCheckMarkDimensions
ReleaseDC
GetClassNameA
LoadCursorA
RegisterClassA
GetMenuItemCount
SendDlgItemMessageA
GetWindowTextA
GrayStringA
ShowWindow
SendMessageA
DestroyMenu
wsprintfA
RemovePropA
EndDialog
GetWindowPlacement
LoadBitmapA
GetForegroundWindow
EnableWindow
TranslateMessage
ClientToScreen
CallNextHookEx
GetDlgCtrlID
GetCapture
SetWindowLongA
GetWindowRect
SetWindowsHookExA
ExitWindowsEx
PeekMessageA
ModifyMenuA
PtInRect
DdeEnableCallback
GetCursorPos
SetForegroundWindow
winmm
mmioAdvance
waveOutGetPitch
mixerOpen
timeGetSystemTime
comdlg32
GetFileTitleA
dwOKSubclass
advapi32
SystemFunction016
RegSetValueExA
SetSecurityDescriptorControl
GetAclInformation
AddAccessDeniedAceEx
RegOpenKeyExA
LsaICLookupNamesWithCreds
RegCloseKey
SystemFunction030
MSChapSrvChangePassword
LsaEnumeratePrivileges
RegDeleteValueA
LockServiceDatabase
RegCreateKeyExA
OpenThreadToken
AddUsersToEncryptedFile
Sections
.text Size: 187KB - Virtual size: 186KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 36KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ