Static task
static1
Behavioral task
behavioral1
Sample
d22145d78c7544960e6f50935abb9a8b7498686b2820c5f9aab0cda3ef5a659f.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
d22145d78c7544960e6f50935abb9a8b7498686b2820c5f9aab0cda3ef5a659f.exe
Resource
win10v2004-20221111-en
General
-
Target
d22145d78c7544960e6f50935abb9a8b7498686b2820c5f9aab0cda3ef5a659f
-
Size
445KB
-
MD5
7ae27281b8a2fe2ed9a3764e1c2150b0
-
SHA1
8ae1f63479f5a61dcb614365230647e4534412af
-
SHA256
d22145d78c7544960e6f50935abb9a8b7498686b2820c5f9aab0cda3ef5a659f
-
SHA512
ca33523fe7d194171e3740c3a7d33f6d15285356efb14857cd6f88f0db91f330bb13bbdb18e9e7e856c82f263ab4779a090a0c551b93b82ae03ac5da82d09b19
-
SSDEEP
6144:JbQUQ+5wnMQkiQN/SpRsYjVk3v4vpfaj83QrFIAgUeX1RN8/eO:JbQX+5wnMQkiQN/SpRssCLgg+BUeX5O
Malware Config
Signatures
Files
-
d22145d78c7544960e6f50935abb9a8b7498686b2820c5f9aab0cda3ef5a659f.exe windows x86
b7051968fabf619415fcbb21d5799253
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegCloseKey
RegCreateKeyExA
RegDeleteValueA
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
shell32
ShellExecuteA
gdi32
CreateFontIndirectA
DeleteObject
GetObjectA
GetStockObject
SetBkColor
SetTextColor
user32
CharUpperBuffA
CreateCursor
CreateWindowExA
CreateWindowExW
DefWindowProcA
DestroyCursor
DestroyWindow
DispatchMessageA
EnableWindow
FindWindowExA
GetClassLongA
GetClientRect
GetDesktopWindow
GetDlgItem
GetMessageA
GetParent
GetWindowLongA
GetWindowRect
GetWindowWord
LoadCursorA
LoadIconA
MessageBoxA
MessageBoxW
PeekMessageA
PostMessageA
PostQuitMessage
RegisterClassA
SendDlgItemMessageA
SendMessageA
SendMessageW
SetWindowLongA
SetWindowPos
SetWindowTextA
SetWindowWord
TranslateMessage
wsprintfA
wvsprintfA
wvsprintfW
kernel32
CloseHandle
CopyFileA
CreateDirectoryA
CreateEventA
CreateFileA
CreateSemaphoreA
CreateThread
DeleteCriticalSection
DeleteFileA
DosDateTimeToFileTime
EnterCriticalSection
ExitProcess
ExitThread
FileTimeToDosDateTime
FileTimeToLocalFileTime
FindClose
FindFirstFileA
FindNextFileA
FindResourceA
FlushFileBuffers
GetACP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetCurrentDirectoryA
GetCurrentProcessId
GetCurrentThread
GetCurrentThreadId
GetDriveTypeA
GetEnvironmentStrings
GetFileAttributesA
GetFileSize
GetFileType
GetFullPathNameA
GetLastError
GetLocalTime
GetModuleFileNameA
GetModuleFileNameW
GetModuleHandleA
GetOEMCP
GetPrivateProfileIntA
GetPrivateProfileStringA
GetProcAddress
GetStdHandle
GetTickCount
GetTimeZoneInformation
GetVersion
InitializeCriticalSection
LeaveCriticalSection
LoadLibraryA
LoadResource
LocalAlloc
LocalFileTimeToFileTime
LocalFree
LockResource
MoveFileA
MultiByteToWideChar
ReadFile
ReleaseSemaphore
SetConsoleCtrlHandler
SetEnvironmentVariableA
SetEnvironmentVariableW
SetEvent
SetFilePointer
SetLastError
SetStdHandle
SetUnhandledExceptionFilter
SizeofResource
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
VirtualQuery
WaitForSingleObject
WideCharToMultiByte
WriteFile
wsock32
WSACleanup
WSAStartup
listen
bind
socket
htons
ntohs
getservbyname
inet_ntoa
WSAAsyncSelect
accept
closesocket
shutdown
inet_addr
send
recv
select
Sections
.text Size: 125KB - Virtual size: 128KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 254KB - Virtual size: 256KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: - Virtual size: 1.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 60KB - Virtual size: 64KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE