Static task
static1
Behavioral task
behavioral1
Sample
37472e9dab9e61841549c36c52e9556131254ded27fc4feb9fedef83142bbf3b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
37472e9dab9e61841549c36c52e9556131254ded27fc4feb9fedef83142bbf3b.exe
Resource
win10v2004-20220812-en
General
-
Target
37472e9dab9e61841549c36c52e9556131254ded27fc4feb9fedef83142bbf3b
-
Size
900KB
-
MD5
b26cc6b42689a4666713de8c7d11cff8
-
SHA1
2feef7e96c7359867d56e9b88efcb9bb23cb173f
-
SHA256
37472e9dab9e61841549c36c52e9556131254ded27fc4feb9fedef83142bbf3b
-
SHA512
37181758604f698d4ffa2adbd3c156781dc945dd8477727fbc7efd254053b261c6ea591d1c8210fb05c73d34854e67642e75e267dd3d3db96541b819a0d24c50
-
SSDEEP
12288:ZG/FDrw4Qu43jF3BxiC73U4hoWngZQQgwTRnXfwOd036U8wcgVHpytDYL+CJzc2Y:ZJuYZicUVlZQ56lvwOM6Uu4pytDG+yvw
Malware Config
Signatures
Files
-
37472e9dab9e61841549c36c52e9556131254ded27fc4feb9fedef83142bbf3b.exe windows x86
1b9f948b0832b6a50d82313cb74fa99e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
ExtFloodFill
PaintRgn
GetTextFaceA
ExtCreatePen
GetPaletteEntries
CreatePolygonRgn
SetTextJustification
SetRectRgn
CreateRoundRectRgn
PlayMetaFile
GetClipRgn
SetBkMode
SetPixel
FlattenPath
DPtoLP
TextOutA
SetBkColor
GetTextExtentPointA
CreateBitmapIndirect
ExtTextOutA
GetPixel
CreateEllipticRgnIndirect
EndPage
EndDoc
SetWindowExtEx
CopyMetaFileA
PolyBezier
CreateHalftonePalette
StartPage
GetWindowExtEx
GetPath
kernel32
QueryPerformanceCounter
GetACP
GetConsoleOutputCP
GetConsoleCP
InterlockedExchange
HeapSize
SetHandleCount
VirtualAlloc
GetProcAddress
GetCurrentThreadId
InitializeCriticalSectionAndSpinCount
TlsSetValue
OutputDebugStringA
GetStringTypeW
VirtualQuery
LocalFree
OutputDebugStringW
GetCommandLineA
GetEnvironmentStringsW
GetTickCount
GetConsoleMode
UnhandledExceptionFilter
IsValidCodePage
DeleteCriticalSection
HeapReAlloc
HeapCreate
LCMapStringW
GetModuleFileNameW
FreeEnvironmentStringsW
InterlockedIncrement
CreateFileA
GetTimeFormatA
FlushFileBuffers
GetCPInfo
WriteConsoleA
RtlUnwind
GetModuleHandleW
CreateMutexA
InterlockedDecrement
WaitForSingleObject
GetLocaleInfoA
SetConsoleCtrlHandler
CompareStringW
LeaveCriticalSection
MultiByteToWideChar
SetStdHandle
CompareStringA
ReadFile
GetDateFormatA
Sleep
SetLastError
VirtualFree
SetEnvironmentVariableA
SetFilePointer
HeapDestroy
GetModuleFileNameA
DebugBreak
TlsGetValue
GetCurrentProcess
InitializeCriticalSection
GetStartupInfoA
HeapAlloc
GetLastError
ExitProcess
TerminateProcess
TlsFree
RaiseException
GetStringTypeA
LoadLibraryW
IsBadReadPtr
GetSystemTimeAsFileTime
WriteFile
GetOEMCP
TlsAlloc
WideCharToMultiByte
WriteConsoleW
GetCurrentProcessId
IsDebuggerPresent
FreeEnvironmentStringsA
GetStdHandle
GetModuleHandleA
CloseHandle
LCMapStringA
EnterCriticalSection
SetUnhandledExceptionFilter
GetFileType
HeapValidate
HeapFree
LoadLibraryA
GetTimeZoneInformation
GetEnvironmentStrings
advapi32
RegSetValueExA
RegOpenKeyA
RegOpenKeyExA
RegQueryValueA
RegCloseKey
RegCreateKeyExA
user32
GetMenuItemInfoA
LoadStringA
SetActiveWindow
CloseClipboard
LoadBitmapA
SetWindowLongA
AppendMenuA
DeferWindowPos
ModifyMenuA
HideCaret
SetCursor
FrameRect
InsertMenuA
IsWindowVisible
GetWindow
ReleaseDC
DrawEdge
CreateWindowExA
GetSysColor
GetWindowTextA
BeginDeferWindowPos
SetDlgItemInt
SetForegroundWindow
GetActiveWindow
EnableWindow
RegisterClassExA
DestroyWindow
EnableMenuItem
ShowWindow
LoadCursorA
CopyIcon
LoadIconA
GetDesktopWindow
RemovePropA
CallWindowProcA
IsWindowUnicode
SetRectEmpty
SetTimer
SendDlgItemMessageA
SetWindowsHookExA
SystemParametersInfoA
SetParent
TrackPopupMenuEx
SetFocus
GetSystemMetrics
GetMenuStringA
SetWindowPos
GetKeyState
PeekMessageA
GetClientRect
GetDC
RegisterClassA
KillTimer
SetClipboardData
FlashWindow
MessageBoxA
IsWindow
ReleaseCapture
MapDialogRect
EndDeferWindowPos
BringWindowToTop
GetScrollPos
UnregisterClassA
TranslateMessage
GetDCEx
TrackPopupMenu
CreateDialogIndirectParamA
UpdateWindow
DefWindowProcA
PostMessageA
InvalidateRect
IsIconic
GetDlgItem
GetCapture
ShowCaret
shlwapi
PathQuoteSpacesA
PathFindExtensionA
PathFindFileNameA
PathIsDirectoryA
shell32
SHGetSpecialFolderLocation
SHGetDesktopFolder
ord155
DragFinish
SHGetSpecialFolderPathA
ShellExecuteA
SHGetMalloc
Shell_NotifyIconA
DragQueryFileA
SHGetPathFromIDListA
SHBrowseForFolderA
SHGetFileInfoA
SHFileOperationA
SHChangeNotify
winspool.drv
ClosePrinter
ord204
DocumentPropertiesA
Sections
.text Size: 224KB - Virtual size: 222KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 504KB - Virtual size: 501KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 108KB - Virtual size: 132KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 84KB - Virtual size: 81KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ