Static task
static1
Behavioral task
behavioral1
Sample
4687a29d6a32a3933c8240f0d5b8cff85a8644b6988bc6a16adf848a4e8e212e.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
4687a29d6a32a3933c8240f0d5b8cff85a8644b6988bc6a16adf848a4e8e212e.exe
Resource
win10v2004-20220414-en
General
-
Target
4687a29d6a32a3933c8240f0d5b8cff85a8644b6988bc6a16adf848a4e8e212e
-
Size
228KB
-
MD5
0a79f532b330c5f43f00dbbbb6c7d5ad
-
SHA1
e0d275dbc665ba716b3fbdfa0eb22989df2a32a8
-
SHA256
4687a29d6a32a3933c8240f0d5b8cff85a8644b6988bc6a16adf848a4e8e212e
-
SHA512
f2c8252f21b81109c6ed5af4390f72b902318d0d70f9323f810c9361e389bb56743edcf2e4824375e3867573b29fa83902c45e077352480c12023907d3bdea8b
-
SSDEEP
6144:uk7xo+8R2jV7jd0Zsb8moZcOqxamF4WFL:usnV7SZsboWOqxZrF
Malware Config
Signatures
Files
-
4687a29d6a32a3933c8240f0d5b8cff85a8644b6988bc6a16adf848a4e8e212e.exe windows x86
eabd19b2306a7d7a4634f2a00d783f37
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
SetSecurityDescriptorOwner
SetSecurityDescriptorGroup
RegOpenKeyA
RegCreateKeyExA
QueryServiceStatus
OpenThreadToken
OpenServiceA
OpenSCManagerA
LookupPrivilegeValueA
SetServiceStatus
SetSecurityDescriptorDacl
RegisterServiceCtrlHandlerA
RegSetValueExA
RegEnumKeyA
InitializeSecurityDescriptor
StartServiceCtrlDispatcherA
OpenProcessToken
RegQueryValueExA
FreeSid
AllocateAndInitializeSid
RegOpenKeyExA
RegCloseKey
user32
GetKeyNameTextA
DrawEdge
IsDlgButtonChecked
GetWindowTextA
DispatchMessageA
PtInRect
GetClassNameA
GetWindowRect
GetDlgCtrlID
GetWindow
ClientToScreen
GetFocus
CheckMenuItem
EnableMenuItem
ModifyMenuA
LoadBitmapA
GetMenuCheckMarkDimensions
SetMenuItemBitmaps
GetWindowPlacement
IsIconic
GetKeyState
ValidateRect
LoadCursorA
GetSystemMetrics
GetDC
ReleaseDC
GetSysColor
GetSysColorBrush
UnhookWindowsHookEx
GetWindowThreadProcessId
SendMessageA
GetParent
GetWindowLongA
GetLastActivePopup
IsWindowEnabled
EnableWindow
SetWindowTextA
UnregisterClassA
MessageBoxA
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
SetWindowsHookExA
CallNextHookEx
PeekMessageA
PostQuitMessage
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
DestroyMenu
RegisterWindowMessageA
LoadIconA
WinHelpA
GetCapture
GetClassLongA
SetPropA
GetPropA
RemovePropA
IsWindow
GetForegroundWindow
GetDlgItem
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetForegroundWindow
GetClientRect
GetMenu
PostMessageA
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
CopyRect
DefWindowProcA
CallWindowProcA
SetWindowLongA
SetWindowPos
SystemParametersInfoA
gdi32
GetStockObject
DeleteDC
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
TextOutA
RectVisible
PtVisible
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
SetMapMode
RestoreDC
SaveDC
ExtTextOutA
SetBkColor
SetTextColor
GetClipBox
CreateBitmap
DeleteObject
GetDeviceCaps
comctl32
ImageList_DragEnter
ImageList_GetImageInfo
ImageList_GetImageCount
ImageList_EndDrag
ImageList_Create
comdlg32
GetSaveFileNameA
GetOpenFileNameA
ole32
CoUninitialize
CoInitialize
oleaut32
VariantInit
VariantChangeType
VariantClear
version
GetFileVersionInfoSizeA
VerQueryValueA
GetFileVersionInfoA
wininet
InternetConnectA
HttpSendRequestExA
InternetAttemptConnect
HttpEndRequestA
InternetWriteFile
InternetSetOptionA
InternetReadFile
InternetQueryOptionA
InternetQueryDataAvailable
InternetOpenA
InternetGetCookieA
InternetCrackUrlA
InternetCloseHandle
HttpSendRequestA
HttpOpenRequestA
HttpAddRequestHeadersA
shlwapi
PathRemoveBackslashA
UrlEscapeA
PathStripPathA
PathRemoveBlanksA
PathRemoveArgsA
winmm
timeEndPeriod
mciSendCommandA
mciGetErrorStringA
timeBeginPeriod
uxtheme
DrawThemeBackground
GetThemeBackgroundRegion
CloseThemeData
avifil32
AVIStreamFindSample
AVIStreamEndStreaming
AVIStreamSetFormat
AVIStreamRelease
AVIFileExit
AVIFileInit
kernel32
LocalAlloc
LocalFree
GetProcAddress
FreeLibrary
LoadLibraryA
RaiseException
VirtualProtect
lstrlenA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
GetConsoleMode
GetConsoleCP
GetACP
GetSystemTimeAsFileTime
GetTickCount
QueryPerformanceCounter
GetStartupInfoA
GetFileType
SetHandleCount
GetCommandLineW
GetCommandLineA
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetStdHandle
HeapCreate
HeapDestroy
VirtualFree
ExitProcess
HeapSize
GetStartupInfoW
GetProcessHeap
RtlUnwind
VirtualAlloc
HeapReAlloc
HeapFree
HeapAlloc
CreateFileA
GetCurrentProcess
FlushFileBuffers
SetFilePointer
WriteFile
GetOEMCP
GetCPInfo
GetLocaleInfoA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
lstrcmpW
GetVersionExA
GetThreadLocale
GlobalGetAtomNameA
GlobalFlags
lstrcmpA
CloseHandle
InterlockedIncrement
InterlockedDecrement
GetModuleFileNameW
GetModuleHandleA
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageA
FindResourceA
LoadResource
LockResource
SizeofResource
SetLastError
InterlockedExchange
MultiByteToWideChar
WideCharToMultiByte
CompareStringA
GetWindowsDirectoryA
GetSystemInfo
GetTempPathA
GetSystemDirectoryA
Sleep
GetEnvironmentVariableA
FindFirstChangeNotificationA
FindNextChangeNotification
FindCloseChangeNotification
GetModuleFileNameA
GetFileTime
GetCurrentProcessId
GetLocalTime
RemoveDirectoryA
GetCurrentThreadId
SetFileAttributesA
CreateProcessA
GetVersion
GetLastError
Sections
.text Size: 124KB - Virtual size: 121KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 44KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 8.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 44KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ