Static task
static1
Behavioral task
behavioral1
Sample
db753b26b58cd3e4bb26827f6b37b1856b532f9c57b0385111b22b2e1f4292fb.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
db753b26b58cd3e4bb26827f6b37b1856b532f9c57b0385111b22b2e1f4292fb.exe
Resource
win10v2004-20221111-en
General
-
Target
db753b26b58cd3e4bb26827f6b37b1856b532f9c57b0385111b22b2e1f4292fb
-
Size
668KB
-
MD5
6d0bc3d5cf3e9a01a52c3ebf765baa8e
-
SHA1
03b0d7d3c9d6d038db22c6dbeb5d5fb3e3e5c356
-
SHA256
db753b26b58cd3e4bb26827f6b37b1856b532f9c57b0385111b22b2e1f4292fb
-
SHA512
aa23402081ab95c907e6e3bd6fa8fca6ac6e063bb5fd2f53525a4ee6e23d749176646cfef958763a324d5427f16c866331137d09349af517f1bc146c57e0ae50
-
SSDEEP
12288:ZYsF1HZCdfPOAdgeMqXDxC7MUDC+NFB8cImVadQNePoqGfGCs5ZgJHP+xA+qt:zF1HZCdHOAClqz07M4zNr85IaiNegfs0
Malware Config
Signatures
Files
-
db753b26b58cd3e4bb26827f6b37b1856b532f9c57b0385111b22b2e1f4292fb.exe windows x86
76cdbccd3d487c05179b2c387ebe0389
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
TranslateMessage
DispatchMessageA
TranslateMDISysAccel
GetWindowLongA
SendMessageA
DrawMenuBar
EnableMenuItem
PostMessageA
WaitMessage
GetMessageA
DefFrameProcA
CreateWindowExA
GetSystemMetrics
GetDC
ReleaseDC
MoveWindow
GetClientRect
BeginPaint
EndPaint
IsWindow
GetKeyState
PostQuitMessage
DestroyMenu
GetSubMenu
GetMenuItemCount
UpdateWindow
InvalidateRect
EnumChildWindows
ShowWindow
SetWindowPos
MessageBoxA
IsZoomed
PtInRect
wsprintfA
GetSystemMenu
DeleteMenu
LoadCursorA
AppendMenuA
SetWindowTextA
SetMenu
IsIconic
GetWindowRect
HideCaret
ShowCaret
InvalidateRgn
ScrollDC
OemToCharA
CreateMenu
GetWindow
RegisterClassA
LoadIconA
GetMenuState
GetMenuItemID
SetMenuItemInfoA
InsertMenuA
CheckMenuItem
GetUpdateRect
IsRectEmpty
IntersectRect
CreateDialogIndirectParamA
IsDialogMessageA
EnableWindow
GetFocus
DestroyWindow
SetDoubleClickTime
ReleaseCapture
SetCapture
SetScrollRange
GetScrollPos
IsClipboardFormatAvailable
SetCursor
GetMenu
EmptyClipboard
SetClipboardData
SetScrollPos
ScrollWindow
RedrawWindow
SetWindowLongA
WinHelpA
DefMDIChildProcA
DefWindowProcA
GetClipboardData
CloseClipboard
OpenClipboard
MessageBeep
PeekMessageA
AttachThreadInput
SetCaretPos
DestroyCaret
CreateCaret
SetFocus
IsWindowVisible
GetMenuItemInfoA
ModifyMenuA
gdi32
StartPage
GetSystemPaletteEntries
GetDIBits
DPtoLP
GetMapMode
StretchDIBits
AbortDoc
SetAbortProc
EndPage
EndDoc
StartDocA
GetPixel
MoveToEx
SetBkMode
LineTo
CreateBitmapIndirect
BitBlt
SetStretchBltMode
GetDeviceCaps
TextOutA
GetPaletteEntries
SetPaletteEntries
SelectPalette
RealizePalette
GetNearestColor
CreatePalette
CreateCompatibleBitmap
SetROP2
SetWindowExtEx
SetViewportExtEx
SetMapMode
SelectClipRgn
SetPixelV
SetPixel
GetStockObject
ExtTextOutA
GetTextMetricsA
SetTextColor
SetBkColor
Rectangle
CreateRectRgn
CreatePen
GetNearestPaletteIndex
GdiFlush
PatBlt
CreateSolidBrush
EnumFontFamiliesA
CreateFontIndirectA
DeleteObject
GetObjectA
StretchBlt
SelectObject
DeleteDC
CreateCompatibleDC
CreateDIBitmap
comdlg32
CommDlgExtendedError
PrintDlgA
GetSaveFileNameA
GetOpenFileNameA
kernel32
InterlockedExchange
SetEnvironmentVariableA
CompareStringW
CompareStringA
GetSystemInfo
VirtualProtect
GetUserDefaultLCID
EnumSystemLocalesA
GetLocaleInfoA
IsValidCodePage
IsValidLocale
GetDateFormatA
GetTimeFormatA
GetOEMCP
GetStringTypeW
GetStringTypeA
VirtualQuery
HeapReAlloc
HeapAlloc
InterlockedIncrement
OutputDebugStringA
InterlockedDecrement
LCMapStringW
LCMapStringA
FatalAppExitA
HeapFree
HeapCreate
HeapDestroy
SetHandleCount
GetEnvironmentStringsW
WideCharToMultiByte
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetFileAttributesA
SetStdHandle
RtlUnwind
ExitProcess
TerminateProcess
HeapValidate
IsBadWritePtr
ExitThread
CreateThread
GetStartupInfoA
MultiByteToWideChar
GlobalSize
SetEvent
SuspendThread
GetProfileIntA
SearchPathA
InitializeCriticalSection
GetCPInfo
lstrlenA
lstrcpyA
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
DeleteCriticalSection
IsDBCSLeadByteEx
CreateEventA
LeaveCriticalSection
EnterCriticalSection
GetModuleFileNameA
ResumeThread
GetCurrentProcessId
FlushFileBuffers
GetVersionExA
DeleteFileA
CreateProcessA
SetThreadPriority
GetFileInformationByHandle
GetFullPathNameA
GetTempFileNameA
GetTempPathA
CreateFileA
GetCommandLineA
SetConsoleCtrlHandler
GetACP
SetErrorMode
IsBadReadPtr
UnmapViewOfFile
GetHandleInformation
OpenFileMappingA
CreateFileMappingA
MapViewOfFile
ReadFile
SetLastError
WriteFile
SetEndOfFile
SetFilePointer
GetModuleHandleA
LoadLibraryA
GetProcAddress
GetLocaleInfoW
GetTimeZoneInformation
GetSystemTimeAsFileTime
GetTickCount
CloseHandle
TlsGetValue
TlsFree
TlsAlloc
GetCurrentProcess
GetCurrentThread
DuplicateHandle
TlsSetValue
QueryPerformanceCounter
Sleep
WaitForSingleObject
GetFileType
ReleaseMutex
CreateMutexA
GetStdHandle
GetCurrentThreadId
VirtualAlloc
VirtualFree
RaiseException
DebugBreak
FormatMessageA
GetLastError
imagehlp
SymCleanup
SymInitialize
StackWalk
Sections
.text Size: 564KB - Virtual size: 561KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 60KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 63KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data1 Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.trace Size: 4KB - Virtual size: 324B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ