Static task
static1
Behavioral task
behavioral1
Sample
223cff858c2895cde2da49ea37c405be979e7d14288a729ff748375b848d1982.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
223cff858c2895cde2da49ea37c405be979e7d14288a729ff748375b848d1982.exe
Resource
win10v2004-20220812-en
General
-
Target
223cff858c2895cde2da49ea37c405be979e7d14288a729ff748375b848d1982
-
Size
243KB
-
MD5
7c1c9d216bf370ca15c2db60ec21fa8e
-
SHA1
9a4e6a809d61f039f32706217fd04a5dbe950cf6
-
SHA256
223cff858c2895cde2da49ea37c405be979e7d14288a729ff748375b848d1982
-
SHA512
de6a0b6c0eb763fa0e46712f1663d66e3ae7a4bae531812f7b7b8e5fcb7a772a65cf27df91d5e8dff2b337e1c3d8a2a3ade14a74e820b971a77692e6eabfeee6
-
SSDEEP
6144:nkpWRuYkDom4GY72NkIpv32jkFLF717ld:kpWRPkDo9vCy+Ykv1X
Malware Config
Signatures
Files
-
223cff858c2895cde2da49ea37c405be979e7d14288a729ff748375b848d1982.exe windows x86
8cb86a1682374d841629f13a4ac6324c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapSize
CreateFileA
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
Sleep
RaiseException
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
HeapReAlloc
HeapCreate
GetFileType
lstrcpyA
GetEnvironmentStringsW
WideCharToMultiByte
FreeEnvironmentStringsW
GetModuleFileNameA
GetModuleFileNameW
GetStdHandle
WriteFile
GetConsoleCP
GetConsoleMode
FlushFileBuffers
LCMapStringW
MultiByteToWideChar
GetStringTypeW
SetFilePointer
SetStdHandle
SetEndOfFile
GetProcessHeap
ReadFile
WriteConsoleW
CreateFileW
QueryPerformanceCounter
InterlockedDecrement
CloseHandle
LoadLibraryA
GlobalFree
GetProcAddress
GetLastError
lstrcatA
GlobalAlloc
lstrlenA
GetCurrentProcess
GetCurrentThreadId
SetLastError
InterlockedIncrement
TlsFree
TlsSetValue
TlsGetValue
HeapAlloc
SetHandleCount
GetModuleHandleW
ExitProcess
DecodePointer
GetCommandLineA
HeapSetInformation
GetStartupInfoW
HeapFree
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
EncodePointer
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
RtlUnwind
DeleteCriticalSection
LoadLibraryW
TlsAlloc
user32
MoveWindow
EndPaint
DestroyWindow
KillTimer
DrawTextA
GetSubMenu
GetFocus
wsprintfA
GetClientRect
SendMessageA
BeginPaint
EnumWindows
GetDC
LoadIconW
GetScrollInfo
MessageBoxA
InvalidateRect
ReleaseDC
ChangeClipboardChain
ScrollWindow
DefWindowProcA
GetSysColor
ShowWindow
DrawMenuBar
WindowFromDC
AppendMenuA
MessageBoxW
GetSystemMetrics
FindWindowA
SetClipboardViewer
CheckMenuItem
gdi32
GetTextExtentPoint32W
LineTo
ExtFloodFill
DeleteDC
CreateFontIndirectA
DeleteObject
SelectObject
CreateCompatibleDC
CreateCompatibleBitmap
CreatePen
GetTextMetricsA
CreateSolidBrush
TextOutA
MoveToEx
advapi32
RegCloseKey
RegSetValueExA
RegOpenKeyExW
FreeSid
AllocateAndInitializeSid
LookupAccountSidA
EqualSid
OpenProcessToken
shell32
Shell_NotifyIconA
SHGetFolderLocation
SHGetFileInfoA
ws2_32
WSAStartup
comctl32
ord17
Sections
.text Size: 73KB - Virtual size: 72KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 154KB - Virtual size: 179KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ