Static task
static1
Behavioral task
behavioral1
Sample
cd8a718e7625887353cd272cfafe9f3adc8a94a8fc614439c1bdfc288a382f4a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
cd8a718e7625887353cd272cfafe9f3adc8a94a8fc614439c1bdfc288a382f4a.exe
Resource
win10v2004-20220901-en
General
-
Target
cd8a718e7625887353cd272cfafe9f3adc8a94a8fc614439c1bdfc288a382f4a
-
Size
728KB
-
MD5
831698bb2580bf11c456bf88295a2f8e
-
SHA1
97c4e2f641bacbc42814a9336523a9acaa8128e4
-
SHA256
cd8a718e7625887353cd272cfafe9f3adc8a94a8fc614439c1bdfc288a382f4a
-
SHA512
78314fc86b5eda2e658b63945e2a4b4468e8dc5548437adfaf074deb6a67c40e51ec40dbc9cae776a9ff486ddb30e58aeaf2b19e0c20a97611879e5427b0d95b
-
SSDEEP
12288:fQBHJDOB8ROUBqXG/xFRk9wd/C2q5U/zbB2bKVwINv1P4bNyTYhzB6aDgkxGult+:fEd/3q5U/z8OmIt1PIHB6aL4N
Malware Config
Signatures
Files
-
cd8a718e7625887353cd272cfafe9f3adc8a94a8fc614439c1bdfc288a382f4a.exe windows x86
33075d9842be72153f18535efc54db55
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
ImageList_Destroy
PropertySheetW
DestroyPropertySheetPage
InitCommonControlsEx
user32
MessageBeep
SetForegroundWindow
SetWindowPos
IsZoomed
ShowWindow
GetMenuCheckMarkDimensions
ScreenToClient
ScrollWindow
GetScrollPos
DefWindowProcW
GetSystemMetrics
DestroyWindow
MoveWindow
CreatePopupMenu
ChildWindowFromPointEx
ReuseDDElParam
LoadStringW
SendMessageW
SetTimer
GetDlgItem
IsClipboardFormatAvailable
LoadAcceleratorsW
LoadBitmapW
GetMessagePos
DestroyAcceleratorTable
GetSysColor
GetWindowRect
MessageBoxW
GetParent
DrawEdge
GetActiveWindow
ReleaseDC
RegisterClassExW
IsChild
TranslateMessage
RegisterClassW
IsWindow
LoadIconW
CreateWindowExW
GetScrollInfo
IsMenu
UnionRect
shlwapi
PathIsUNCA
StrToIntA
PathRemoveExtensionA
PathFindFileNameA
oleaut32
LoadTypeLi
advapi32
RegSetValueExA
InitializeAcl
OpenSCManagerA
GetSidSubAuthorityCount
GetUserNameA
AllocateAndInitializeSid
RegCreateKeyExA
RegQueryValueExA
RegEnumKeyA
OpenProcessToken
RegCloseKey
gdi32
SetBkColor
SetPixel
PlayMetaFile
RectVisible
SetBitmapBits
RestoreDC
PtInRegion
GetDCOrgEx
StartPage
Escape
SetRectRgn
GetPath
PolyPolygon
Pie
SetBrushOrgEx
FlattenPath
CreateFontA
GetStretchBltMode
DeleteObject
SaveDC
PtVisible
FillPath
GetPaletteEntries
GetTextExtentPoint32A
ExtTextOutA
GetNearestColor
EndPage
SetTextAlign
PaintRgn
DPtoLP
GetWindowExtEx
DeleteMetaFile
GetPolyFillMode
CloseFigure
EndDoc
SetWindowExtEx
GetCurrentObject
PolyBezierTo
StretchDIBits
ExtCreatePen
SetPaletteEntries
ExtFloodFill
GetTextColor
StartDocA
CreateDIBitmap
CreateBitmap
CreateDCA
Ellipse
OffsetRgn
GetBoundsRect
CreateICA
SetStretchBltMode
GetBkColor
CreateSolidBrush
OffsetViewportOrgEx
wininet
FindNextUrlCacheEntryA
CreateUrlCacheEntryA
CommitUrlCacheEntryA
SetUrlCacheEntryInfoA
FindFirstUrlCacheEntryA
kernel32
GetModuleHandleW
GetModuleFileNameA
TerminateProcess
GetCommandLineA
HeapFree
SetEnvironmentVariableA
GetOEMCP
GetTimeZoneInformation
SetThreadPriority
GetEnvironmentStringsW
GetLocaleInfoA
HeapCreate
LCMapStringW
EnterCriticalSection
HeapAlloc
TlsAlloc
ExitProcess
CompareStringA
lstrcmpA
GetStartupInfoW
LocalFree
lstrcpyW
TlsSetValue
RtlUnwind
lstrcpynW
InterlockedIncrement
CloseHandle
FormatMessageW
GetStdHandle
GetEnvironmentStrings
FreeLibrary
QueryPerformanceCounter
InterlockedCompareExchange
LeaveCriticalSection
CreateToolhelp32Snapshot
MultiByteToWideChar
GetStringTypeW
SetFilePointer
GetACP
GetTempPathW
lstrlenA
GetModuleFileNameW
GetVersionExA
HeapReAlloc
CreateMutexW
MapViewOfFile
HeapSize
SetStdHandle
LCMapStringA
VirtualQuery
IsBadCodePtr
GetCPInfo
GetDateFormatA
GetStartupInfoA
GetStringTypeA
GetPrivateProfileStringW
UnhandledExceptionFilter
GetTickCount
GetCurrentProcess
GetLocaleInfoW
FlushFileBuffers
VirtualProtect
TlsFree
CompareStringW
GetSystemInfo
FreeEnvironmentStringsA
DeleteCriticalSection
TlsGetValue
GetCurrentThreadId
LoadResource
ReadFile
InterlockedExchange
DeleteFileW
FreeEnvironmentStringsW
GetCurrentProcessId
SetHandleCount
FindFirstFileW
LoadLibraryW
GetSystemTimeAsFileTime
VirtualAlloc
GetModuleHandleA
WideCharToMultiByte
lstrcmpiW
GetLastError
SetUnhandledExceptionFilter
GetProcAddress
HeapDestroy
lstrlenW
GetFileType
CreateDirectoryW
VirtualFree
SetLastError
GetCommandLineW
LoadLibraryA
GetFileTime
WaitForSingleObject
GetTimeFormatA
InitializeCriticalSection
WriteFile
RaiseException
Sections
.text Size: 84KB - Virtual size: 83KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 476KB - Virtual size: 472KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 108KB - Virtual size: 130KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 56KB - Virtual size: 55KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ