Static task
static1
Behavioral task
behavioral1
Sample
d8399037a46dfbb5b75862b59819bc24aa76fb7647decf5f435975d8de3a68cd.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d8399037a46dfbb5b75862b59819bc24aa76fb7647decf5f435975d8de3a68cd.exe
Resource
win10v2004-20221111-en
General
-
Target
d8399037a46dfbb5b75862b59819bc24aa76fb7647decf5f435975d8de3a68cd
-
Size
1003KB
-
MD5
48decc1fb2625ad971a2cfaf8284b39f
-
SHA1
3b754adfb23bc05e4bf4dbb74d67f835d6f8a1eb
-
SHA256
d8399037a46dfbb5b75862b59819bc24aa76fb7647decf5f435975d8de3a68cd
-
SHA512
a08d3b82a1a58afc48c8c96b5dfa290dcdf755eaccf131dc597e9c97ae0b8ae4a50c3a5b8e121767b6892194e3450289ecdfafa758928dabcac301fb1fb06d65
-
SSDEEP
24576:e77C4Gu8Cszgtpt2M7P27YlTXBUj8IsGjaxnkARnhkHb/DU13A9xFAmHq:+XOgRT7O7YlTXOjsGj4nkARhk7/I13Ac
Malware Config
Signatures
Files
-
d8399037a46dfbb5b75862b59819bc24aa76fb7647decf5f435975d8de3a68cd.exe windows x86
0f38a2c7bd8622cfe143a1b9eb49e354
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindFirstFileA
GetDiskFreeSpaceA
GetModuleHandleA
lstrlenW
RemoveDirectoryA
DeleteFileA
CloseHandle
SetFileTime
CreateFileA
SetFileAttributesA
GetTempPathA
GetWindowsDirectoryA
GetSystemDirectoryA
EnterCriticalSection
LeaveCriticalSection
FlushInstructionCache
GetCurrentProcess
HeapFree
GetProcessHeap
HeapAlloc
FormatMessageA
GetCurrentThreadId
FindNextFileA
ReadFile
GetFileSize
lstrcmpiA
GetSystemDefaultLangID
SetLastError
GetModuleFileNameA
CompareStringA
GetFileAttributesA
WaitForSingleObject
GetTickCount
GetExitCodeProcess
CreateProcessA
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
RtlUnwind
GetCommandLineA
GetStartupInfoA
HeapReAlloc
HeapSize
FindClose
GetLastError
CreateDirectoryA
LoadLibraryA
GetProcAddress
FreeLibrary
MultiByteToWideChar
OutputDebugStringA
DebugBreak
InterlockedIncrement
InterlockedDecrement
lstrcmpA
GetStringTypeExA
lstrlenA
ExitProcess
DeleteCriticalSection
InitializeCriticalSection
VirtualQuery
RaiseException
WideCharToMultiByte
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
WriteFile
InterlockedExchange
user32
MapWindowPoints
SetWindowPos
IsWindow
MessageBoxA
SetDlgItemTextA
SendDlgItemMessageA
GetDlgItemTextA
CheckDlgButton
KillTimer
SetTimer
SystemParametersInfoA
ShowWindow
GetClientRect
LoadImageA
GetWindowLongA
SetWindowLongA
SendMessageA
EndDialog
GetDlgItem
LoadCursorA
SetCursor
GetWindowRect
MsgWaitForMultipleObjects
CharUpperA
RedrawWindow
GetDesktopWindow
UnregisterClassA
LoadStringA
CharNextA
wvsprintfA
DispatchMessageA
TranslateMessage
InvalidateRect
DestroyCursor
EnumChildWindows
DialogBoxParamA
GetSystemMetrics
GetDlgCtrlID
FillRect
GetWindowTextLengthA
GetWindowTextA
wsprintfA
GetSysColorBrush
EnableWindow
GetParent
SetWindowTextA
GetWindow
PeekMessageA
IsDlgButtonChecked
gdi32
CreateSolidBrush
DeleteObject
CreateCompatibleDC
SelectObject
BitBlt
DeleteDC
GetObjectA
CreateFontIndirectA
SetBkMode
SetTextColor
AddFontResourceA
CreateDIBSection
GetStockObject
advapi32
RegOpenKeyExA
OpenSCManagerA
CreateServiceW
CloseServiceHandle
RegCloseKey
RegQueryValueExA
RegCreateKeyExA
RegSetValueExA
shell32
SHGetSpecialFolderLocation
SHBrowseForFolderA
SHGetPathFromIDListA
SHGetMalloc
ShellExecuteExA
ole32
OleUninitialize
StringFromGUID2
CLSIDFromProgID
CoCreateInstance
OleInitialize
oleaut32
SysStringLen
LoadTypeLi
RegisterTypeLi
SysAllocString
VariantClear
VariantInit
VariantCopy
VariantChangeType
VariantCopyInd
SysAllocStringLen
SysStringByteLen
SysAllocStringByteLen
SysFreeString
BstrFromVector
comctl32
ord17
Sections
.text Size: 47KB - Virtual size: 47KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ