Static task
static1
Behavioral task
behavioral1
Sample
639af330da2d4389a6ecb1c3e26e5449c3c4fae7f198d158cbcdadc9466d1bcc.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
639af330da2d4389a6ecb1c3e26e5449c3c4fae7f198d158cbcdadc9466d1bcc.exe
Resource
win10v2004-en-20220113
General
-
Target
639af330da2d4389a6ecb1c3e26e5449c3c4fae7f198d158cbcdadc9466d1bcc
-
Size
346KB
-
MD5
8afc9f287ef0f3495b259e497b30f39e
-
SHA1
bba18a946f11439c766478236b33b3bfcdc2c4fc
-
SHA256
639af330da2d4389a6ecb1c3e26e5449c3c4fae7f198d158cbcdadc9466d1bcc
-
SHA512
ca44ca63b5f152ceb8fa988f52f42e0b63ade0d11e2ea023532a2640813235ee0ad5171ddd255e8b86c6686ade64218f3e3c591744a4cf5ba04978f3c14b6d69
-
SSDEEP
6144:6KWws5s9U4rLrLrLd+TqVs/w1Q1I/0Qp33BcaNrZP+opV50DEr53Ng/ydlb4fQ6:JyiBnZiDs3Ng6dNoQl+vW
Malware Config
Signatures
Files
-
639af330da2d4389a6ecb1c3e26e5449c3c4fae7f198d158cbcdadc9466d1bcc.exe windows x86
229beae836924b14ad014e8d7953b9fd
Code Sign
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
DeferWindowPos
CreateWindowExW
GetForegroundWindow
CloseWindow
AnimateWindow
EnumChildWindows
PostQuitMessage
ShutdownBlockReasonCreate
DefWindowProcA
ShutdownBlockReasonDestroy
RegisterClassExW
GetMessageA
TranslateMessage
DispatchMessageA
ReleaseDC
AdjustWindowRect
DestroyWindow
MessageBoxW
wsprintfW
wsprintfA
gdi32
DeleteObject
SetPixel
GetDeviceCaps
SelectPalette
SetPaletteEntries
kernel32
GetFileSize
LocalAlloc
ReadFile
CloseHandle
WriteFile
DeviceIoControl
OpenMutexW
CreateMutexW
lstrlenA
GetModuleHandleA
LoadLibraryA
lstrcpyA
lstrcatA
GetProcAddress
GetTickCount
VirtualFree
ExitThread
CreateThread
TlsSetValue
lstrcatW
ExitProcess
WaitForSingleObject
OutputDebugStringW
CreateFileA
GetLastError
HeapAlloc
CreateFileW
VirtualAlloc
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
GetModuleHandleW
GetSystemDirectoryW
GetWindowsDirectoryA
GetShortPathNameW
ExpandEnvironmentStringsW
Sleep
GetCurrentProcessId
VirtualQuery
VirtualProtect
IsBadReadPtr
FreeLibrary
lstrcmpA
UnmapViewOfFile
lstrcmpiW
lstrlenW
lstrcpyW
MoveFileExW
FindFirstFileW
lstrcmpW
FindNextFileW
FindClose
WaitForMultipleObjects
GetDriveTypeW
GetTickCount64
SetThreadExecutionState
IsProcessorFeaturePresent
SetFilePointerEx
CreateFileMappingW
MapViewOfFile
GetCurrentProcess
LocalFree
GetUserDefaultUILanguage
InitializeCriticalSection
DeleteCriticalSection
SetLastError
EnterCriticalSection
LeaveCriticalSection
TerminateThread
GlobalAlloc
GlobalFree
Beep
MoveFileExA
GetVersionExA
CreateProcessW
TlsGetValue
GetFileSizeEx
advapi32
LsaFreeMemory
EqualDomainSid
LsaQueryTrustedDomainInfo
InitializeSecurityDescriptor
CryptDecrypt
CryptEncrypt
CryptImportKey
GetSidSubAuthority
GetSidSubAuthorityCount
EncryptionDisable
AreAllAccessesGranted
LsaAddAccountRights
CryptReleaseContext
CryptDestroyKey
CryptExportKey
CryptGenKey
CryptAcquireContextW
LsaClose
LsaCreateTrustedDomainEx
LookupAccountSidW
CryptGenRandom
shell32
SHGetFolderPathW
ShellExecuteExW
secur32
LsaConnectUntrusted
netapi32
DsRoleFreeMemory
DsRoleGetPrimaryDomainInformation
shlwapi
StrToIntA
StrStrW
mpr
WNetAddConnection2W
WNetEnumResourceW
WNetOpenEnumW
WNetCloseEnum
ws2_32
WSAGetLastError
shutdown
closesocket
connect
htons
inet_addr
WSACleanup
socket
WSAStartup
inet_pton
gethostbyname
recv
send
inet_ntoa
wininet
InternetReadFile
InternetCloseHandle
HttpQueryInfoA
HttpSendRequestA
HttpOpenRequestA
InternetConnectA
InternetCrackUrlA
InternetOpenA
crypt32
CryptBinaryToStringA
CryptStringToBinaryA
ole32
CoCreateInstance
CoInitializeEx
CoUninitialize
Sections
.text Size: 217KB - Virtual size: 217KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 62KB - Virtual size: 62KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 65KB - Virtual size: 64KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE