Static task
static1
Behavioral task
behavioral1
Sample
d0775f6f48a3d7209ca33c5401ce4b2d624c9053a388b10027fd9e1a29a5cd9a.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
d0775f6f48a3d7209ca33c5401ce4b2d624c9053a388b10027fd9e1a29a5cd9a.exe
Resource
win10v2004-20220812-en
General
-
Target
d0775f6f48a3d7209ca33c5401ce4b2d624c9053a388b10027fd9e1a29a5cd9a
-
Size
550KB
-
MD5
2c67b49bfaf648c287f083b4c2caf94e
-
SHA1
161dfd3902890418c09baf5db222a6c48a93aaae
-
SHA256
d0775f6f48a3d7209ca33c5401ce4b2d624c9053a388b10027fd9e1a29a5cd9a
-
SHA512
a0de7065e34ffe1a0599bccefe567318a5c2c25a45901d69248a5c0ee736cd3b9775183c01d01943bfbb8a3fc7892dd0a55ef7f5505fba9809eaefafa52b156f
-
SSDEEP
12288:KCqXcXLpKAlp/Owg5WVJpsn8H1/V3Um/dpOKiyeys:W6fdg5Wth9UpJvys
Malware Config
Signatures
Files
-
d0775f6f48a3d7209ca33c5401ce4b2d624c9053a388b10027fd9e1a29a5cd9a.exe windows x86
1562507a2e69fc6c153fe5b396f4f810
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreatePipe
PurgeComm
ReadDirectoryChangesW
GetWindowsDirectoryA
GetVolumeInformationW
GetPrivateProfileStringW
lstrcmpA
VirtualQuery
CreateDirectoryA
FreeEnvironmentStringsA
FatalAppExitA
GetAtomNameA
EndUpdateResourceA
GetHandleInformation
GetDriveTypeW
VirtualFree
VirtualUnlock
VirtualQueryEx
LocalReAlloc
GetTempFileNameA
GetTapeStatus
SetConsoleWindowInfo
GetTimeZoneInformation
ExitThread
GlobalFree
CompareStringA
GetBinaryTypeW
SetCurrentDirectoryA
GetEnvironmentStringsW
DuplicateHandle
GlobalFlags
GlobalDeleteAtom
IsProcessorFeaturePresent
GetFileType
GlobalReAlloc
GetDriveTypeA
PulseEvent
DosDateTimeToFileTime
GetFullPathNameA
GetDiskFreeSpaceW
VirtualLock
GetNumberFormatW
GetProfileStringA
SetErrorMode
SetConsoleCursorPosition
TlsGetValue
WaitNamedPipeA
FreeLibraryAndExitThread
ClearCommBreak
lstrcmpiW
GlobalFindAtomA
GetPrivateProfileStringA
GetSystemDefaultLangID
CreateMutexA
SetProcessAffinityMask
GetCommConfig
CreateProcessA
SwitchToFiber
SetProcessShutdownParameters
VirtualProtect
MoveFileExA
ExitProcess
user32
SetWindowTextA
IsChild
UnionRect
ShowCursor
CreateDialogParamA
FlashWindow
SetScrollPos
OpenInputDesktop
TrackPopupMenu
LoadCursorA
TranslateMDISysAccel
WinHelpA
CallWindowProcW
ToUnicode
CharToOemBuffA
SetPropW
GetScrollBarInfo
GetClassLongW
GetForegroundWindow
CheckRadioButton
SetCapture
CascadeWindows
MonitorFromWindow
MessageBoxExA
GetMonitorInfoW
FindWindowW
AttachThreadInput
SetRect
SwitchDesktop
GetWindowThreadProcessId
GetKeyboardLayoutNameW
DestroyWindow
CreateDialogIndirectParamA
CharNextExA
IsRectEmpty
OemToCharBuffA
CreateMenu
IsZoomed
GetMessageW
LoadMenuW
ReleaseCapture
EnumWindows
DispatchMessageA
LoadIconA
DrawStateA
gdi32
CopyEnhMetaFileA
CreateHalftonePalette
SetColorAdjustment
CreatePen
GetObjectA
ExtCreateRegion
IntersectClipRect
SetPixel
SetPixelFormat
CreateDIBSection
CreateICA
comdlg32
GetFileTitleA
advapi32
SetThreadToken
RegEnumKeyExA
IsValidSid
CryptGetUserKey
shell32
SHGetSpecialFolderPathW
ole32
OleQueryLinkFromData
IIDFromString
OleCreateFromData
WriteClassStg
oleaut32
SafeArrayCreate
SysFreeString
SysAllocStringLen
VariantCopy
SafeArrayRedim
SafeArrayGetLBound
Sections
.text Size: 4KB - Virtual size: 194KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 240KB - Virtual size: 238KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ