Static task
static1
Behavioral task
behavioral1
Sample
d238a0a5720b42dfca157b862c38f7ea35fd68f827678178ec48a3659d9a65c1.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d238a0a5720b42dfca157b862c38f7ea35fd68f827678178ec48a3659d9a65c1.exe
Resource
win10v2004-20221111-en
General
-
Target
d238a0a5720b42dfca157b862c38f7ea35fd68f827678178ec48a3659d9a65c1
-
Size
550KB
-
MD5
566aa286496435c9a25aa336530cf8c9
-
SHA1
8177e7585c654acee68186122d0a5f5d7ff88cbb
-
SHA256
d238a0a5720b42dfca157b862c38f7ea35fd68f827678178ec48a3659d9a65c1
-
SHA512
6c8323e79b32e5ce659d2b2e512c26799b47d72ac7858292b8599afdacac50e88210336913a72777b32d3eebecb19af19ba629ec905b573a9c87b04d7418f481
-
SSDEEP
6144:ZfadT/YxDHQLqblYoN142abDHHtvtg4YHKGSF+79VxDl+7D3SDTlhBZY/E2jXo+Y:ZYYoqyp2MBO4G8+79VP+/qO/V7xjrFi
Malware Config
Signatures
Files
-
d238a0a5720b42dfca157b862c38f7ea35fd68f827678178ec48a3659d9a65c1.exe windows x86
5504449bbf77050267774efcc7d8df4d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
InitCommonControlsEx
advapi32
CryptSetProviderA
RegQueryInfoKeyW
CryptVerifySignatureW
RegCreateKeyW
LogonUserA
RegCreateKeyExW
CryptHashSessionKey
kernel32
ReadFile
VirtualProtect
GetModuleHandleA
HeapFree
LCMapStringA
MultiByteToWideChar
EnumSystemLocalesA
DeleteCriticalSection
FreeEnvironmentStringsW
GetTickCount
FindNextFileW
GetLocaleInfoW
GetConsoleCursorInfo
GetDateFormatA
ExitProcess
GetCompressedFileSizeA
GetTimeFormatA
GetEnvironmentStringsW
CreateMutexA
TlsGetValue
FreeEnvironmentStringsA
GetFileType
GetCurrentProcessId
FillConsoleOutputCharacterA
GetStringTypeW
QueryPerformanceCounter
GetCurrentThreadId
VirtualLock
CompareStringW
IsBadWritePtr
RtlUnwind
SetConsoleCP
GetLocaleInfoA
IsValidLocale
HeapAlloc
HeapCreate
GetProcessShutdownParameters
IsValidCodePage
VirtualQuery
WriteFile
OpenMutexA
SetFilePointer
FlushFileBuffers
TlsAlloc
HeapDestroy
GetModuleFileNameA
HeapSize
GetEnvironmentStrings
TerminateThread
SetStdHandle
GetProcAddress
VirtualAlloc
GlobalHandle
GetSystemTimeAsFileTime
GetCPInfo
WideCharToMultiByte
SetHandleCount
GetSystemInfo
HeapReAlloc
CompareStringA
TerminateProcess
GetStdHandle
GetVersionExA
VirtualFree
CloseHandle
FormatMessageA
TlsSetValue
GetCurrentProcess
CreateSemaphoreA
GetCommandLineA
GetTimeZoneInformation
LCMapStringW
SetConsoleMode
TlsFree
UnhandledExceptionFilter
MoveFileExW
LoadLibraryA
GetACP
SetEnvironmentVariableA
LeaveCriticalSection
GetStartupInfoA
GetOEMCP
SetLastError
FindFirstFileW
EnterCriticalSection
GetCurrentThread
GetStringTypeA
InterlockedExchange
GetLastError
InitializeCriticalSection
GetUserDefaultLCID
comdlg32
ChooseColorA
ReplaceTextA
FindTextA
PrintDlgW
shell32
ShellExecuteExW
gdi32
GetTextCharset
CreateFontW
CreateDIBPatternBrush
GetKerningPairs
GetTextExtentPointA
GetTextMetricsA
StartPage
GdiPlayDCScript
OffsetWindowOrgEx
SetICMProfileW
ColorCorrectPalette
GetKerningPairsW
CreatePatternBrush
StretchBlt
GetTextAlign
CopyEnhMetaFileW
Ellipse
GetCharABCWidthsFloatW
PlayEnhMetaFileRecord
GetTextExtentExPointW
CloseMetaFile
GetObjectW
CreateMetaFileA
user32
GetMenuStringW
RegisterClassA
SetActiveWindow
CharToOemW
RegisterDeviceNotificationW
SetWindowTextW
EndPaint
RegisterClassExA
PostThreadMessageA
SetCaretBlinkTime
OemKeyScan
DefWindowProcA
InflateRect
EnumPropsW
FlashWindowEx
IsMenu
GetWindowWord
ToAscii
LoadCursorA
TileChildWindows
CreateWindowExW
WaitForInputIdle
Sections
.text Size: 177KB - Virtual size: 177KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 9KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 356KB - Virtual size: 356KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ