Static task
static1
Behavioral task
behavioral1
Sample
d14885272e6d562f1b64b17340da7ed52178b8a9b48a99171883d341c31ffba5.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d14885272e6d562f1b64b17340da7ed52178b8a9b48a99171883d341c31ffba5.exe
Resource
win10v2004-20220901-en
General
-
Target
d14885272e6d562f1b64b17340da7ed52178b8a9b48a99171883d341c31ffba5
-
Size
296KB
-
MD5
5cba48b70e06a33dfaa2a765705fb8a0
-
SHA1
0ca450879da5d49f2c2070cdeb2760a320ecbf6b
-
SHA256
d14885272e6d562f1b64b17340da7ed52178b8a9b48a99171883d341c31ffba5
-
SHA512
9e4c6d7d31b4dd6eda7267ef9a809e6cfee804ca4c5973ce29a857721fd4ab4b26cc67a199eab8c36f27db2b69009612ae1a3d75e0c310b495905c6ee2dea3fc
-
SSDEEP
6144:xy2Blvfu8eoqd5odzw99Q/9PVsB9YXFbZ9ol3cH/3tGk:walvfu5jd58zwXQFP6B9xcf3Yk
Malware Config
Signatures
Files
-
d14885272e6d562f1b64b17340da7ed52178b8a9b48a99171883d341c31ffba5.exe windows x86
d76ab8e23a82d901f27bbf055b3da2b3
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetMessagePos
UpdateWindow
GetClassNameA
GetDC
GetAsyncKeyState
EnumChildWindows
SetWindowPos
GetWindowTextA
FindWindowA
SetClipboardData
DestroyWindow
SendMessageA
IsClipboardFormatAvailable
SendDlgItemMessageA
CheckRadioButton
SetForegroundWindow
GetMessageA
CloseClipboard
EndDialog
OffsetRect
LoadIconA
MapDialogRect
BeginDeferWindowPos
DeferWindowPos
CreateMenu
UnregisterHotKey
GetPropA
TranslateMessage
RegisterWindowMessageA
setupapi
SetupGetFileCompressionInfoA
SetupGetInfFileListA
SetupScanFileQueueA
SetupInstallFilesFromInfSectionA
SetupOpenAppendInfFileA
SetupOpenFileQueue
SetupGetSourceFileLocationA
SetupGetSourceFileSizeA
SetupCloseFileQueue
SetupCloseInfFile
SetupCommitFileQueueA
SetupDecompressOrCopyFileA
SetupRemoveFileLogEntryA
SetupOpenLog
SetupCloseLog
SetupInitializeFileLogA
SetupQueryFileLogA
kernel32
LeaveCriticalSection
SetEnvironmentVariableA
CompareStringW
CompareStringA
GetLocaleInfoW
GetTimeZoneInformation
GetSystemInfo
IsValidCodePage
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
GetDateFormatA
GetTimeFormatA
GetStringTypeW
GetStringTypeA
LCMapStringW
MultiByteToWideChar
LCMapStringA
HeapSize
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
IsBadWritePtr
HeapReAlloc
VirtualAlloc
GetCPInfo
GetOEMCP
GetACP
LoadLibraryA
VirtualQuery
InterlockedExchange
RtlUnwind
FatalAppExitA
HeapAlloc
InitializeCriticalSection
HeapFree
VirtualFree
HeapCreate
HeapDestroy
TlsGetValue
TlsSetValue
TlsFree
GetCurrentThread
GetCurrentThreadId
SetLastError
TlsAlloc
IsProcessorFeaturePresent
VirtualProtect
GetWindowsDirectoryA
GetLastError
CloseHandle
GetFileType
CreateFileA
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersionExA
SetHandleCount
GetStdHandle
DeleteCriticalSection
SetStdHandle
EnterCriticalSection
SetEndOfFile
ReadFile
SetFilePointer
ExitProcess
GetProcAddress
TerminateProcess
GetCurrentProcess
WriteFile
GetModuleFileNameA
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
Sections
.text Size: 84KB - Virtual size: 82KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 92KB - Virtual size: 90KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 116KB - Virtual size: 169KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE