Static task
static1
Behavioral task
behavioral1
Sample
dbd9a3325d1d8611620269345260249a39dd9d09b6525af41936ca2e4ba40aa8.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
dbd9a3325d1d8611620269345260249a39dd9d09b6525af41936ca2e4ba40aa8.exe
Resource
win10v2004-20220812-en
General
-
Target
dbd9a3325d1d8611620269345260249a39dd9d09b6525af41936ca2e4ba40aa8
-
Size
295KB
-
MD5
565ee56665428265e0c1a5a3e2645eda
-
SHA1
6f4ed8f489e9b460acf0bc5a41b51b167ac11643
-
SHA256
dbd9a3325d1d8611620269345260249a39dd9d09b6525af41936ca2e4ba40aa8
-
SHA512
1d8f39916b3202ad638313d202bf1160ef4f6b3d90a1104b0f9c38c90b9465b373d16ccb9df8980baaf6d1b87852dc6084d3cc7a0d412001106eeee88c9b25dd
-
SSDEEP
6144:Egnm/zZl+uB5PlZoDrrqoKudlSyb7cx6WiWIbcHptxEXrSclVfu:tuzZl+u5PlZmrq9ykiboZ+Xa
Malware Config
Signatures
Files
-
dbd9a3325d1d8611620269345260249a39dd9d09b6525af41936ca2e4ba40aa8.exe windows x86
6aba8b0febea714c7a2e98be397a38e3
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Imports
user32
GetDlgItem
SendMessageW
GetKeyState
EndPaint
SetTimer
GetParent
SystemParametersInfoA
SetDlgItemTextW
GetMenuItemCount
DispatchMessageA
RegisterClassW
InvalidateRect
PostQuitMessage
GetWindowRect
TranslateMessage
GetSystemMetrics
MessageBoxW
GetWindowThreadProcessId
IsDialogMessageW
UnregisterClassA
LoadBitmapW
kernel32
InterlockedExchange
GetModuleHandleW
GetSystemTimeAsFileTime
LoadResource
RaiseException
CreateFileA
HeapFree
UnhandledExceptionFilter
GetFileSize
LeaveCriticalSection
GetEnvironmentStrings
GetACP
IsBadReadPtr
GetTempPathA
GetCommandLineA
GlobalFree
IsBadCodePtr
OpenProcess
lstrlenA
LCMapStringA
GetSystemTime
FileTimeToSystemTime
GetFileType
SetUnhandledExceptionFilter
CompareStringW
Sleep
GetCommandLineW
UnmapViewOfFile
SizeofResource
RtlUnwind
GetCurrentThreadId
TlsSetValue
GetModuleFileNameA
GetFileAttributesW
DeleteFileW
DisableThreadLibraryCalls
GetSystemInfo
HeapSize
GetModuleHandleA
GetStartupInfoA
VirtualFree
GlobalDeleteAtom
CreateThread
FindResourceW
GetProcAddress
GetFullPathNameW
SetStdHandle
CreateFileW
GetCurrentProcess
GlobalHandle
HeapReAlloc
MapViewOfFile
LoadLibraryA
HeapAlloc
GetCurrentProcessId
MultiByteToWideChar
FreeResource
QueryPerformanceCounter
msvcrt
_wtoi
memcpy
_XcptFilter
_purecall
wcschr
realloc
memmove
exit
??3@YAXPAX@Z
??1type_info@@UAE@XZ
__dllonexit
_cexit
_amsg_exit
??0exception@@QAE@ABV0@@Z
malloc
ole32
CoTaskMemFree
CoUninitialize
Sections
.text Size: 249KB - Virtual size: 249KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 224KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 36KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 74B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ