Static task
static1
Behavioral task
behavioral1
Sample
83650bb573ac7f7dcceee66cbd41c00dd7059b770615c0cfeb6e3d8b9c4e00dd.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
83650bb573ac7f7dcceee66cbd41c00dd7059b770615c0cfeb6e3d8b9c4e00dd.exe
Resource
win10v2004-20220812-en
General
-
Target
83650bb573ac7f7dcceee66cbd41c00dd7059b770615c0cfeb6e3d8b9c4e00dd
-
Size
228KB
-
MD5
a43d8bf20312c336328c4047e04d2a53
-
SHA1
988e292ad78b9f457f38fa75b1f21b1e3655e411
-
SHA256
83650bb573ac7f7dcceee66cbd41c00dd7059b770615c0cfeb6e3d8b9c4e00dd
-
SHA512
ee802a83b18c59362a95fe059c45fb723339c57c1da1d02d00ac4912307b2492b773795fe80d80b0e1e7f128065015c480ac387bfe10323c8372cc57c0f2f0e5
-
SSDEEP
6144:6eOyKVBgFBv5tEfdAa4wZU2jnAkRI/2UiC43j:6eOyKVuFS4wZUgW/tC
Malware Config
Signatures
Files
-
83650bb573ac7f7dcceee66cbd41c00dd7059b770615c0cfeb6e3d8b9c4e00dd.exe windows x86
407ac1feb3b8f47613704554378609ae
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
SHGetSpecialFolderPathA
SHFileOperationA
shlwapi
PathIsDirectoryA
PathRemoveExtensionA
PathFindExtensionA
PathFindFileNameA
SHDeleteValueA
SHDeleteKeyA
SHGetValueA
PathFileExistsA
PathAppendA
PathRemoveFileSpecA
PathGetArgsA
iphlpapi
GetAdaptersInfo
kernel32
SetEndOfFile
GetThreadLocale
GetFullPathNameA
GlobalGetAtomNameA
GetModuleFileNameW
InterlockedDecrement
WritePrivateProfileStringA
GetCurrentDirectoryA
GlobalFlags
LocalAlloc
LeaveCriticalSection
TlsGetValue
EnterCriticalSection
GlobalReAlloc
GlobalHandle
InitializeCriticalSection
TlsAlloc
TlsSetValue
LocalReAlloc
DeleteCriticalSection
TlsFree
InterlockedIncrement
lstrcmpW
GlobalFindAtomA
SetErrorMode
GetCPInfo
FlushFileBuffers
GetFileInformationByHandle
PeekNamedPipe
GetFileType
ExitProcess
HeapFree
HeapAlloc
VirtualAlloc
HeapReAlloc
GetCommandLineA
GetProcessHeap
GetStartupInfoA
RtlUnwind
RaiseException
HeapSize
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
SetStdHandle
SetHandleCount
GetStdHandle
GetACP
HeapDestroy
HeapCreate
VirtualFree
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetTimeZoneInformation
GetDriveTypeA
GetConsoleCP
GetConsoleMode
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEnvironmentVariableA
SetFilePointer
WriteFile
GetCurrentProcessId
GlobalAddAtomA
GlobalFree
GlobalUnlock
FormatMessageA
LocalFree
FindFirstFileA
FileTimeToLocalFileTime
FileTimeToSystemTime
FindNextFileA
FindClose
GetCurrentThread
GetCurrentThreadId
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
GlobalLock
lstrcmpA
GlobalAlloc
GlobalDeleteAtom
GetModuleHandleA
lstrcpyA
WaitForSingleObject
GetVersion
CompareStringA
InterlockedExchange
MultiByteToWideChar
CompareStringW
lstrlenA
SystemTimeToFileTime
GetSystemTimeAsFileTime
RemoveDirectoryA
TerminateProcess
OpenProcess
Sleep
CreateMutexA
MoveFileExA
DeleteFileA
GetShortPathNameA
GetCurrentProcess
SetPriorityClass
DeviceIoControl
GetLastError
GetVolumeInformationA
GetComputerNameA
lstrcatA
lstrcmpiA
SetLastError
GetVersionExA
CloseHandle
ReadFile
GetFileSize
CreateFileA
FindResourceA
LoadResource
LockResource
SizeofResource
WideCharToMultiByte
CopyFileA
GetModuleFileNameA
GetTempPathA
FreeLibrary
GetProcAddress
LoadLibraryA
GetOEMCP
user32
GetSysColorBrush
UnregisterClassA
DestroyMenu
ShowWindow
LoadIconA
WinHelpA
GetClassLongA
SetPropA
GetPropA
RemovePropA
IsWindow
GetForegroundWindow
GetDlgItem
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetForegroundWindow
GetClientRect
GetMenu
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
CopyRect
DefWindowProcA
CallWindowProcA
SetWindowLongA
SetWindowPos
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetSysColor
ReleaseDC
GetDC
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
GetDlgCtrlID
GetWindowRect
GetClassNameA
PtInRect
SetWindowTextA
LoadCursorA
GetCapture
ClientToScreen
UnhookWindowsHookEx
GetSystemMetrics
RegisterWindowMessageA
MessageBoxA
PostMessageA
GetDesktopWindow
GetWindow
GetWindowLongA
GetLastActivePopup
IsWindowEnabled
EnableWindow
SetCursor
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
GetFocus
GetParent
ModifyMenuA
EnableMenuItem
CheckMenuItem
GetWindowTextA
FindWindowExA
SendMessageTimeoutA
EnumWindows
GetWindowThreadProcessId
PostQuitMessage
ValidateRect
GetCursorPos
PeekMessageA
GetKeyState
SendMessageA
IsWindowVisible
GetActiveWindow
DispatchMessageA
TranslateMessage
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
SetWindowsHookExA
CallNextHookEx
GetMessageA
gdi32
SetMapMode
GetClipBox
GetStockObject
SetTextColor
SetBkColor
RestoreDC
SaveDC
DeleteObject
CreateBitmap
GetDeviceCaps
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
DeleteDC
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
RegCreateKeyExA
RegQueryValueA
RegEnumKeyA
RegOpenKeyA
RegEnumKeyExA
RegDeleteKeyA
RegSetValueExA
RegDeleteValueA
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
ole32
CoGetMalloc
StringFromIID
oleaut32
VariantClear
VariantChangeType
VariantInit
Sections
.text Size: 180KB - Virtual size: 179KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 32KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 176B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ