Static task
static1
Behavioral task
behavioral1
Sample
a32620bc2d65d32fba443471a5e92c15e4e4b00c7ae7fedc92d7c73bd125ea0a.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a32620bc2d65d32fba443471a5e92c15e4e4b00c7ae7fedc92d7c73bd125ea0a.exe
Resource
win10v2004-20220812-en
General
-
Target
a32620bc2d65d32fba443471a5e92c15e4e4b00c7ae7fedc92d7c73bd125ea0a
-
Size
134KB
-
MD5
8247713bc8746ca21cc05d2c46b80282
-
SHA1
697c1703dde8ce145ff57f10e409f8781a733b46
-
SHA256
a32620bc2d65d32fba443471a5e92c15e4e4b00c7ae7fedc92d7c73bd125ea0a
-
SHA512
1c93511744a79866e5905b507de0ca3b26b281ae32742515213e832ec56ce540a3c4f86d69d80a185b57d0fecf541ccdd4a4ac5264ad4fdcfb0f4668e1c269f8
-
SSDEEP
3072:emCYlQdcglkADGV+Roli3po4BE42/9GkSz:ev0fjeRol6pI42Exz
Malware Config
Signatures
Files
-
a32620bc2d65d32fba443471a5e92c15e4e4b00c7ae7fedc92d7c73bd125ea0a.exe windows x86
25a1f7b366225c9ba8999450b27c1ccb
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateEventW
FindClose
GetSystemInfo
GlobalSize
VirtualAllocEx
GetProcAddress
LoadLibraryA
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
LCMapStringW
MultiByteToWideChar
LCMapStringA
GetSystemTimeAsFileTime
QueryPerformanceCounter
VirtualQuery
RtlUnwind
GetCPInfo
GetOEMCP
GetACP
FreeEnvironmentStringsW
VirtualAlloc
HeapAlloc
FlushFileBuffers
HeapCreate
GetFileType
SetHandleCount
GetEnvironmentStringsW
WideCharToMultiByte
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetModuleFileNameA
GetStdHandle
CloseHandle
GetLastError
GetCurrentProcess
TerminateProcess
ExitProcess
GetVersionExA
GetStartupInfoA
GetModuleHandleA
CopyFileW
HeapDestroy
FormatMessageW
IsValidCodePage
lstrcpyW
GetCurrentDirectoryW
FreeLibrary
VirtualProtect
LocalUnlock
GetModuleHandleW
MoveFileW
InterlockedIncrement
GetTempPathW
GetDateFormatW
TlsFree
WriteFile
RaiseException
VirtualFree
FindResourceW
LockResource
lstrcpynW
GetDriveTypeA
GetEnvironmentStrings
GetModuleFileNameW
SetEnvironmentVariableA
SetCurrentDirectoryW
GetCurrentThreadId
SetLastError
DeleteFileW
GetCurrentProcessId
CreateFileA
GetCommandLineA
HeapFree
GetTimeFormatW
HeapSize
InterlockedExchange
GetConsoleMode
GetTickCount
ExpandEnvironmentStringsW
SetFilePointer
SetStdHandle
GetProcessHeap
LocalLock
lstrcmpW
IsBadWritePtr
HeapReAlloc
user32
ShowCaret
ScreenToClient
IsClipboardFormatAvailable
InflateRect
CreateMenu
GetScrollPos
GetMonitorInfoW
SetWindowPlacement
CreateCaret
CloseClipboard
LoadIconW
CheckMenuRadioItem
MonitorFromWindow
CreatePopupMenu
DestroyWindow
BeginPaint
EndDialog
TranslateAcceleratorW
GetMessageW
SetClipboardData
EnableMenuItem
CallNextHookEx
RealChildWindowFromPoint
GetActiveWindow
GetDC
SetFocus
DefWindowProcW
GetWindowPlacement
DrawIcon
IsDialogMessageW
GetCursorPos
ModifyMenuW
DestroyCursor
mouse_event
RemoveMenu
GetMenuItemCount
DrawFocusRect
DestroyMenu
DestroyCaret
ClientToScreen
IsWindow
DrawMenuBar
gdi32
GetObjectW
ExtTextOutW
SetROP2
GetTextExtentPointW
CreateBitmap
LineTo
PatBlt
EnumFontFamiliesExW
SetTextAlign
GetDeviceCaps
SetBkMode
RestoreDC
SelectObject
SetWindowOrgEx
SetTextColor
GetROP2
StartPage
RemoveFontResourceW
EndDoc
CreateCompatibleBitmap
CreateSolidBrush
CreatePen
CreateFontIndirectW
SaveDC
SetBrushOrgEx
GetStockObject
DPtoLP
DeleteObject
OffsetWindowOrgEx
CreateCompatibleDC
CreatePatternBrush
MoveToEx
comdlg32
ChooseFontA
PrintDlgA
GetSaveFileNameW
GetOpenFileNameA
PageSetupDlgA
ReplaceTextW
PageSetupDlgW
GetFileTitleW
ReplaceTextA
PrintDlgW
FindTextW
GetFileTitleA
advapi32
RegQueryValueExW
RegQueryInfoKeyA
RegOpenKeyExA
RegCreateKeyExW
RegCreateKeyW
RegQueryInfoKeyW
RegDeleteValueW
RegEnumKeyExA
RegDeleteKeyA
RegCloseKey
RegDeleteValueA
Sections
.text Size: 26KB - Virtual size: 25KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 95KB - Virtual size: 287KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ