Static task
static1
Behavioral task
behavioral1
Sample
d8df0eab2cb12df6b584ae2f6493fe28ea4c9aaeff709f67a958086c37d42856.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
d8df0eab2cb12df6b584ae2f6493fe28ea4c9aaeff709f67a958086c37d42856.exe
Resource
win10v2004-20221111-en
General
-
Target
d8df0eab2cb12df6b584ae2f6493fe28ea4c9aaeff709f67a958086c37d42856
-
Size
368KB
-
MD5
976d5c13d6ca433dcb0fff72b67eab5f
-
SHA1
d7aa15394d098a25277edc2e28efad35444c45b1
-
SHA256
d8df0eab2cb12df6b584ae2f6493fe28ea4c9aaeff709f67a958086c37d42856
-
SHA512
d2fb6295a092c6373a83a8f50c44e43855649010f2cf1000dd63e13f743fd4cde52be99eea2d206f6b9d6c5b1f74ba9361e3b4b3ef1541ddbc0cd5b9b88ef2b2
-
SSDEEP
6144:g5h8W/3Vq58ZIVir+nSzYcVU9oTiaH6cYBnG7zSkAUEXfnwPD1RMZ:g5mI05AIoGSzlGWMdnySQEPnO1e
Malware Config
Signatures
Files
-
d8df0eab2cb12df6b584ae2f6493fe28ea4c9aaeff709f67a958086c37d42856.exe windows x86
a21b14c33fa884152b23a94662c120f8
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCommandLineA
ExitProcess
VirtualProtect
GetStringTypeExW
QueryDosDeviceA
SetTimeZoneInformation
FreeEnvironmentStringsA
SetEnvironmentVariableA
GetSystemTime
SetConsoleCursorPosition
ReadConsoleInputW
lstrcpynA
GlobalDeleteAtom
WriteFile
FindFirstFileExW
CreatePipe
GetVolumeInformationW
SetEnvironmentVariableW
OpenSemaphoreW
IsBadWritePtr
GlobalFlags
WritePrivateProfileStringA
GetBinaryTypeW
SetThreadLocale
ReleaseSemaphore
WritePrivateProfileStringW
EnumCalendarInfoW
GetTimeZoneInformation
GetVersionExA
lstrlenA
user32
MsgWaitForMultipleObjectsEx
MessageBoxIndirectW
RemovePropW
CreateDesktopW
MapWindowPoints
DispatchMessageW
DialogBoxIndirectParamA
NotifyWinEvent
wsprintfW
IsCharLowerW
GetMenuStringW
GetSubMenu
EnumDisplayDevicesA
SetPropA
SetThreadDesktop
ScrollDC
CreateWindowExA
AttachThreadInput
ChildWindowFromPoint
GetUpdateRgn
DrawTextA
InsertMenuItemW
EqualRect
RemovePropA
GetQueueStatus
SetWindowRgn
GetClassNameW
GetMonitorInfoW
SetWindowPos
EnumWindowStationsA
CharNextExA
SendMessageW
DrawStateW
GetWindowRgn
GetCursor
MapVirtualKeyW
LockWindowUpdate
EnableScrollBar
GetWindowInfo
CharUpperA
GetCaretPos
GetMenuState
LoadAcceleratorsA
SetForegroundWindow
LoadCursorA
GetPropA
GetParent
GetScrollInfo
OpenIcon
HiliteMenuItem
GetDlgCtrlID
GetSysColor
GetAncestor
CopyIcon
CallWindowProcW
SetWinEventHook
SetWindowsHookExW
GetClassInfoW
CallWindowProcA
EnumDisplaySettingsW
InsertMenuA
OemToCharBuffA
gdi32
SetStretchBltMode
CloseMetaFile
ExtCreatePen
GetViewportOrgEx
SetROP2
SetMapperFlags
PolyBezier
ExtSelectClipRgn
CreateBrushIndirect
PlayEnhMetaFileRecord
SelectPalette
BitBlt
SelectObject
GetPolyFillMode
AbortDoc
comdlg32
ChooseColorW
GetOpenFileNameW
advapi32
EnumDependentServicesA
ObjectDeleteAuditAlarmW
IsValidAcl
StartServiceA
GetExplicitEntriesFromAclW
OpenServiceA
RegDeleteKeyA
CryptDeriveKey
RegFlushKey
RegEnumKeyExW
EnumDependentServicesW
DeregisterEventSource
GetServiceKeyNameW
ReportEventA
InitiateSystemShutdownA
AccessCheckAndAuditAlarmW
RegSetKeySecurity
OpenServiceW
RegCreateKeyExW
GetNamedSecurityInfoW
CryptDecrypt
RegEnumKeyW
shell32
SHFileOperationA
ShellExecuteA
DragFinish
SHGetPathFromIDListA
SHGetSpecialFolderPathW
ole32
WriteClassStg
ReadFmtUserTypeStg
MkParseDisplayName
CoFreeAllLibraries
ProgIDFromCLSID
CoSwitchCallContext
oleaut32
SysFreeString
QueryPathOfRegTypeLi
SafeArrayPutElement
comctl32
ImageList_EndDrag
shlwapi
PathFileExistsA
Sections
.text Size: 332KB - Virtual size: 331KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE