Static task
static1
Behavioral task
behavioral1
Sample
81fd98e061a9fe2dcc1894fcd9cfeb24ca70a958829f263d6c60618b1b2431cc.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
81fd98e061a9fe2dcc1894fcd9cfeb24ca70a958829f263d6c60618b1b2431cc.exe
Resource
win10v2004-20220812-en
General
-
Target
81fd98e061a9fe2dcc1894fcd9cfeb24ca70a958829f263d6c60618b1b2431cc
-
Size
696KB
-
MD5
133105c17861dd032a5494202693bbe0
-
SHA1
b8c02d10721053f2185bbc6b82694ab145902649
-
SHA256
81fd98e061a9fe2dcc1894fcd9cfeb24ca70a958829f263d6c60618b1b2431cc
-
SHA512
4b2b0ef49237cc35e2b47690c78ec2614bd91ce5778a154f05b16a8ab89b9d116f766205e02f14132e8972e4b67d6a5c45007957495cc4ecbd799f33e4193069
-
SSDEEP
12288:kf+BKohyg83yy9dFaySb/zEf2qSbBSZ5qumO3524JfubMx1x8NAUNYDXHef1dGGc:a3egrM5bzbYZxmO3524JWDAU+LH6G
Malware Config
Signatures
Files
-
81fd98e061a9fe2dcc1894fcd9cfeb24ca70a958829f263d6c60618b1b2431cc.exe windows x86
e9ce2c8aff23c3563babe7f1bb1f3cd7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateMutexW
GetModuleHandleW
GetStartupInfoA
HeapDestroy
SetStdHandle
GetCurrentProcess
WriteFile
VirtualFree
SetHandleCount
SetEnvironmentVariableA
ExitProcess
HeapCreate
MultiByteToWideChar
TlsGetValue
GetFileType
InterlockedIncrement
LeaveCriticalSection
GetModuleHandleA
SetUnhandledExceptionFilter
HeapAlloc
FlushFileBuffers
GetModuleFileNameA
SetFilePointer
GetLastError
GetCPInfo
RtlUnwind
QueryPerformanceCounter
GetEnvironmentStringsW
GetCommandLineA
VirtualQuery
GetStringTypeA
LoadLibraryW
DeleteCriticalSection
WideCharToMultiByte
VirtualAlloc
GetCurrentThreadId
GetModuleFileNameW
GetTickCount
GetSystemTimeAsFileTime
LCMapStringW
FreeEnvironmentStringsA
GetTimeZoneInformation
GetStdHandle
TerminateProcess
TlsAlloc
GetStringTypeW
ReadFile
HeapReAlloc
IsBadCodePtr
GetCommandLineW
GetProcAddress
GetVersion
TlsSetValue
SetLastError
EnterCriticalSection
GetLocalTime
LoadLibraryA
InterlockedExchange
CompareStringA
GetEnvironmentStrings
InterlockedDecrement
GetCurrentProcessId
InitializeCriticalSection
CompareStringW
CloseHandle
GetSystemTime
UnhandledExceptionFilter
RaiseException
GetStartupInfoW
FreeEnvironmentStringsW
HeapFree
LCMapStringA
user32
GetScrollInfo
UpdateWindow
GetWindow
GetScrollPos
CreateMenu
UnhookWindowsHookEx
WindowFromPoint
GetDlgItem
GetMenuItemCount
LoadImageW
InflateRect
GetSystemMenu
GetClientRect
GetMenu
LoadBitmapW
GetForegroundWindow
EnableWindow
IsIconic
IsMenu
IsWindow
EqualRect
SetTimer
DestroyWindow
GetDesktopWindow
RegisterClassExW
RegisterClassW
MessageBoxW
SetMenu
SetWindowRgn
GetParent
GetMessagePos
OpenClipboard
GetMenuItemID
MessageBeep
GetNextDlgTabItem
GetFocus
ShowScrollBar
GetNextDlgGroupItem
GetWindowTextW
DefWindowProcW
InvalidateRect
GetActiveWindow
DrawFrameControl
MoveWindow
EndDialog
CreateWindowExW
CopyIcon
ShowWindow
PostQuitMessage
SendDlgItemMessageA
SetCapture
CallNextHookEx
DragDetect
KillTimer
EmptyClipboard
DestroyMenu
GetKeyState
GetMenuState
GetLastActivePopup
DestroyIcon
LoadStringW
SetRect
LoadAcceleratorsW
GetCursorPos
GetMessageW
IntersectRect
SetFocus
OffsetRect
SetWindowPlacement
DrawEdge
IsClipboardFormatAvailable
DestroyCursor
SetWindowPos
BringWindowToTop
DrawIconEx
TranslateMessage
LoadCursorW
GetSysColorBrush
DeleteMenu
PeekMessageW
CreatePopupMenu
GetSysColor
SetCursor
GetCapture
TrackPopupMenuEx
IsWindowVisible
ClientToScreen
UnregisterClassA
GetClipboardData
shlwapi
PathIsUNCA
PathFileExistsA
PathFindFileNameA
PathIsDirectoryA
PathSkipRootA
PathAppendA
PathAddBackslashA
PathStripToRootA
PathFindExtensionA
gdi32
PolyBezier
CreateMetaFileA
CreateICA
CreatePenIndirect
ResetDCA
CloseMetaFile
CreatePatternBrush
SetMapMode
SetWindowExtEx
SetArcDirection
SetTextJustification
GetObjectType
SetTextAlign
OffsetRgn
SetBkColor
OffsetClipRgn
PolylineTo
RealizePalette
SetRectRgn
GetGlyphOutlineA
CreateEllipticRgnIndirect
UpdateColors
CreateRoundRectRgn
CreateFontA
winmm
waveOutOpen
waveOutWrite
timeGetTime
waveOutClose
waveOutPrepareHeader
oleaut32
LoadTypeLi
advapi32
RegDeleteKeyA
RegEnumValueA
RegDeleteValueA
RegOpenKeyA
CryptDecrypt
RegOpenKeyExA
RegCloseKey
CryptEncrypt
RegCreateKeyExA
RegQueryValueExA
RegEnumKeyExA
SetFileSecurityA
RegEnumKeyA
shell32
SHGetMalloc
ord155
SHGetDesktopFolder
SHGetPathFromIDListW
Sections
.text Size: 76KB - Virtual size: 72KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 460KB - Virtual size: 457KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 116KB - Virtual size: 113KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 40KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ