Static task
static1
Behavioral task
behavioral1
Sample
408eb90777d241ef6262ab2264c5612f85e7fd4afe2ce875e5a3f9e8a842a363.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
408eb90777d241ef6262ab2264c5612f85e7fd4afe2ce875e5a3f9e8a842a363.exe
Resource
win10v2004-20220414-en
General
-
Target
408eb90777d241ef6262ab2264c5612f85e7fd4afe2ce875e5a3f9e8a842a363
-
Size
370KB
-
MD5
5faf71a3d9ffc1630c72da2ad1b608ac
-
SHA1
3afa63e50cbf8008a45538e62a717812916f879d
-
SHA256
408eb90777d241ef6262ab2264c5612f85e7fd4afe2ce875e5a3f9e8a842a363
-
SHA512
9e6846c0fa672f1bae3cc36eb3ed4c683f4c4e9d77dd0bdaa51d0c038cd8b41fd236dd11a0c08bc82d75612a04345096b08eb734e74af41a5a9fdc47f7f74210
-
SSDEEP
6144:vsW2f6WOZEeAOHojxaiToxfOCS2P81Gl/bvMsY0f5qFKrS:vs1uZEeNMvstVVkXef5qFKW
Malware Config
Signatures
Files
-
408eb90777d241ef6262ab2264c5612f85e7fd4afe2ce875e5a3f9e8a842a363.exe windows x86
9f06c584505e0d7c2a858f7e4c3daa36
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
LoadImageA
InvalidateRect
GetWindowDC
SetWindowRgn
CopyRect
OffsetRect
GetParent
DrawIcon
IsIconic
ExitWindowsEx
UnhookWindowsHookEx
UnregisterClassA
BeginDeferWindowPos
GetKeyboardType
DestroyWindow
LoadStringA
MessageBoxA
CharNextA
CreatePopupMenu
EnableWindow
EndPaint
FillRect
GetClientRect
GetCursorPos
GetDC
GetDesktopWindow
GetDlgCtrlID
DialogBoxParamA
GetDlgItemTextA
GetKeyState
GetSysColor
GetSystemMetrics
GetWindowLongA
GetWindowPlacement
GetWindowRect
LoadBitmapA
LoadIconA
DefWindowProcA
GetDlgItem
PostMessageA
PostQuitMessage
RegisterClassExA
ReleaseDC
SendDlgItemMessageA
SendMessageA
SetActiveWindow
SetDlgItemTextA
SetFocus
SetForegroundWindow
SetLayeredWindowAttributes
SetMenuItemBitmaps
SetScrollPos
SetScrollRange
SetTimer
SetWindowLongA
SetWindowPos
SetWindowTextA
ShowWindow
TrackPopupMenu
UpdateWindow
CreateWindowExA
CreateDialogParamA
CloseWindow
ChangeDisplaySettingsA
BeginPaint
AppendMenuA
wsprintfA
SetRect
GetTopWindow
GetWindowThreadProcessId
SetCursor
GetMessageA
TranslateMessage
ValidateRect
WindowFromPoint
MoveWindow
IsDialogMessageA
GetMenuCheckMarkDimensions
ModifyMenuA
GetMenuState
EnableMenuItem
CheckMenuItem
GetActiveWindow
CreateDialogIndirectParamA
IsWindowEnabled
GetNextDlgTabItem
EndDialog
RegisterWindowMessageA
WinHelpA
GetCapture
SetWindowsHookExA
CallNextHookEx
GetClassLongA
SetPropA
GetPropA
RemovePropA
GetFocus
IsWindow
GetWindowTextLengthA
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
DispatchMessageA
GetMessageTime
GetMessagePos
PeekMessageA
MapWindowPoints
IsWindowVisible
GetMenu
GetSubMenu
GetMenuItemID
GetMenuItemCount
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
PtInRect
CallWindowProcA
SystemParametersInfoA
GetWindow
ClientToScreen
ScreenToClient
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
LoadCursorA
GetSysColorBrush
GetClassNameA
DestroyMenu
comdlg32
GetSaveFileNameA
GetOpenFileNameA
ChooseColorA
shell32
ShellExecuteA
SHChangeNotify
advapi32
RegFlushKey
OpenProcessToken
StartServiceA
RegSetValueExA
AdjustTokenPrivileges
CloseServiceHandle
RegDeleteValueA
RegCreateKeyExA
RegDeleteKeyA
RegOpenKeyA
RegEnumKeyA
RegSetValueA
RegQueryValueExA
RegQueryValueA
RegOpenKeyExA
RegCreateKeyA
RegCloseKey
OpenServiceA
OpenSCManagerA
LookupPrivilegeValueA
GetTokenInformation
DeleteService
CreateServiceA
ControlService
wininet
InternetOpenW
InternetOpenUrlW
InternetReadFile
InternetCloseHandle
gdi32
CreateFontIndirectA
CreateRectRgn
CombineRgn
StretchBlt
GetBkColor
GetStockObject
CreateCompatibleDC
CreateCompatibleBitmap
ChoosePixelFormat
BitBlt
GetDeviceCaps
SaveDC
RestoreDC
GetClipBox
GetDIBits
GetObjectA
PtVisible
RectVisible
ExtTextOutA
Escape
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
CreateBitmap
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
TextOutA
SwapBuffers
SetTextColor
SetPixelFormat
SetBkMode
SetBkColor
SelectObject
Polygon
MoveToEx
LineTo
DeleteObject
DeleteDC
CreateSolidBrush
CreateFontA
SetMapMode
CreatePen
comctl32
ord17
ImageList_LoadImageA
version
VerQueryValueW
VerQueryValueA
GetFileVersionInfoSizeW
GetFileVersionInfoSizeA
GetFileVersionInfoW
GetFileVersionInfoA
netapi32
NetConnectionEnum
kernel32
VirtualFree
WriteFile
lstrcatA
lstrcmpiA
lstrcpyA
lstrlenA
GetThreadPriority
GetTempPathA
GetSystemInfo
SetFilePointer
GetSystemDirectoryA
GetProcAddress
GetPriorityClass
GetModuleHandleA
GetLocalTime
GetLastError
GetFileSize
GetCurrentThreadId
GetCurrentThread
GetCurrentProcess
GetCurrentDirectoryA
GetCommandLineA
FreeUserPhysicalPages
FreeLibrary
FindResourceA
ExitThread
ExitProcess
VirtualAlloc
DeleteFileA
CreateThread
CreateProcessA
CreateFileMappingA
CreateFileA
ReadFile
QueryPerformanceFrequency
QueryPerformanceCounter
OpenProcess
OpenFileMappingA
MapViewOfFile
MapUserPhysicalPages
LockResource
LoadResource
LoadLibraryA
GlobalUnlock
AllocateUserPhysicalPages
GlobalMemoryStatusEx
GlobalLock
GlobalFree
GlobalAlloc
GetWindowsDirectoryA
GetVersion
GetUserDefaultLangID
CreateDirectoryA
CloseHandle
GetTickCount
UnmapViewOfFile
TerminateThread
TerminateProcess
Sleep
SetThreadPriority
SetThreadAffinityMask
SetProcessAffinityMask
SetPriorityClass
HeapAlloc
HeapFree
GetSystemTimeAsFileTime
GetStartupInfoA
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
HeapReAlloc
HeapCreate
GetModuleHandleW
GetStdHandle
GetModuleFileNameA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
InterlockedDecrement
WideCharToMultiByte
GetTimeZoneInformation
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetCurrentProcessId
InitializeCriticalSectionAndSpinCount
RtlUnwind
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
MultiByteToWideChar
RaiseException
GetLocaleInfoA
GetStringTypeA
GetStringTypeW
HeapSize
GetConsoleCP
GetConsoleMode
FlushFileBuffers
LCMapStringA
LCMapStringW
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetStdHandle
CompareStringA
CompareStringW
SetEnvironmentVariableA
DeviceIoControl
Sections
.blow Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.trol Size: 97KB - Virtual size: 96KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 46KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 13KB - Virtual size: 344KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 209KB - Virtual size: 209KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ