Static task
static1
Behavioral task
behavioral1
Sample
41e328055802f241a6b733563c04aa5945ad667bc1f0807b672c11c7fa477d17.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
41e328055802f241a6b733563c04aa5945ad667bc1f0807b672c11c7fa477d17.exe
Resource
win10v2004-20220414-en
General
-
Target
41e328055802f241a6b733563c04aa5945ad667bc1f0807b672c11c7fa477d17
-
Size
407KB
-
MD5
217e5f6481da0dc7c88a39c8acc51f2e
-
SHA1
a1db164026ad38fb1937ac27d3de2fc09de9ea47
-
SHA256
41e328055802f241a6b733563c04aa5945ad667bc1f0807b672c11c7fa477d17
-
SHA512
c8dd0b61e1a5f019cb87f4cc6089a6b24409ef28e1318ae4616d6cf4e3ee5f167d384fc4cf283d3e865590b03db85caad1f1568371e1cbc5c78a25c46ff250f4
-
SSDEEP
6144:396qsrJ0LOMc6iAOhgrwOaw6qP7yTsYwXL0Q8DJl8cY4hBgAZBFnjXt9:3Yqslsc5fU0OuoYwXLr8Vl6yZ7FnR9
Malware Config
Signatures
Files
-
41e328055802f241a6b733563c04aa5945ad667bc1f0807b672c11c7fa477d17.exe windows x86
1be980bb07e7f00a2fbd5c503508452e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
LoadImageA
InvalidateRect
GetWindowDC
GetKeyboardType
DestroyWindow
LoadStringA
MessageBoxA
CharNextA
CreatePopupMenu
EnableWindow
EndPaint
FillRect
GetClientRect
GetCursorPos
GetDC
GetDesktopWindow
GetDlgCtrlID
DialogBoxParamA
SetWindowRgn
GetKeyState
GetSysColor
GetSystemMetrics
GetWindowLongA
GetWindowPlacement
GetWindowRect
LoadBitmapA
LoadIconA
DefWindowProcA
GetDlgItem
PostMessageA
PostQuitMessage
RegisterClassExA
ReleaseDC
SendDlgItemMessageA
SendMessageA
SetActiveWindow
SetDlgItemTextA
SetFocus
SetForegroundWindow
SetLayeredWindowAttributes
SetMenuItemBitmaps
GetDlgItemTextA
TranslateMessage
SetScrollPos
SetScrollRange
SetTimer
SetWindowLongA
SetWindowPos
SetWindowTextA
ShowWindow
TrackPopupMenu
UpdateWindow
CreateWindowExA
CreateDialogParamA
CloseWindow
ChangeDisplaySettingsA
BeginPaint
AppendMenuA
wsprintfA
SetRect
UnregisterClassA
GetWindowThreadProcessId
SetCursor
GetMessageA
GetTopWindow
ValidateRect
WindowFromPoint
MoveWindow
IsDialogMessageA
GetMenuCheckMarkDimensions
ModifyMenuA
GetMenuState
EnableMenuItem
CheckMenuItem
GetActiveWindow
CreateDialogIndirectParamA
IsWindowEnabled
GetNextDlgTabItem
EndDialog
RegisterWindowMessageA
WinHelpA
GetCapture
SetWindowsHookExA
CallNextHookEx
GetClassLongA
SetPropA
GetPropA
RemovePropA
GetFocus
IsWindow
GetWindowTextLengthA
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
DispatchMessageA
GetMessageTime
GetMessagePos
PeekMessageA
MapWindowPoints
IsWindowVisible
GetMenu
GetSubMenu
GetMenuItemID
GetMenuItemCount
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
PtInRect
CallWindowProcA
SystemParametersInfoA
GetWindow
ClientToScreen
ScreenToClient
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
LoadCursorA
GetSysColorBrush
GetClassNameA
DestroyMenu
UnhookWindowsHookEx
ExitWindowsEx
IsIconic
DrawIcon
GetParent
OffsetRect
CopyRect
comdlg32
GetSaveFileNameA
GetOpenFileNameA
ChooseColorA
shell32
ShellExecuteA
SHChangeNotify
advapi32
DeleteService
RegDeleteKeyA
RegOpenKeyA
RegEnumKeyA
RegDeleteValueA
OpenProcessToken
StartServiceA
RegSetValueExA
AdjustTokenPrivileges
CloseServiceHandle
ControlService
CreateServiceA
GetTokenInformation
LookupPrivilegeValueA
OpenSCManagerA
OpenServiceA
RegCloseKey
RegCreateKeyA
RegFlushKey
RegOpenKeyExA
RegQueryValueA
RegQueryValueExA
RegSetValueA
RegCreateKeyExA
wininet
InternetOpenW
InternetOpenUrlW
InternetReadFile
InternetCloseHandle
gdi32
SaveDC
GetDeviceCaps
GetStockObject
CreateFontIndirectA
RestoreDC
CreateRectRgn
GetClipBox
GetDIBits
GetObjectA
PtVisible
RectVisible
ExtTextOutA
Escape
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
CreateBitmap
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
TextOutA
SwapBuffers
SetTextColor
SetPixelFormat
SetBkMode
SetBkColor
SelectObject
Polygon
MoveToEx
LineTo
DeleteObject
DeleteDC
CreateSolidBrush
CreatePen
CreateFontA
CreateCompatibleDC
CreateCompatibleBitmap
ChoosePixelFormat
BitBlt
CombineRgn
StretchBlt
SetMapMode
GetBkColor
comctl32
ord17
ImageList_LoadImageA
netapi32
NetUserAdd
kernel32
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetStartupInfoA
GetCommandLineA
GetSystemTimeAsFileTime
HeapFree
SetUnhandledExceptionFilter
HeapReAlloc
GetLastError
GetWindowsDirectoryA
GetVersion
GetUserDefaultLangID
CreateDirectoryA
CloseHandle
IsDebuggerPresent
Sleep
GetModuleHandleW
GetProcAddress
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
HeapCreate
VirtualFree
VirtualAlloc
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
GetModuleHandleA
WideCharToMultiByte
GetTimeZoneInformation
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
RtlUnwind
MultiByteToWideChar
InitializeCriticalSectionAndSpinCount
LoadLibraryA
RaiseException
GetLocaleInfoA
GetStringTypeA
GetStringTypeW
HeapSize
LCMapStringA
LCMapStringW
GetConsoleCP
GetConsoleMode
FlushFileBuffers
ReadFile
SetFilePointer
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetStdHandle
CompareStringA
CompareStringW
SetEnvironmentVariableA
CreateFileA
HeapAlloc
Sections
.hex Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.recode Size: 111KB - Virtual size: 110KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 47KB - Virtual size: 46KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 13KB - Virtual size: 344KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 217KB - Virtual size: 216KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ