Static task
static1
Behavioral task
behavioral1
Sample
d529a79651b02f98920a9c11c175ecab38fb9439acc215d69cb1a38102f010c4.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d529a79651b02f98920a9c11c175ecab38fb9439acc215d69cb1a38102f010c4.exe
Resource
win10v2004-20220812-en
General
-
Target
d529a79651b02f98920a9c11c175ecab38fb9439acc215d69cb1a38102f010c4
-
Size
262KB
-
MD5
3ad5ee5e09d6a8c06654f3d3dd7bca70
-
SHA1
1436af34ef4946fd586083277680c4a5706194e6
-
SHA256
d529a79651b02f98920a9c11c175ecab38fb9439acc215d69cb1a38102f010c4
-
SHA512
10c49e71c598eee91392d65621f888cad60462b9a2091bc2e9d81367a7002adef0a9b59dbdcf1caeeebe1c45682df86737b3653f4a7647eb422937b42d028bf7
-
SSDEEP
6144:UsUxTyqy/NBotC9qjRXVT4F2nGADfDRXPhU:tfNLyRXVT4F2Gq7bU
Malware Config
Signatures
Files
-
d529a79651b02f98920a9c11c175ecab38fb9439acc215d69cb1a38102f010c4.exe windows x86
45542bece9b9221f00205eb74d7e7fe0
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LocalAlloc
LoadLibraryExW
SetLastError
SizeofResource
LockResource
LoadResource
FindResourceW
LocalFree
FormatMessageW
GetModuleHandleW
DeleteCriticalSection
RaiseException
FreeLibrary
CloseHandle
RemoveDirectoryW
CreateEventW
GetLogicalDriveStringsW
WritePrivateProfileSectionW
GetPrivateProfileSectionW
GetFullPathNameW
lstrcpynW
GetFullPathNameA
AreFileApisANSI
lstrcpynA
SetUnhandledExceptionFilter
GetCurrentThreadId
GetSystemTimeAsFileTime
UnhandledExceptionFilter
GetThreadLocale
GetACP
WaitForMultipleObjects
GetModuleHandleA
CreateFileA
GetFileSize
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
VirtualProtect
CreateFileW
ReadFile
WriteFile
SetEndOfFile
SetFilePointer
DeleteFileW
MoveFileW
CopyFileW
GetTempPathW
GetShortPathNameW
SetFileTime
EnterCriticalSection
LeaveCriticalSection
lstrlenW
lstrlenA
WideCharToMultiByte
DosDateTimeToFileTime
LocalFileTimeToFileTime
DeviceIoControl
GetLogicalDrives
CreateThread
FindFirstFileW
FindNextFileW
FindClose
CreateDirectoryW
WaitForSingleObject
CopyFileExW
GetSystemInfo
GetExitCodeThread
CreatePipe
DuplicateHandle
CreateProcessW
GetDriveTypeW
MoveFileExW
SetEnvironmentVariableW
IsValidLocale
GetProcAddress
user32
DrawTextW
LoadBitmapW
ReleaseDC
DestroyCursor
SetCapture
SetRectEmpty
TrackMouseEvent
GetDC
GetNextDlgTabItem
GetWindowLongW
SetCursor
GetCursorPos
GetParent
GetAsyncKeyState
PtInRect
DrawFocusRect
CopyRect
ScreenToClient
GetFocus
FillRect
ReleaseCapture
GetSysColor
LoadCursorW
SetRect
GetClientRect
EnableWindow
OffsetRect
InflateRect
UnregisterClassA
IsWindow
GetWindowRect
PeekMessageW
DispatchMessageW
MsgWaitForMultipleObjects
PostMessageW
SetWindowPos
GetKeyState
GetSystemMenu
EnableMenuItem
IsWindowVisible
InvalidateRect
SendMessageW
gdi32
CreateFontW
DeleteDC
GetDeviceCaps
SetDIBits
GetDIBits
CreateDIBitmap
GetTextMetricsW
GetTextExtentPoint32W
CreateFontIndirectW
DeleteObject
SelectObject
GetCurrentObject
SetTextColor
BitBlt
CreateCompatibleBitmap
LPtoDP
GetMapMode
GetObjectW
GetBkColor
DPtoLP
GetTextColor
CreateCompatibleDC
advapi32
RegSetValueExW
RegDeleteValueW
OpenThreadToken
EqualSid
GetTokenInformation
OpenProcessToken
FreeSid
AllocateAndInitializeSid
RegQueryValueExW
RegCloseKey
RegCreateKeyExW
RegOpenKeyExW
shell32
SHGetDesktopFolder
DragAcceptFiles
ShellExecuteW
DragQueryFileW
SHGetMalloc
comctl32
InitCommonControlsEx
ole32
CoInitialize
CoUninitialize
CoInitializeEx
CoCreateInstance
CoTaskMemFree
oleaut32
LoadTypeLi
DispCallFunc
VariantClear
LoadRegTypeLi
SysStringLen
VariantCopy
VariantChangeType
VariantInit
SysAllocString
SysFreeString
msoert2
PszAllocA
shimeng
SE_DllUnloaded
SE_InstallAfterInit
SE_ProcessDying
Sections
.text Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.I Size: 1024B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.EL Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.U Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 212KB - Virtual size: 214KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.SuFNRt Size: 512B - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ