Static task
static1
Behavioral task
behavioral1
Sample
d4ab9a749d4d36139273d12f15ed3474e376c60ca4b98d0aac8170e101d782d2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d4ab9a749d4d36139273d12f15ed3474e376c60ca4b98d0aac8170e101d782d2.exe
Resource
win10v2004-20220812-en
General
-
Target
d4ab9a749d4d36139273d12f15ed3474e376c60ca4b98d0aac8170e101d782d2
-
Size
800KB
-
MD5
b493bbb6e58d2c945fc3b55465201ae8
-
SHA1
59b0370685c051d891f827d8c4a1ae466eadd32c
-
SHA256
d4ab9a749d4d36139273d12f15ed3474e376c60ca4b98d0aac8170e101d782d2
-
SHA512
95a49ff4f5b57be266b80170adb092977660045889abc002d6e909a73e75cf01eb438e95d0ab9a619ab95e2c646cfd5b135f77308248fa1ce72bf015ba4bc639
-
SSDEEP
12288:8QI7vx6w7C8iN0NZvMvOKd+hc+vipL1gXTFZx5SPD4lP3wW/vvxd+:9mvvg2vMvOW11yTF7Jh39v5d+
Malware Config
Signatures
Files
-
d4ab9a749d4d36139273d12f15ed3474e376c60ca4b98d0aac8170e101d782d2.exe windows x86
088d116e3f25ac655e8ec0070da5de0b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
oleaut32
LoadTypeLi
kernel32
CreateMutexW
FreeLibrary
VirtualFree
GlobalLock
LCMapStringW
GetProcessHeap
SetEndOfFile
TlsGetValue
GetVersionExA
GetCommandLineA
GetCurrentProcessId
IsDebuggerPresent
HeapDestroy
GetLocaleInfoW
GetEnvironmentStrings
CompareStringW
SetHandleCount
GetCommandLineW
InterlockedExchange
DeleteFileW
GetStdHandle
GlobalUnlock
SetFilePointer
CreateDirectoryW
TlsFree
GetLocalTime
GetModuleHandleA
GetUserDefaultLCID
WaitForSingleObject
CreateProcessW
GetModuleFileNameW
CreateFileA
HeapFree
CompareStringA
GetStringTypeA
FindClose
GetFileSize
QueryPerformanceCounter
LoadLibraryA
GetVersion
TerminateProcess
InitializeCriticalSection
SetEnvironmentVariableA
WriteFile
LCMapStringA
CreateFileW
GetProcAddress
UnhandledExceptionFilter
HeapReAlloc
GetStartupInfoA
VirtualQuery
FreeEnvironmentStringsA
GetFullPathNameW
WideCharToMultiByte
SetLastError
LoadLibraryW
FreeEnvironmentStringsW
TlsSetValue
GlobalFree
GetStringTypeW
GetCurrentThreadId
HeapCreate
LeaveCriticalSection
GetLocaleInfoA
IsBadCodePtr
GetModuleHandleW
FlushFileBuffers
DeleteCriticalSection
InterlockedIncrement
HeapAlloc
WriteConsoleA
GlobalAlloc
GetEnvironmentStringsW
SetUnhandledExceptionFilter
Sleep
GetTimeZoneInformation
GetCurrentProcess
GetACP
GetModuleFileNameA
RaiseException
InterlockedDecrement
FindFirstFileW
GetSystemTime
GetVersionExW
VirtualAlloc
IsValidLocale
GetOEMCP
EnterCriticalSection
ReadFile
OpenMutexW
GetSystemTimeAsFileTime
GetCPInfo
GetLastError
GetTickCount
TlsAlloc
SetStdHandle
ExitProcess
MultiByteToWideChar
RtlUnwind
GetStartupInfoW
FindNextFileW
GetFileType
HeapSize
CloseHandle
comctl32
ImageList_Destroy
ImageList_DrawEx
InitCommonControlsEx
PropertySheetW
comdlg32
GetOpenFileNameA
GetFileTitleA
advapi32
RegEnumKeyExA
RegCreateKeyExA
RegCreateKeyA
ControlService
RegQueryValueExA
InitializeSecurityDescriptor
user32
DrawFocusRect
GetCursorPos
DestroyIcon
GetWindowThreadProcessId
UnpackDDElParam
OpenClipboard
EnableMenuItem
BringWindowToTop
IsWindow
IsClipboardFormatAvailable
DefWindowProcW
EndDeferWindowPos
GetNextDlgTabItem
SetActiveWindow
SetWindowPlacement
ScrollWindow
GetWindowTextLengthW
SetRect
GetMenuItemID
GetNextDlgGroupItem
TrackPopupMenu
SetFocus
DrawTextW
LoadIconW
wsprintfW
ReleaseDC
RegisterClassExW
ScreenToClient
LoadAcceleratorsW
CreatePopupMenu
LoadStringW
DestroyMenu
LoadCursorW
EndDialog
GetWindowRect
CreateWindowExW
SetForegroundWindow
SetMenuDefaultItem
ShowWindow
GetSysColor
GetDesktopWindow
InsertMenuW
FillRect
RedrawWindow
SetMenuItemInfoW
ValidateRect
DestroyAcceleratorTable
RemoveMenu
SystemParametersInfoW
GetActiveWindow
MessageBeep
RegisterClassW
EmptyClipboard
CopyAcceleratorTableW
DeferWindowPos
GetTopWindow
GetDlgCtrlID
EnableWindow
GetMessageTime
GetKeyState
SetCursorPos
LoadBitmapW
InflateRect
GetClassLongW
AppendMenuW
SetScrollInfo
GetWindowDC
InvalidateRect
BeginDeferWindowPos
LockWindowUpdate
ReleaseCapture
GetDlgItem
DestroyWindow
PostMessageW
TranslateMDISysAccel
IsWindowEnabled
GetFocus
MessageBoxW
SendMessageW
CopyRect
DeleteMenu
GetWindow
PostQuitMessage
ole32
CoLockObjectExternal
OleGetClipboard
OleDuplicateData
CoTaskMemFree
OleUninitialize
CreateStreamOnHGlobal
GetRunningObjectTable
StgOpenStorageOnILockBytes
OleInitialize
OleRun
CoInitialize
CoRegisterMessageFilter
shell32
DragFinish
ShellExecuteA
shlwapi
PathBuildRootA
PathIsUNCServerA
PathRemoveFileSpecA
PathIsUNCA
PathRemoveBackslashA
PathIsRootA
PathFileExistsA
PathGetDriveNumberA
SHDeleteKeyA
PathIsDirectoryA
PathIsUNCServerShareA
Sections
.text Size: 76KB - Virtual size: 75KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 472KB - Virtual size: 470KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 108KB - Virtual size: 104KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 140KB - Virtual size: 137KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ