Static task
static1
Behavioral task
behavioral1
Sample
db0f00f1fa27c4a4443d69e831cd7816480dbbf37e8022b0ff517fab78ab256f.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
db0f00f1fa27c4a4443d69e831cd7816480dbbf37e8022b0ff517fab78ab256f.exe
Resource
win10v2004-20221111-en
General
-
Target
db0f00f1fa27c4a4443d69e831cd7816480dbbf37e8022b0ff517fab78ab256f
-
Size
231KB
-
MD5
df5fcf3b3193a11cf01694e074ef268a
-
SHA1
b72f4b139eb72506a0ae79106d7815dbbbccf9b5
-
SHA256
db0f00f1fa27c4a4443d69e831cd7816480dbbf37e8022b0ff517fab78ab256f
-
SHA512
0546e1ba0eb6cae6730fe7f7aa27c370bea3396b0317f6a59d5cda49373472ea7a57eb2c1483d4d1c72d431995f12d72a859fd18831d939084a6fb2172886ac3
-
SSDEEP
3072:83BtDM4fiQoCMqdeIyANfb6YP7i0nBcM4hssXFKm2LRMiJeLPMx:8I4KQf+iz6YO0BG/ax+
Malware Config
Signatures
Files
-
db0f00f1fa27c4a4443d69e831cd7816480dbbf37e8022b0ff517fab78ab256f.exe windows x86
aa2bd3fda340f8cb31ff786aae301b8e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
DefWindowProcW
DispatchMessageW
EnumDisplayDevicesW
EnumDisplaySettingsW
EqualRect
ExitWindowsEx
FindWindowExW
FindWindowW
GetClassNameW
GetCursorPos
GetDC
GetDesktopWindow
GetForegroundWindow
GetLastInputInfo
GetMessageW
ChangeDisplaySettingsExW
GetSystemMetrics
GetThreadDesktop
GetTopWindow
GetUserObjectInformationW
GetWindow
GetWindowRect
GetWindowThreadProcessId
IntersectRect
InvalidateRect
IsRectEmpty
KillTimer
MonitorFromWindow
OpenDesktopW
OpenInputDesktop
OpenWindowStationW
PostMessageW
PostQuitMessage
PostThreadMessageW
RegisterClassExW
RegisterDeviceNotificationW
ReleaseDC
SendMessageW
SetCursorPos
SetProcessWindowStation
SetThreadDesktop
SetTimer
SetWindowPos
SubtractRect
SystemParametersInfoW
CloseDesktop
CloseWindow
TranslateMessage
UnregisterDeviceNotification
wsprintfW
CreateWindowExW
kernel32
CreateThread
DeleteCriticalSection
DisableThreadLibraryCalls
EnterCriticalSection
FindResourceW
FreeLibrary
GetACP
GetCurrentProcess
GetCurrentProcessId
GetCurrentThread
GetCurrentThreadId
GetLastError
GetLocaleInfoA
GetModuleFileNameA
GetModuleFileNameW
GetModuleHandleExW
GetSystemInfo
GetSystemTimeAsFileTime
GetThreadLocale
GetTickCount
GetVersion
GetVersionExA
GetVersionExW
CloseHandle
InitializeCriticalSection
InitializeCriticalSectionAndSpinCount
InterlockedCompareExchange
InterlockedDecrement
InterlockedExchange
InterlockedIncrement
IsBadReadPtr
LeaveCriticalSection
LoadLibraryExW
LoadResource
MapViewOfFile
MultiByteToWideChar
QueryPerformanceCounter
RaiseException
CreateEventW
SetEvent
CreateFileMappingA
SetUnhandledExceptionFilter
SizeofResource
TerminateProcess
UnhandledExceptionFilter
UnmapViewOfFile
VirtualAlloc
WaitForMultipleObjects
WaitForSingleObject
lstrcatW
lstrcmpiW
lstrcpyW
lstrcpynW
lstrlenA
lstrlenW
gdi32
AbortDoc
shell32
ShellAboutA
ShellExecuteA
ShellExecuteExA
Shell_NotifyIconA
DragQueryFileA
ExtractAssociatedIconA
ExtractIconA
ExtractIconExA
FindExecutableA
SHBrowseForFolderA
SHFileOperationA
SHGetFileInfoA
SHGetPathFromIDListA
Sections
.text Size: 156KB - Virtual size: 155KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 30KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 17KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 10KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ