Static task
static1
Behavioral task
behavioral1
Sample
c72d712ca62c76459b0748fa2553de18e70daf7b0306c2297f6be27aaccd99b8.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c72d712ca62c76459b0748fa2553de18e70daf7b0306c2297f6be27aaccd99b8.exe
Resource
win10v2004-20220812-en
General
-
Target
c72d712ca62c76459b0748fa2553de18e70daf7b0306c2297f6be27aaccd99b8
-
Size
559KB
-
MD5
ddb8b0919f4416fafb124932a22dcd8f
-
SHA1
9e4bfbd190c4eb193f058ef09201d60a99c04ca3
-
SHA256
c72d712ca62c76459b0748fa2553de18e70daf7b0306c2297f6be27aaccd99b8
-
SHA512
04a90f414b141bd9774e9af7a0ecaa0d5d4b02199e3772aa697d39bb832012ad22c534f1c4841a6cc568593271d23b76bae4942795f0a7c08b57bf7017f331ba
-
SSDEEP
12288:GIP/HkJ1sUDndq52kyTNbxy8haNeNzM1gI7X5G39I:bEJLsaTgN6znS
Malware Config
Signatures
Files
-
c72d712ca62c76459b0748fa2553de18e70daf7b0306c2297f6be27aaccd99b8.exe windows x86
e4bbfe339e5c1cb9e432ddb7a2574a9f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
InitCommonControlsEx
shell32
SHFileOperation
RealShellExecuteA
SheSetCurDrive
SHGetSpecialFolderPathA
SHGetSpecialFolderPathW
user32
GetMessagePos
MapVirtualKeyA
RegisterClassA
EnumDesktopWindows
LoadImageW
CharUpperBuffW
TrackMouseEvent
EnumDesktopsA
DefFrameProcW
LoadAcceleratorsW
RegisterClassExA
DdeCreateStringHandleA
DrawTextExW
SendDlgItemMessageW
EditWndProc
GetCaretPos
SetCapture
GetMenuDefaultItem
GetTitleBarInfo
GetCursorPos
SetDoubleClickTime
comdlg32
ChooseColorA
kernel32
ReadFile
InterlockedExchange
CloseHandle
GetCurrentProcess
GetCurrentProcessId
HeapDestroy
GetStringTypeA
WideCharToMultiByte
GetOEMCP
RtlUnwind
WriteFile
GetFileType
GetCommandLineW
GetCommandLineA
CompareStringW
LCMapStringW
TlsSetValue
GetTimeFormatA
TlsGetValue
SetHandleCount
GetVolumeInformationA
GetEnvironmentStringsW
LoadLibraryA
IsValidCodePage
HeapFree
GetCPInfo
GetEnvironmentStrings
QueryPerformanceCounter
GetModuleFileNameA
VirtualFree
ReadConsoleOutputA
LCMapStringA
GetCurrentThreadId
CreateMutexA
VirtualQuery
HeapReAlloc
LeaveCriticalSection
OpenMutexA
InitializeCriticalSection
GetLocaleInfoW
GetStdHandle
MultiByteToWideChar
GetLastError
GetModuleHandleA
EnumSystemLocalesA
GetStartupInfoW
TlsFree
SetFilePointer
IsBadWritePtr
VirtualProtect
GetACP
SetLastError
GetStringTypeW
HeapCreate
FreeEnvironmentStringsW
FlushFileBuffers
TerminateProcess
HeapAlloc
GetStartupInfoA
EnterCriticalSection
VirtualAlloc
IsValidLocale
GetTimeZoneInformation
GetSystemInfo
GetCurrentThread
GetVersionExA
ExitProcess
GetTickCount
FreeEnvironmentStringsA
GetModuleFileNameW
GetProcAddress
DeleteCriticalSection
GetSystemTimeAsFileTime
GetUserDefaultLCID
HeapSize
GetDateFormatA
SetStdHandle
UnhandledExceptionFilter
CompareStringA
GetLocaleInfoA
TlsAlloc
SetEnvironmentVariableA
Sections
.text Size: 156KB - Virtual size: 155KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 387KB - Virtual size: 382KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ