Static task
static1
Behavioral task
behavioral1
Sample
ddf86cff6cb1c5f5ab88286f1045e365c07a3fd861f18656cccbe3279da61bc4.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ddf86cff6cb1c5f5ab88286f1045e365c07a3fd861f18656cccbe3279da61bc4.exe
Resource
win10v2004-20221111-en
General
-
Target
ddf86cff6cb1c5f5ab88286f1045e365c07a3fd861f18656cccbe3279da61bc4
-
Size
184KB
-
MD5
2d1e4779508999c1be1a067abcabf8e9
-
SHA1
281332625a3f1d0d10461aa9af0f96b90857b38d
-
SHA256
ddf86cff6cb1c5f5ab88286f1045e365c07a3fd861f18656cccbe3279da61bc4
-
SHA512
21ce0486ff46b0be7219ff0a209a43651cdf69a6463b400392f5e8d25d494acee2701f2b2a7b6ebf577112041f849d8dfa7961187f952617ce358c5374bbd267
-
SSDEEP
3072:TbGb+uZ6OQ0BdnryunG4ftnY1imi8dKtZ2Kg9fo9Ca26Qf:fO1Z6EryuG41nY1iRZ21V
Malware Config
Signatures
Files
-
ddf86cff6cb1c5f5ab88286f1045e365c07a3fd861f18656cccbe3279da61bc4.exe windows x86
442ca9fd1b8a4542427d1ba91fb651dc
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalAddAtomA
GlobalGetAtomNameA
FreeLibrary
GetProcessVersion
GetCPInfo
GetOEMCP
RtlUnwind
GetTimeZoneInformation
GetSystemTime
GetLocalTime
ExitProcess
TerminateProcess
HeapAlloc
HeapFree
GetACP
SetStdHandle
GetFileType
RaiseException
HeapReAlloc
HeapSize
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GlobalFindAtomA
SetHandleCount
GetStdHandle
GetStartupInfoA
GetEnvironmentVariableA
HeapDestroy
HeapCreate
VirtualFree
LCMapStringA
LCMapStringW
VirtualAlloc
IsBadWritePtr
GetStringTypeA
GetStringTypeW
GetDriveTypeA
Sleep
SetUnhandledExceptionFilter
IsBadReadPtr
IsBadCodePtr
CompareStringA
CompareStringW
SetEnvironmentVariableA
GetVersion
GetCurrentDirectoryA
GlobalFlags
TlsGetValue
LocalReAlloc
TlsSetValue
GlobalReAlloc
GlobalHandle
GlobalUnlock
GlobalFree
TlsAlloc
LocalAlloc
GetFileTime
GetFileSize
GetFullPathNameA
GetVolumeInformationA
LoadLibraryA
GetProcAddress
SetEndOfFile
UnlockFile
LockFile
CloseHandle
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
CreateFileA
GetCurrentProcess
DuplicateHandle
InterlockedExchange
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
lstrcpynA
lstrcatA
SetErrorMode
GlobalLock
GlobalAlloc
GlobalDeleteAtom
lstrcmpA
lstrcmpiA
GetCurrentThread
GetCurrentThreadId
FileTimeToLocalFileTime
FileTimeToSystemTime
FindNextFileA
lstrcpyA
FindFirstFileA
GetLastError
SetLastError
FindClose
LocalFree
WideCharToMultiByte
InterlockedDecrement
InterlockedIncrement
GetCommandLineA
GetModuleHandleA
GetVersionExA
GetTempPathA
DeleteFileA
CopyFileA
GetShortPathNameA
WaitForSingleObject
WinExec
GetFileAttributesA
SetFileAttributesA
MultiByteToWideChar
lstrlenA
WritePrivateProfileStringA
GetModuleFileNameA
GetEnvironmentStringsW
GetSystemDirectoryA
user32
CopyRect
GetClientRect
AdjustWindowRectEx
SetFocus
GetSysColor
MapWindowPoints
LoadIconA
ShowWindow
LoadCursorA
GetSysColorBrush
DestroyMenu
GetClassInfoA
RegisterClassA
GetMenu
GetSubMenu
GetMenuItemID
GetDlgItem
DestroyWindow
CreateWindowExA
GetClassLongA
SetPropA
GetPropA
CallWindowProcA
GetTopWindow
DefWindowProcA
GetMessageTime
GetMessagePos
GetForegroundWindow
SetForegroundWindow
SetWindowLongA
SetWindowPos
RegisterWindowMessageA
SystemParametersInfoA
IsIconic
GetWindowPlacement
GrayStringA
DrawTextA
TabbedTextOutA
ReleaseDC
GetDC
GetMenuItemCount
UnhookWindowsHookEx
GetLastActivePopup
IsWindowEnabled
EnableWindow
GetWindowTextA
SetWindowTextA
ClientToScreen
GetWindow
GetDlgCtrlID
GetWindowRect
PtInRect
GetWindowLongA
GetClassNameA
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetParent
GetNextDlgTabItem
SetCursor
GetCapture
RemovePropA
WinHelpA
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
SendMessageA
GetKeyState
CallNextHookEx
ValidateRect
IsWindowVisible
PeekMessageA
GetCursorPos
SetWindowsHookExA
GetSystemMetrics
CharUpperA
LoadStringA
PostMessageA
PostQuitMessage
wsprintfA
MessageBoxA
gdi32
SetWindowExtEx
ScaleWindowExtEx
GetClipBox
GetDeviceCaps
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
GetObjectA
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
SetTextColor
SetBkColor
GetStockObject
SelectObject
RestoreDC
SaveDC
DeleteDC
CreateBitmap
DeleteObject
comdlg32
GetFileTitleA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
RegCreateKeyExA
AllocateAndInitializeSid
RegDeleteKeyA
RegEnumKeyExA
InitializeAcl
LookupAccountNameA
AddAccessAllowedAce
SetNamedSecurityInfoA
RegSetValueExA
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
shell32
ShellExecuteExA
comctl32
ord17
ole32
CoInitialize
CoCreateInstance
CoUninitialize
Sections
.text Size: 128KB - Virtual size: 124KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 160B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ