Static task
static1
Behavioral task
behavioral1
Sample
21ae1839755a3285b622a56e2f36fcb926ed61bbbec19db763afbe9e8b43680c.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
21ae1839755a3285b622a56e2f36fcb926ed61bbbec19db763afbe9e8b43680c.exe
Resource
win10v2004-20220812-en
General
-
Target
21ae1839755a3285b622a56e2f36fcb926ed61bbbec19db763afbe9e8b43680c
-
Size
666KB
-
MD5
a8a424a8c30f052c2536cb5597516d40
-
SHA1
34af3b37087f8d5b6f385d4c8ae59b15d2fb811f
-
SHA256
21ae1839755a3285b622a56e2f36fcb926ed61bbbec19db763afbe9e8b43680c
-
SHA512
2dec18ee061bde8918cf4de6f67c1c40cc0f297e40b2a52d6b09140e12ab905d19687d0b7aedacf5b27c2d4d614965512fcc390777371164fe4efe5911540e45
-
SSDEEP
12288:7s5/9tyU63c31i0lrMgUegrfArDuytLvibaVB3kMv7/Scl3sjb779UUL:Y5/9JhySuytLvibWB3ZvrSocjbN
Malware Config
Signatures
Files
-
21ae1839755a3285b622a56e2f36fcb926ed61bbbec19db763afbe9e8b43680c.exe windows x86
5d9386e32e3701a69e1139de2f32e0e2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
DispatchMessageA
SetCursorPos
OffsetRect
ClientToScreen
TranslateMessage
wsprintfA
GetDC
ReleaseDC
GetMessageA
SetCursor
DefWindowProcA
SetWindowLongA
LoadCursorA
PostQuitMessage
MessageBoxA
GetWindowLongA
SetFocus
PeekMessageA
ShowWindow
CreateWindowExA
SetRect
WaitMessage
SetWindowPos
GetWindowRect
GetClientRect
RegisterClassA
GetSystemMetrics
LoadIconA
gdi32
GetDeviceCaps
GetStockObject
advapi32
RegQueryValueExA
RegOpenKeyExA
RegSetValueExA
RegCreateKeyExA
RegCloseKey
ole32
CoInitialize
CoCreateInstance
CLSIDFromString
CoUninitialize
kernel32
WaitForSingleObject
SetEvent
MapViewOfFile
CreateFileMappingA
CloseHandle
OpenEventA
GetVersionExA
OutputDebugStringA
GetTickCount
GetTempPathA
GetDriveTypeA
_lcreat
_lopen
_lclose
_llseek
_lread
_lwrite
DeleteFileA
FindFirstFileA
FindNextFileA
GetCurrentDirectoryA
SetCurrentDirectoryA
GetWindowsDirectoryA
GetSystemDirectoryA
RemoveDirectoryA
CreateDirectoryA
ExitProcess
TerminateProcess
GetCurrentProcess
RtlUnwind
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
HeapAlloc
HeapFree
HeapReAlloc
RaiseException
GetProcAddress
MultiByteToWideChar
WideCharToMultiByte
LCMapStringA
LCMapStringW
HeapSize
UnhandledExceptionFilter
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
GetCPInfo
GetACP
GetOEMCP
SetHandleCount
GetStdHandle
GetFileType
HeapDestroy
HeapCreate
VirtualFree
WriteFile
VirtualAlloc
SetUnhandledExceptionFilter
GetLastError
SetFilePointer
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadWritePtr
IsBadCodePtr
LoadLibraryA
SetStdHandle
FlushFileBuffers
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
InterlockedExchange
EnterCriticalSection
GetCurrentProcessId
dsound
DirectSoundCreate
ddraw
DirectDrawCreate
winmm
timeGetTime
auxGetVolume
mciSendCommandA
timeKillEvent
waveOutGetNumDevs
auxGetDevCapsA
auxGetNumDevs
waveOutGetDevCapsA
auxSetVolume
waveOutGetVolume
timeSetEvent
waveOutSetVolume
avifil32
AVIStreamInfoA
AVIStreamStart
AVIStreamRead
AVIStreamReadFormat
AVIFileGetStream
AVIFileRelease
AVIStreamRelease
AVIFileExit
AVIFileInit
AVIFileOpenA
AVIStreamLength
AVIStreamSampleToTime
AVIStreamTimeToSample
msvfw32
ICLocate
ICDecompress
ICClose
ICSendMessage
Sections
.text Size: 501KB - Virtual size: 500KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 148KB - Virtual size: 330KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ