Static task
static1
Behavioral task
behavioral1
Sample
630b748ad6f349a147792e4e26cdfd54a79af57b308987f7686659243946ca48.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
630b748ad6f349a147792e4e26cdfd54a79af57b308987f7686659243946ca48.exe
Resource
win10v2004-20220812-en
General
-
Target
630b748ad6f349a147792e4e26cdfd54a79af57b308987f7686659243946ca48
-
Size
212KB
-
MD5
b1f6d0df9bd7f9316d6c96adf6ac8e0b
-
SHA1
5ee0c102cf2ef61a4c662940d2981897deda41fc
-
SHA256
630b748ad6f349a147792e4e26cdfd54a79af57b308987f7686659243946ca48
-
SHA512
b279e90ea1975077c21e4022a2f4422d6d10204cc73087052e81e65df96f8341251fad50c06a6041cd684bb9d2ca54d16ea4cd168b430959058e062d8ab9adae
-
SSDEEP
3072:etnOaLESg7Ho76VaAQ/IglSW+LsEdbCmTHjwb+KhWG3uhGsJW3KzyqYxbYywB:KnhLEJTo7KFQwE+maKcG3QGVKzyPxcL
Malware Config
Signatures
Files
-
630b748ad6f349a147792e4e26cdfd54a79af57b308987f7686659243946ca48.exe windows x86
1147fde18dd7bc9644264f2a0280eaa4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
dicomdiroperate
GetFirstSeries
GetNextSeries
ExitDicomDir
InitDicomDir
version
GetFileVersionInfoSizeA
VerQueryValueA
GetFileVersionInfoA
imagedll
?GetMessageMap@CImageBoxDLLIO@@MBEPBUAFX_MSGMAP@@XZ
??0CImageBoxDLLIO@@QAE@XZ
?InitImageBoxExtDLL@@YAXXZ
??1CImageBoxDLLIO@@UAE@XZ
?ReleaseImageBoxExtDLL@@YAXXZ
?SetImageFileList@CImageBoxDLLIO@@QAEHPAJ@Z
?RemoveAllImages@CImageBoxDLLIO@@QAEHH@Z
?SetCheckString@CImageBoxDLLIO@@QAEHABVCString@@0@Z
checkdll
?CheckDLLInit@@YAHVCString@@0@Z
msimg32
GradientFill
mfc42
ord939
ord2107
ord5450
ord5440
ord6383
ord6394
ord5265
ord4376
ord4853
ord4998
ord4710
ord6052
ord4078
ord1775
ord4407
ord5241
ord2385
ord5163
ord6374
ord4353
ord5280
ord3798
ord4837
ord4441
ord2648
ord2055
ord6376
ord3749
ord5065
ord1727
ord5261
ord2446
ord2124
ord5277
ord4627
ord4425
ord3597
ord324
ord4234
ord3573
ord1146
ord668
ord6199
ord926
ord922
ord1980
ord2770
ord924
ord356
ord6877
ord4278
ord2764
ord4204
ord6334
ord4299
ord2864
ord4160
ord2863
ord2379
ord755
ord470
ord6055
ord1776
ord5290
ord3742
ord2086
ord6215
ord6453
ord4476
ord1641
ord5710
ord2818
ord3619
ord4083
ord1802
ord6605
ord6880
ord3402
ord3721
ord567
ord795
ord2302
ord3092
ord5875
ord665
ord1979
ord3318
ord5186
ord354
ord5216
ord4277
ord6283
ord6282
ord4202
ord5442
ord2370
ord4224
ord940
ord2614
ord2135
ord818
ord1949
ord4034
ord801
ord541
ord6143
ord6883
ord3996
ord4284
ord6905
ord3409
ord3825
ord920
ord3810
ord2814
ord6270
ord1644
ord3181
ord3178
ord2781
ord4058
ord2652
ord1572
ord1669
ord1862
ord4220
ord2584
ord3654
ord640
ord323
ord2438
ord816
ord5789
ord562
ord2450
ord941
ord561
ord5785
ord3571
ord5787
ord283
ord2763
ord2405
ord1795
ord2575
ord4396
ord3574
ord809
ord609
ord556
ord4275
ord5053
ord5981
ord3874
ord4133
ord4297
ord5788
ord472
ord2859
ord613
ord289
ord2122
ord2567
ord3708
ord781
ord5937
ord1844
ord2580
ord3630
ord4400
ord682
ord3089
ord2860
ord2754
ord6654
ord2862
ord5759
ord6192
ord5756
ord6186
ord4330
ord6189
ord6021
ord6172
ord5873
ord5794
ord5678
ord5736
ord5579
ord5571
ord6061
ord5864
ord3596
ord6194
ord4243
ord3370
ord2582
ord4402
ord3640
ord686
ord693
ord384
ord6242
ord6696
ord3706
ord5781
ord3803
ord6442
ord1233
ord3301
ord3797
ord6762
ord3286
ord3293
ord6007
ord6907
ord955
ord3021
ord3693
ord2380
ord3711
ord1771
ord6366
ord2413
ord2024
ord4219
ord2581
ord4401
ord3639
ord692
ord783
ord6128
ord3752
ord859
ord2112
ord2099
ord3831
ord3830
ord2976
ord3081
ord2985
ord3262
ord3136
ord4465
ord3259
ord3147
ord2982
ord5714
ord5289
ord5307
ord4698
ord4079
ord5302
ord5300
ord3346
ord2396
ord5199
ord1089
ord3922
ord5731
ord2512
ord2554
ord4486
ord537
ord1168
ord5572
ord5683
ord4129
ord860
ord2725
ord2915
ord823
ord535
ord1134
ord6438
ord2621
ord858
ord1200
ord2514
ord2841
ord2414
ord641
ord3626
ord3663
ord2971
ord825
ord6375
ord4274
ord4673
ord540
ord815
ord800
ord3738
ord4424
ord4622
ord4080
ord1640
ord3079
ord3228
ord1576
msvcrt
_setmbcp
_strupr
__CxxFrameHandler
sprintf
atoi
_ftol
div
free
malloc
strncpy
strstr
__dllonexit
_onexit
_except_handler3
?terminate@@YAXXZ
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_controlfp
kernel32
GetModuleHandleA
lstrcpynA
GlobalFree
MulDiv
GlobalAlloc
GlobalLock
GlobalUnlock
GetCurrentDirectoryA
GetPrivateProfileStringA
GetModuleFileNameA
GetDriveTypeA
GetProcAddress
CreateMutexA
GetLastError
GetStartupInfoA
user32
GrayStringA
RegisterWindowMessageA
LoadCursorA
GetFocus
SetTimer
IsWindow
PtInRect
UpdateWindow
KillTimer
ScreenToClient
DrawStateA
SetScrollPos
BringWindowToTop
GetSysColor
IsIconic
GetSystemMetrics
GetClientRect
DrawIcon
GetSystemMenu
AppendMenuA
DrawTextA
GetWindowRect
GetWindow
SystemParametersInfoA
LoadIconA
FrameRect
DrawFocusRect
TrackPopupMenuEx
PostMessageA
ClientToScreen
WindowFromPoint
GetActiveWindow
InvalidateRect
SetCursor
GetParent
GetNextDlgTabItem
DestroyCursor
DestroyMenu
GetMenuItemCount
GetMenuItemInfoA
GetSubMenu
DrawFrameControl
OffsetRect
DrawIconEx
DrawEdge
InflateRect
DestroyIcon
GetCursorPos
CreatePopupMenu
GetWindowLongA
SetWindowLongA
SendMessageA
TabbedTextOutA
MapVirtualKeyA
LoadImageA
GetIconInfo
GetDC
ReleaseDC
CreateIconIndirect
CopyRect
FillRect
GetKeyNameTextA
EnableWindow
gdi32
DeleteObject
SelectObject
CreateFontA
GetTextColor
BitBlt
Rectangle
CreateCompatibleDC
PatBlt
CreateBitmap
CreateCompatibleBitmap
GetStockObject
DeleteDC
SetBkColor
SetPixel
GetPixel
GetCurrentObject
GetBkColor
GetTextExtentPoint32A
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
CreateRectRgn
RoundRect
CreatePen
GetObjectA
CreateFontIndirectA
CreateDIBitmap
CreateSolidBrush
advapi32
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
shell32
ShellExecuteExA
comctl32
_TrackMouseEvent
ImageList_GetImageInfo
ImageList_GetBkColor
ImageList_SetBkColor
ole32
CreateStreamOnHGlobal
CLSIDFromString
olepro32
ord251
oleaut32
VariantClear
setupapi
SetupDiDestroyDeviceInfoList
SetupDiEnumDeviceInterfaces
SetupDiGetClassDevsA
SetupDiGetDeviceInterfaceDetailA
Sections
.text Size: 136KB - Virtual size: 133KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 32KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 36KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ