Static task
static1
Behavioral task
behavioral1
Sample
85cebde6f9c6f0dc5d059b928d6ea83aa25088f3114e161cd17c9e962277ce1c.exe
Resource
win7-20220812-en
General
-
Target
85cebde6f9c6f0dc5d059b928d6ea83aa25088f3114e161cd17c9e962277ce1c
-
Size
272KB
-
MD5
ab948f06871a6cc5e05667cf7bb805e2
-
SHA1
3cbe025fe95a4e431f12380d39f8acc1f53df00c
-
SHA256
85cebde6f9c6f0dc5d059b928d6ea83aa25088f3114e161cd17c9e962277ce1c
-
SHA512
a1a73be2658d66c67e2effbf0057bfa025699301375eb594f0f2cddc97e98956531c4a876670a755298453cb009eca591e2526590be7b4635f5ca51a22e00b36
-
SSDEEP
6144:NwGc44u2s5asWy3Fr2l3pD7ngjrebiVggw53yi74:p4u2y3FClZHSe0XQij
Malware Config
Signatures
Files
-
85cebde6f9c6f0dc5d059b928d6ea83aa25088f3114e161cd17c9e962277ce1c.exe windows x86
83d5d0515f52101dd6326d71b156a120
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapAlloc
TerminateProcess
HeapFree
ExitProcess
HeapSize
GetCPInfo
GetACP
GetOEMCP
HeapReAlloc
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetStdHandle
HeapDestroy
VirtualFree
RaiseException
GetCommandLineA
IsBadWritePtr
IsBadCodePtr
CompareStringA
CompareStringW
SetEnvironmentVariableA
SetStdHandle
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
GetLocaleInfoW
LCMapStringA
LCMapStringW
GlobalAlloc
GlobalDeleteAtom
lstrcmpA
GetCurrentThread
MulDiv
InterlockedDecrement
GetStartupInfoA
GetModuleHandleA
GetDriveTypeA
RtlUnwind
SetErrorMode
GlobalGetAtomNameA
GlobalAddAtomA
GetModuleFileNameA
GetThreadLocale
GetStringTypeExA
GetFullPathNameA
GetVolumeInformationA
DeleteFileA
MoveFileA
SetEndOfFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
CreateFileA
GetCurrentProcess
GetCurrentDirectoryA
GetPrivateProfileIntA
GetVersion
GetProcessVersion
LoadLibraryA
GetProcAddress
FreeLibrary
TlsGetValue
LocalReAlloc
TlsSetValue
EnterCriticalSection
LeaveCriticalSection
GlobalReAlloc
lstrcatA
SetUnhandledExceptionFilter
VirtualAlloc
GlobalHandle
GetPrivateProfileStringA
GetCurrentThreadId
DeleteCriticalSection
TlsAlloc
InitializeCriticalSection
LocalFree
LocalAlloc
lstrcpyA
MultiByteToWideChar
WideCharToMultiByte
InterlockedIncrement
SetLastError
GlobalFlags
lstrlenA
lstrcmpiA
lstrcpynA
CloseHandle
IsBadReadPtr
HeapCreate
GlobalLock
GetLastError
WritePrivateProfileStringA
FindClose
FindFirstFileA
SetCurrentDirectoryA
GlobalUnlock
LoadResource
FindResourceA
LockResource
GlobalFree
user32
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
GetDC
ReleaseDC
BeginPaint
EndPaint
TabbedTextOutA
DrawTextA
GrayStringA
PostQuitMessage
ShowOwnedPopups
SetCursor
GetCursorPos
ValidateRect
TranslateMessage
GetMessageA
GetClassNameA
PtInRect
ClientToScreen
GetDesktopWindow
CharUpperA
LoadCursorA
GetSysColorBrush
DestroyMenu
ReleaseCapture
GetMenuState
LoadBitmapA
ModifyMenuA
InsertMenuA
DeleteMenu
GetMenuStringA
LoadStringA
SetRectEmpty
LoadAcceleratorsA
TranslateAcceleratorA
LoadMenuA
SetMenu
ReuseDDElParam
UnpackDDElParam
InvalidateRect
BringWindowToTop
PostMessageA
UpdateWindow
SendDlgItemMessageA
SystemParametersInfoA
MapWindowPoints
GetSysColor
DispatchMessageA
PeekMessageA
GetFocus
SetFocus
AdjustWindowRectEx
EqualRect
WindowFromPoint
EndDeferWindowPos
IsWindowVisible
GetTopWindow
WinHelpA
GetClassInfoA
RegisterClassA
GetMenuItemCount
GetSubMenu
GetMenuItemID
GetMenu
GetWindowTextA
GetDlgCtrlID
GetKeyState
DefWindowProcA
CreateWindowExA
SetWindowsHookExA
SetPropA
CallNextHookEx
UnhookWindowsHookEx
GetLastActivePopup
GetForegroundWindow
SetForegroundWindow
GetPropA
RemovePropA
CallWindowProcA
GetMessageTime
GetMessagePos
GetWindow
GetWindowRect
SetWindowLongA
SetWindowPos
RegisterWindowMessageA
GetNextDlgTabItem
EndDialog
GetActiveWindow
SetActiveWindow
IsWindow
CreateDialogIndirectParamA
DestroyWindow
GetParent
GetWindowLongA
GetDlgItem
IsWindowEnabled
ExitWindowsEx
wsprintfA
MessageBoxA
EnableWindow
IsIconic
SendMessageA
GetSystemMetrics
GetClientRect
DrawIcon
EnableMenuItem
ShowWindow
SetWindowTextA
IsDialogMessageA
SetDlgItemTextA
CheckMenuItem
ScreenToClient
DeferWindowPos
BeginDeferWindowPos
CopyRect
LoadIconA
GetCapture
UnregisterClassA
gdi32
SetTextColor
GetObjectA
CreateBitmap
DeleteDC
SaveDC
RestoreDC
SelectObject
GetStockObject
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
DeleteObject
GetDeviceCaps
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
SetBkColor
GetClipBox
comdlg32
GetFileTitleA
winspool.drv
DocumentPropertiesA
ClosePrinter
OpenPrinterA
advapi32
RegDeleteValueA
RegSetValueExA
RegCreateKeyExA
RegCloseKey
RegQueryValueExA
RegEnumKeyA
RegOpenKeyExA
RegDeleteKeyA
shell32
DragQueryFileA
DragFinish
comctl32
ImageList_Destroy
ord17
Sections
.text Size: 103KB - Virtual size: 102KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 15KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 56KB - Virtual size: 55KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vrdata Size: 60KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE