Static task
static1
Behavioral task
behavioral1
Sample
74a39d7e453e4c7238e7bb34c386feccaec0cdc3fe7190cc65b45b43e80b6212.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
74a39d7e453e4c7238e7bb34c386feccaec0cdc3fe7190cc65b45b43e80b6212.exe
Resource
win10v2004-20220812-en
General
-
Target
74a39d7e453e4c7238e7bb34c386feccaec0cdc3fe7190cc65b45b43e80b6212
-
Size
103KB
-
MD5
e65231e0f58f6e5e23c3336d0687c006
-
SHA1
86f2151e1685cb7dbee05f0ac66b7c272cd42824
-
SHA256
74a39d7e453e4c7238e7bb34c386feccaec0cdc3fe7190cc65b45b43e80b6212
-
SHA512
e08df639a25c399df250db0d134f3115c1e10811e4cf3516251434a10cf3e8228d78573ac384dbf7555141a50ba9c0089c5c7d1cf9ae1c1eca23f1f2158984a8
-
SSDEEP
1536:3DQ4UhqKNndVjqjHh+/O8xBtI9cCGT2LPyuRI61unnfNDz1oi:/UhqoV+jHh+juTdI6SfNDhoi
Malware Config
Signatures
Files
-
74a39d7e453e4c7238e7bb34c386feccaec0cdc3fe7190cc65b45b43e80b6212.exe windows x86
7b7dcbf9cadaacba49e5c8181efee45a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
CopyAcceleratorTableA
DefWindowProcA
WindowFromPoint
CharUpperBuffW
wvsprintfA
ArrangeIconicWindows
GetMenuStringW
IsCharAlphaW
TileWindows
LoadIconW
DispatchMessageA
SendDlgItemMessageW
shell32
ShellExecuteA
DragQueryPoint
Shell_NotifyIconA
DuplicateIcon
ShellExecuteW
DragQueryFileW
ShellAboutW
ShellAboutA
ole32
OleNoteObjectVisible
CoUnmarshalInterface
CoFreeLibrary
OleRegGetUserType
GetHGlobalFromILockBytes
CoSwitchCallContext
MonikerRelativePathTo
wininet
InternetAttemptConnect
GopherGetAttributeW
CreateUrlCacheEntryW
SetUrlCacheEntryInfoW
InternetOpenW
InternetGoOnline
gdi32
CreateColorSpaceW
AddFontResourceExW
CreateBrushIndirect
CancelDC
AddFontResourceA
CreateDIBitmap
opengl32
wglShareLists
glColor4dv
wglMakeCurrent
glScissor
glGetTexImage
glScaled
glLoadIdentity
glRasterPos3sv
kernel32
WriteConsoleW
SetStdHandle
IsProcessorFeaturePresent
GetStringTypeW
MultiByteToWideChar
LCMapStringW
FlushFileBuffers
GetConsoleMode
GetConsoleCP
SetFilePointer
HeapSize
RtlUnwind
IsValidCodePage
GetOEMCP
CloseHandle
GetCPInfo
Sleep
LoadLibraryW
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
InterlockedDecrement
GetCurrentThreadId
SetLastError
CreateFileW
GetACP
GetStartupInfoW
InterlockedIncrement
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
DeleteCriticalSection
GetFileType
InitializeCriticalSectionAndSpinCount
SetHandleCount
GlobalMemoryStatusEx
GetProfileSectionW
SetCriticalSectionSpinCount
RaiseException
GetCommState
AssignProcessToJobObject
GetLocaleInfoW
GetLogicalDriveStringsA
GetLastError
HeapReAlloc
HeapFree
HeapAlloc
GetCommandLineA
HeapSetInformation
EncodePointer
DecodePointer
HeapCreate
GetProcAddress
GetModuleHandleW
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameW
EnterCriticalSection
LeaveCriticalSection
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCurrentProcess
GetModuleFileNameA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
Sections
.text Size: 47KB - Virtual size: 47KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 37KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ