Static task
static1
Behavioral task
behavioral1
Sample
76111c524409ede0844b0b40980a4a622ab3a09e46d4c4043323b67d8b135b3d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
76111c524409ede0844b0b40980a4a622ab3a09e46d4c4043323b67d8b135b3d.exe
Resource
win10v2004-20220812-en
General
-
Target
76111c524409ede0844b0b40980a4a622ab3a09e46d4c4043323b67d8b135b3d
-
Size
3.2MB
-
MD5
71aef21a63a46c02a99f949fe72e8008
-
SHA1
f8d8821615815ecc2d802a5bac1d9e7ed3e3bf7c
-
SHA256
76111c524409ede0844b0b40980a4a622ab3a09e46d4c4043323b67d8b135b3d
-
SHA512
b551290195cb2a0b870f653657282602815b63437c42cc278529a4c26330444da1df323324f88f7c5f6589101676dbfcea274424121818c307f1a0dfcd02eb66
-
SSDEEP
98304:0E2QiXWTZ8v3coE6sLDQckud4xoFoSAX6tHlXlUuUx:0XQsxsAtudsHaBOui
Malware Config
Signatures
Files
-
76111c524409ede0844b0b40980a4a622ab3a09e46d4c4043323b67d8b135b3d.exe windows x86
b90b281ea4e6c7cc71607fd6f4f8cdf6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetErrorMode
GetCurrentProcess
WriteFile
SetFilePointer
FlushFileBuffers
RtlUnwind
HeapAlloc
GetStartupInfoW
ExitProcess
TerminateProcess
HeapFree
RaiseException
HeapReAlloc
HeapSize
HeapDestroy
VirtualFree
VirtualAlloc
IsBadWritePtr
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetEnvironmentStrings
GetCommandLineW
GetCommandLineA
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
GetModuleFileNameA
SetUnhandledExceptionFilter
LCMapStringA
LCMapStringW
IsBadReadPtr
IsBadCodePtr
GetCPInfo
SetStdHandle
GetStringTypeA
GetStringTypeW
GetACP
GetOEMCP
GetProcessVersion
InterlockedIncrement
WritePrivateProfileStringW
GlobalFlags
lstrcmpiW
lstrcpynW
TlsGetValue
LocalReAlloc
TlsSetValue
EnterCriticalSection
GlobalReAlloc
LeaveCriticalSection
TlsFree
GlobalHandle
DeleteCriticalSection
TlsAlloc
InitializeCriticalSection
LocalFree
LocalAlloc
SetLastError
InterlockedDecrement
GetModuleHandleA
LoadLibraryA
FreeLibrary
MultiByteToWideChar
GetVersion
lstrcatW
GlobalAddAtomW
GlobalFindAtomW
lstrcpyW
GetModuleHandleW
GetProcAddress
GlobalUnlock
GlobalFree
GlobalLock
lstrcmpW
GlobalAlloc
GlobalDeleteAtom
lstrlenW
WideCharToMultiByte
GetCurrentThread
GetCurrentThreadId
GetLogicalDriveStringsW
DeviceIoControl
GetDriveTypeW
GetSystemDirectoryW
GetFileTime
CreateMutexW
GetLastError
Sleep
CreateDirectoryW
GetDiskFreeSpaceExW
WaitForSingleObject
GetModuleFileNameW
CopyFileW
SetFileAttributesW
FindFirstFileW
FindClose
CreateProcessW
CreateFileW
SetFileTime
CloseHandle
FindNextFileW
HeapCreate
DeleteFileW
user32
AdjustWindowRectEx
SetFocus
GetSysColor
MapWindowPoints
SetWindowTextW
ShowWindow
ClientToScreen
GetDC
ReleaseDC
BeginPaint
EndPaint
TabbedTextOutW
DrawTextW
GrayStringW
LoadCursorW
GetClassNameW
PtInRect
GetSysColorBrush
LoadStringW
DestroyMenu
CopyRect
GetTopWindow
GetCapture
WinHelpW
wsprintfW
GetClassInfoW
RegisterClassW
GetMenu
GetMenuItemCount
GetSubMenu
GetMenuItemID
GetWindowTextW
GetDlgCtrlID
DefWindowProcW
CreateWindowExW
SetPropW
UnhookWindowsHookEx
GetPropW
CallWindowProcW
RemovePropW
GetMessageTime
GetMessagePos
GetForegroundWindow
SetForegroundWindow
GetWindow
SetWindowLongW
SetWindowPos
RegisterWindowMessageW
SystemParametersInfoW
GetWindowPlacement
GetWindowRect
EndDialog
DestroyWindow
GetDlgItem
GetMenuCheckMarkDimensions
LoadBitmapW
GetMenuState
ModifyMenuW
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
GetMessageW
TranslateMessage
DispatchMessageW
GetActiveWindow
GetKeyState
CallNextHookEx
ValidateRect
IsWindowVisible
PeekMessageW
GetCursorPos
SetWindowsHookExW
GetParent
GetLastActivePopup
IsWindowEnabled
GetWindowLongW
MessageBoxW
SetCursor
PostQuitMessage
PostMessageW
IsIconic
GetSystemMetrics
GetClientRect
DrawIcon
SendMessageW
EnableWindow
LoadIconW
UnregisterClassW
gdi32
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
DeleteObject
SetViewportOrgEx
GetDeviceCaps
PtVisible
RectVisible
TextOutW
ExtTextOutW
Escape
SetMapMode
DeleteDC
GetObjectW
SetBkColor
SetTextColor
GetStockObject
SelectObject
RestoreDC
CreateBitmap
GetClipBox
SaveDC
winspool.drv
DocumentPropertiesW
ClosePrinter
OpenPrinterW
advapi32
RegCreateKeyExW
RegQueryValueExW
RegOpenKeyExW
RegSetValueExW
RegCloseKey
shell32
SHGetSpecialFolderPathW
ShellExecuteW
comctl32
ord17
Sections
.text Size: 64KB - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 8KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ