Static task
static1
Behavioral task
behavioral1
Sample
d6cb5aedbd8389e9e7ac6f1886ebb1946138abfceaed20e407a597611b4deab2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d6cb5aedbd8389e9e7ac6f1886ebb1946138abfceaed20e407a597611b4deab2.exe
Resource
win10v2004-20221111-en
General
-
Target
d6cb5aedbd8389e9e7ac6f1886ebb1946138abfceaed20e407a597611b4deab2
-
Size
448KB
-
MD5
f3a8f38f57c07e3b89468355d691c068
-
SHA1
27918f0a2201e151f8160f8a4054e7abc83829ad
-
SHA256
d6cb5aedbd8389e9e7ac6f1886ebb1946138abfceaed20e407a597611b4deab2
-
SHA512
b9de5adda21eedfbedd86e533d06341c5d9ce28014497d4b1b18820d5997efca55f1ab794df4d90186f2a9aad34de6939d36690a2de824f9544755f20bb22663
-
SSDEEP
12288:yvIahPlSbZvwTEMSPjZeCm8xdtAEYpjxJlyrPS3V:cXl+NPfPcwrPS3V
Malware Config
Signatures
Files
-
d6cb5aedbd8389e9e7ac6f1886ebb1946138abfceaed20e407a597611b4deab2.exe windows x86
0d113dfe694ad88598b9da05bb90202b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
DeleteObject
GetDeviceCaps
SetTextColor
SelectObject
advapi32
RegSetValueExW
RegOpenKeyExW
RegCreateKeyExW
RegQueryValueExW
kernel32
ResetEvent
VirtualAlloc
Sleep
InterlockedIncrement
VirtualFree
FindResourceW
HeapCreate
IsValidCodePage
CreateProcessA
GetEnvironmentStrings
SetStdHandle
GetVersion
GetModuleHandleW
GlobalLock
GetACP
lstrcpynA
CloseHandle
FindFirstFileA
ReadFile
SetFilePointer
TlsFree
MapViewOfFile
RaiseException
GetCurrentThread
InterlockedCompareExchange
GetCommandLineA
HeapSize
GetCPInfo
GetCommandLineW
LockResource
GetCurrentProcessId
WritePrivateProfileStringA
SizeofResource
FileTimeToLocalFileTime
lstrlenW
GlobalUnlock
GetEnvironmentStringsW
LCMapStringA
lstrlenA
UnmapViewOfFile
LCMapStringW
GetLastError
LeaveCriticalSection
HeapAlloc
CreateFileA
TlsSetValue
GetFileType
CreateEventA
CreateFileW
GetTimeZoneInformation
ExpandEnvironmentStringsA
FindFirstFileW
CompareStringA
GlobalFree
FindNextFileW
WriteFile
CompareStringW
GetProcessHeap
GetSystemInfo
WaitForMultipleObjects
SetEvent
GetWindowsDirectoryA
DeleteFileA
CreateDirectoryA
GetFileSize
GetStartupInfoA
LoadLibraryA
GetVersionExA
TlsAlloc
GetTickCount
QueryPerformanceCounter
FreeLibrary
LoadLibraryW
SetHandleCount
EnterCriticalSection
HeapFree
GetProcAddress
GetCurrentThreadId
SetEndOfFile
GlobalAlloc
WriteConsoleA
TerminateProcess
MulDiv
SetUnhandledExceptionFilter
CreateThread
GetModuleHandleA
CreateMutexA
MultiByteToWideChar
UnhandledExceptionFilter
GetModuleFileNameA
FlushFileBuffers
ExitProcess
IsDebuggerPresent
GetModuleFileNameW
TlsGetValue
SetLastError
OutputDebugStringA
InterlockedDecrement
FindClose
LoadResource
InitializeCriticalSection
LocalFree
GetOEMCP
SetFileAttributesA
GetStringTypeW
HeapReAlloc
GetSystemTimeAsFileTime
InterlockedExchange
GetStringTypeA
WideCharToMultiByte
GetTempPathA
FreeEnvironmentStringsW
LoadLibraryExW
LocalAlloc
GetLocaleInfoA
GetCurrentProcess
DeleteCriticalSection
FreeEnvironmentStringsA
GetFileAttributesW
HeapDestroy
GetDriveTypeA
WaitForSingleObject
GetFileAttributesA
FileTimeToSystemTime
ReleaseMutex
GetConsoleOutputCP
GetStdHandle
GetEnvironmentVariableA
RtlUnwind
user32
SetCursor
CallWindowProcA
IsWindowVisible
GetSysColor
MessageBoxA
GetFocus
EndDialog
GetDesktopWindow
LoadCursorA
GetDlgItem
SetTimer
GetSubMenu
CheckMenuItem
SetWindowLongA
PostMessageA
IsIconic
GetSystemMetrics
BeginPaint
SetFocus
EndPaint
FillRect
CreateWindowExA
GetWindowLongA
EnableMenuItem
LoadStringA
TranslateMessage
PeekMessageA
SetCapture
ShowWindow
UpdateWindow
GetParent
GetMessageA
DestroyWindow
GetClientRect
ReleaseDC
DispatchMessageW
DispatchMessageA
SetWindowPos
PostQuitMessage
SetForegroundWindow
Sections
.text Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 405KB - Virtual size: 404KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 21KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 704B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ