Static task
static1
Behavioral task
behavioral1
Sample
d38d75498bd40732b8a11413455a958bc4886a3b5d0fbe11e8f9f687eb09a727.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
d38d75498bd40732b8a11413455a958bc4886a3b5d0fbe11e8f9f687eb09a727.exe
Resource
win10v2004-20230220-en
General
-
Target
d38d75498bd40732b8a11413455a958bc4886a3b5d0fbe11e8f9f687eb09a727
-
Size
348KB
-
MD5
61978cad6a8d1de9bee5cdd5ea80dece
-
SHA1
6db2b9fcecd7680c2796bf436edfa55fcc780f88
-
SHA256
d38d75498bd40732b8a11413455a958bc4886a3b5d0fbe11e8f9f687eb09a727
-
SHA512
dd0a249959f557b394e71d9a65b8c24370b9ccf026def85864145f8a8e61086498464e11245f1cfa81a29cac7b3c3f915cc3385d8eea6355790218305d644dd8
-
SSDEEP
6144:JtcPX2o9xsEAoKVkJnirYQ+kPbA2fk13aaD1St6ySEPO:JqjswKWJn5OPskGDYAEPO
Malware Config
Signatures
Files
-
d38d75498bd40732b8a11413455a958bc4886a3b5d0fbe11e8f9f687eb09a727.exe windows x86
fad646691f074cfaa0682078afe51f97
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindClose
FindFirstFileW
GetVolumeInformationW
GetFullPathNameW
SetErrorMode
FileTimeToLocalFileTime
GetFileAttributesW
GetFileTime
GetTickCount
HeapFree
HeapAlloc
GetProcessHeap
GetStartupInfoW
ExitProcess
UnhandledExceptionFilter
IsDebuggerPresent
GetSystemTimeAsFileTime
RtlUnwind
RaiseException
HeapReAlloc
HeapSize
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetCommandLineA
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
DuplicateHandle
HeapCreate
VirtualFree
QueryPerformanceCounter
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
Sleep
GetTimeZoneInformation
GetConsoleCP
GetConsoleMode
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CreateFileA
SetEnvironmentVariableA
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
ReadFile
FileTimeToSystemTime
GetThreadLocale
lstrlenA
InterlockedIncrement
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
GlobalHandle
GlobalReAlloc
TlsGetValue
LocalAlloc
GlobalFlags
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
GetVersionExW
ResumeThread
GetCurrentThread
WriteProcessMemory
VirtualProtectEx
ReadProcessMemory
VirtualQueryEx
VirtualAllocEx
ConvertDefaultLocale
GetVersion
EnumResourceLanguagesW
lstrcmpA
GetLocaleInfoW
CompareStringA
InterlockedExchange
InterlockedDecrement
WideCharToMultiByte
GlobalAlloc
FormatMessageW
LocalFree
lstrlenW
MulDiv
GetModuleHandleA
GlobalLock
GlobalUnlock
GlobalFree
GlobalAddAtomW
GlobalFindAtomW
GlobalDeleteAtom
CompareStringW
LoadLibraryA
SetLastError
lstrcmpW
MultiByteToWideChar
GetVersionExA
DeleteFileW
GetCurrentProcessId
GetCurrentThreadId
GetLocalTime
SetUnhandledExceptionFilter
GetModuleFileNameA
FreeResource
WriteFile
SizeofResource
LockResource
LoadResource
FindResourceW
Process32NextW
Module32NextW
TerminateProcess
OpenProcess
Module32FirstW
Process32FirstW
CreateToolhelp32Snapshot
CreateProcessW
LoadLibraryW
GetEnvironmentStringsW
FreeLibrary
GetCurrentProcess
UnmapViewOfFile
MapViewOfFile
CreateFileMappingW
CreateFileW
CloseHandle
GetModuleHandleW
GetProcAddress
GetLastError
CreateMutexW
GetModuleFileNameW
WritePrivateProfileStringW
ExpandEnvironmentStringsW
GetPrivateProfileStringW
HeapDestroy
user32
MessageBeep
GetNextDlgGroupItem
InvalidateRgn
SetRect
IsRectEmpty
CopyAcceleratorTableW
CharNextW
CharUpperW
ReleaseCapture
SetCapture
UnregisterClassW
DestroyMenu
GetSysColorBrush
SetWindowContextHelpId
MapDialogRect
GetMessageW
TranslateMessage
ValidateRect
PostQuitMessage
GetCursorPos
WindowFromPoint
ShowWindow
MoveWindow
SetWindowTextW
IsDialogMessageW
SetDlgItemTextW
GetDlgItemTextW
GetWindowThreadProcessId
EndPaint
BeginPaint
GetWindowDC
ReleaseDC
GetDC
ClientToScreen
GrayStringW
DrawTextW
TabbedTextOutW
GetDesktopWindow
GetActiveWindow
CreateDialogIndirectParamW
IsWindowEnabled
GetNextDlgTabItem
EndDialog
SendDlgItemMessageW
SendDlgItemMessageA
WinHelpW
IsChild
GetCapture
CallNextHookEx
GetClassLongW
GetClassNameW
SetPropW
GetPropW
RemovePropW
IsWindow
SetFocus
GetWindowTextLengthW
GetWindowTextW
GetForegroundWindow
GetLastActivePopup
SetActiveWindow
DispatchMessageW
GetDlgItem
GetTopWindow
DestroyWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
PeekMessageW
MapWindowPoints
GetKeyState
SetForegroundWindow
IsWindowVisible
UpdateWindow
GetMenu
PostMessageW
GetSubMenu
GetMenuItemID
GetMenuItemCount
PostThreadMessageW
MessageBoxW
CreateWindowExW
GetClassInfoExW
RegisterClipboardFormatW
DrawTextExW
GetClassInfoW
RegisterClassW
AdjustWindowRectEx
ScreenToClient
EqualRect
PtInRect
GetDlgCtrlID
DefWindowProcW
CallWindowProcW
GetWindowLongW
SetWindowLongW
SetWindowPos
OffsetRect
IntersectRect
SystemParametersInfoA
GetWindowPlacement
GetWindowRect
GetWindow
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapW
ModifyMenuW
GetMenuState
EnableMenuItem
CheckMenuItem
LoadIconW
DrawIcon
GetSystemMetrics
IsIconic
InvalidateRect
DrawFocusRect
GetFocus
CopyRect
GetClientRect
LoadCursorW
GetSysColor
SetCursor
GetParent
SendMessageW
EnableWindow
RegisterWindowMessageW
SetWindowsHookExW
UnregisterClassA
gdi32
GetStockObject
GetDeviceCaps
RectVisible
DeleteDC
CreateRectRgnIndirect
GetMapMode
GetBkColor
GetTextColor
GetRgnBox
ExtSelectClipRgn
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutW
CreateFontW
PtVisible
GetWindowExtEx
GetViewportExtEx
DeleteObject
SetMapMode
SetBkMode
RestoreDC
SaveDC
SetBkColor
SetTextColor
GetClipBox
CreateBitmap
GetObjectW
GetTextExtentPoint32W
CreateFontIndirectW
TextOutW
comdlg32
GetFileTitleW
winspool.drv
DocumentPropertiesW
OpenPrinterW
ClosePrinter
advapi32
RegDeleteKeyW
LookupPrivilegeValueW
RegSetValueExW
RegCreateKeyExW
RegQueryValueW
RegEnumKeyW
OpenProcessToken
RegOpenKeyExW
RegQueryValueExW
RegOpenKeyW
RegCloseKey
AdjustTokenPrivileges
shell32
ShellExecuteW
DragQueryFileW
DragFinish
SHCreateDirectoryExW
ord43
comctl32
_TrackMouseEvent
InitCommonControlsEx
shlwapi
PathFindFileNameA
PathMatchSpecW
PathAddBackslashW
PathFindExtensionW
PathStripToRootW
PathFindFileNameW
PathFileExistsW
PathIsUNCW
oledlg
OleUIBusyW
ole32
CoFreeUnusedLibraries
OleUninitialize
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoGetClassObject
CLSIDFromString
CLSIDFromProgID
OleInitialize
CoRevokeClassObject
CoTaskMemAlloc
CoTaskMemFree
CoCreateInstance
CoInitialize
OleIsCurrentClipboard
OleFlushClipboard
CoRegisterMessageFilter
oleaut32
SysAllocString
OleCreateFontIndirect
SystemTimeToVariantTime
VariantTimeToSystemTime
SafeArrayDestroy
VariantCopy
VariantClear
VariantChangeType
VariantInit
SysAllocStringLen
SysStringLen
SysFreeString
dbghelp
MiniDumpWriteDump
Sections
.text Size: 232KB - Virtual size: 229KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 60KB - Virtual size: 58KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 40KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ