Static task
static1
Behavioral task
behavioral1
Sample
80bdb6373a661c3dc7ea472d84747b663afe811c5d4871dfb7fcf43703b1a129.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
80bdb6373a661c3dc7ea472d84747b663afe811c5d4871dfb7fcf43703b1a129.exe
Resource
win10v2004-20220901-en
General
-
Target
80bdb6373a661c3dc7ea472d84747b663afe811c5d4871dfb7fcf43703b1a129
-
Size
136KB
-
MD5
fb7001cee15b51bf7a9b155475ff33e2
-
SHA1
5934e94905a4559984a81f1a6f362d03bc795f75
-
SHA256
80bdb6373a661c3dc7ea472d84747b663afe811c5d4871dfb7fcf43703b1a129
-
SHA512
dd7d2b67083f8c2e10e951ee93b7959d83416ca6360438155dd8611c3e24f2536b102f0a1865c5e46baf0bdd628ce391350c8890c3cc49e3a962bd82cc6e4423
-
SSDEEP
3072:74FpgOOqMKcELW6KsxRF0UFAommG0LlJYBfTK780LJ:7ErtRbuoI0LYN2/LJ
Malware Config
Signatures
Files
-
80bdb6373a661c3dc7ea472d84747b663afe811c5d4871dfb7fcf43703b1a129.exe windows x86
5d0bc77a054637a7ff28022817ac73b1
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalAlloc
CompareStringW
LocalLock
WriteConsoleW
FindResourceW
GetDriveTypeW
LCMapStringA
TlsAlloc
HeapSize
CreatePipe
GlobalUnlock
GetTimeZoneInformation
MultiByteToWideChar
GetTickCount
MoveFileW
GetModuleFileNameA
GetTimeFormatW
CreateMutexW
SetFilePointer
HeapFree
CreateDirectoryW
GetVersionExA
GetCurrentProcess
GetFileType
WaitForSingleObject
EnterCriticalSection
lstrcpynW
GetUserDefaultLCID
SetEnvironmentVariableA
GlobalFree
GetConsoleOutputCP
InitializeCriticalSection
GetStringTypeW
GetTimeFormatA
WriteConsoleA
InterlockedCompareExchange
SetEvent
Sleep
VirtualFree
UnhandledExceptionFilter
GetCurrentDirectoryW
GetEnvironmentStrings
GetCommandLineW
CreateFileW
GetTempPathW
GetDriveTypeA
GetStringTypeA
LCMapStringW
LocalAlloc
GetLongPathNameW
SetStdHandle
InterlockedIncrement
FlushFileBuffers
SetLastError
GetProcAddress
LocalUnlock
ReadFile
TerminateThread
CreateThread
LoadLibraryW
lstrcpyW
FileTimeToSystemTime
GetCPInfo
FindClose
CreateFileA
ExpandEnvironmentStringsW
SizeofResource
GetLocalTime
TlsGetValue
LoadResource
GetACP
PeekNamedPipe
GetCurrentProcessId
LoadLibraryA
GetSystemInfo
GlobalSize
VirtualAlloc
GetLocaleInfoA
GetSystemTimeAsFileTime
GetCurrentThreadId
QueryPerformanceCounter
GetOEMCP
CloseHandle
InterlockedExchange
RtlUnwind
IsBadWritePtr
HeapReAlloc
HeapCreate
HeapDestroy
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetStdHandle
WriteFile
SetEndOfFile
WideCharToMultiByte
GetLastError
VirtualQuery
VirtualProtect
HeapAlloc
TerminateProcess
ExitProcess
GetCommandLineA
GetStartupInfoA
GetModuleHandleA
user32
InsertMenuW
GetSystemMetrics
BeginPaint
GetWindowPlacement
ReleaseDC
CallWindowProcW
GetActiveWindow
FillRect
SetCursor
DestroyAcceleratorTable
LoadStringW
IsWindow
SetWindowsHookExW
IsIconic
wsprintfW
SetWindowPos
SetWindowPlacement
FrameRect
GetDlgItemTextW
CallNextHookEx
IsWindowUnicode
GetFocus
mouse_event
PostQuitMessage
CharUpperW
MapWindowPoints
DrawIcon
PostMessageW
CreateAcceleratorTableW
SetDlgItemInt
GetSubMenu
ScrollWindow
CreateDialogParamW
IsClipboardFormatAvailable
PeekMessageW
GetClassNameW
MessageBoxW
SetScrollPos
HideCaret
SetWindowLongW
GetMenu
CreateDialogIndirectParamW
TranslateMessage
DrawTextExW
DrawFocusRect
InvalidateRect
DestroyMenu
GetParent
GetMenuState
OpenClipboard
GetCursorPos
DrawTextW
ModifyMenuW
ShowWindow
InflateRect
DefWindowProcW
RemoveMenu
AppendMenuW
RealChildWindowFromPoint
SetMenuItemInfoW
CreateCursor
SetCaretPos
GetWindowLongW
comdlg32
GetFileTitleA
FindTextA
ChooseColorA
FindTextW
ReplaceTextA
GetOpenFileNameW
GetOpenFileNameA
ChooseFontW
PageSetupDlgW
ChooseFontA
ChooseColorW
GetFileTitleW
PrintDlgW
GetSaveFileNameA
ReplaceTextW
PageSetupDlgA
PrintDlgA
GetSaveFileNameW
ole32
StgOpenStorage
StgOpenAsyncDocfileOnIFillLockBytes
Sections
.text Size: 38KB - Virtual size: 37KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 84KB - Virtual size: 128KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ