Static task
static1
Behavioral task
behavioral1
Sample
8965c58cf8a313252ab16120670c9ccafdf3e08ed33dfba8cdcd69c72cb24667.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
8965c58cf8a313252ab16120670c9ccafdf3e08ed33dfba8cdcd69c72cb24667.exe
Resource
win10v2004-20220722-en
General
-
Target
8965c58cf8a313252ab16120670c9ccafdf3e08ed33dfba8cdcd69c72cb24667
-
Size
706KB
-
MD5
4eab433fea4082d483a43e61e3012175
-
SHA1
20b3a5ac1aa5798c818ef5eba3782ae9492b6af1
-
SHA256
8965c58cf8a313252ab16120670c9ccafdf3e08ed33dfba8cdcd69c72cb24667
-
SHA512
66bc0edd1cba3d44f8eaef58be0aec8efdf48828f359079e0385d96927d1f2609f33ddc09eededb3e94c0b9c458c6a474798a635d22cedf22bda81f4d9178024
-
SSDEEP
12288:mRB7zZ8OC3IHq11z2qq2HLzhrFktisUuDRVMCiXDQlq:mR1C3Z9oU1F8i0tVHiTIq
Malware Config
Signatures
Files
-
8965c58cf8a313252ab16120670c9ccafdf3e08ed33dfba8cdcd69c72cb24667.exe windows x86
b9cdf0e14bdc3561bdd7cffe6ebe1cd0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
TerminateProcess
IsProcessorFeaturePresent
LCMapStringW
SetLastError
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
IsValidCodePage
GetOEMCP
GetACP
InterlockedDecrement
InterlockedIncrement
GetCPInfo
HeapCreate
GetStartupInfoW
UnhandledExceptionFilter
GetCommandLineA
LeaveCriticalSection
EnterCriticalSection
RaiseException
ExitProcess
GetModuleHandleW
GetModuleFileNameW
GetStdHandle
GetFileType
WriteConsoleW
RtlUnwind
EncodePointer
DecodePointer
HeapSize
HeapReAlloc
HeapAlloc
HeapFree
SetHandleCount
GetConsoleCP
SetUnhandledExceptionFilter
IsDebuggerPresent
GetLocaleInfoW
LoadLibraryW
Sleep
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
GetConsoleMode
FlushFileBuffers
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetStringTypeW
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
SetStdHandle
CreateFileW
InitializeCriticalSection
SetEndOfFile
SystemTimeToFileTime
LoadLibraryExA
FreeLibrary
CreateEventA
GetConsoleWindow
GetWindowsDirectoryA
AllocateUserPhysicalPages
GetCurrentProcess
DeviceIoControl
LoadLibraryA
GetProcAddress
SetFilePointer
GetProfileStringA
GlobalFree
FileTimeToSystemTime
CreateThread
GetExitCodeThread
WaitForSingleObject
MoveFileA
GetDriveTypeA
FindFirstFileA
FindClose
FindNextFileA
CreateMutexA
GetCurrentThreadId
GlobalGetAtomNameA
DeleteFileA
RemoveDirectoryA
GetFileAttributesA
GetLastError
CompareFileTime
GetFileSize
GetFileTime
CopyFileA
GlobalAddAtomA
GlobalDeleteAtom
GetSystemDirectoryA
GetVersionExA
FindResourceA
SizeofResource
LoadResource
LockResource
WritePrivateProfileStringA
MoveFileExA
GetLocalTime
GetModuleFileNameA
CreateDirectoryA
lstrcmpA
lstrcmpiA
WriteFile
CreateFileA
GetProcessHeap
ReadFile
CloseHandle
GlobalAlloc
GlobalLock
lstrcatA
GlobalUnlock
IsDBCSLeadByte
WideCharToMultiByte
MultiByteToWideChar
GetTickCount
GetModuleHandleA
lstrcpyA
lstrcpynA
HeapSetInformation
lstrlenA
user32
DeleteMenu
InflateRect
GetWindowTextLengthA
LoadImageA
RegisterClassExA
GetMessageA
IsDialogMessageA
TranslateMDISysAccel
InsertMenuA
DrawMenuBar
DefMDIChildProcA
DefFrameProcA
IsIconic
GetMenu
SetWindowsHookExA
IntersectRect
IsRectEmpty
GetForegroundWindow
SetPropA
CallNextHookEx
IsZoomed
RedrawWindow
MessageBeep
SetWindowPos
GetPropA
CallWindowProcA
RemovePropA
SetWindowTextA
CharLowerA
FindWindowA
SetForegroundWindow
CreateDialogParamA
ShowWindow
PeekMessageA
TranslateMessage
DispatchMessageA
ModifyMenuA
CheckMenuRadioItem
UnhookWindowsHookEx
GetMenuItemInfoA
GetMenuItemCount
CreateAcceleratorTableA
IsWindowVisible
GetCursorInfo
GetProcessWindowStation
EnumWindowStationsW
DrawIconEx
LoadStringA
GetWindowPlacement
SetWindowPlacement
IsCharLowerA
wsprintfA
DestroyWindow
IsWindow
CreateWindowExA
MoveWindow
GetClientRect
EndPaint
FillRect
GetWindowTextA
GetSysColorBrush
SetDlgItemInt
GetDlgItemInt
CheckRadioButton
CheckDlgButton
LoadBitmapA
GetWindow
EqualRect
IsDlgButtonChecked
LoadMenuA
GetSubMenu
DialogBoxParamA
UpdateWindow
LockWindowUpdate
SendDlgItemMessageA
EndDialog
MessageBoxA
GetDlgItemTextA
GetDlgItem
GetWindowRect
SetDlgItemTextA
ShowCursor
SetCursorPos
HideCaret
GetMonitorInfoA
CopyRect
CharUpperA
CheckMenuItem
SetRect
GetSysColor
BeginPaint
DefWindowProcA
SetCursor
LoadCursorA
PtInRect
ScreenToClient
GetCursorPos
SendMessageA
GetParent
CreateCursor
DestroyCursor
GetWindowLongA
ReleaseDC
GetDC
SetWindowLongA
SetFocus
RegisterClipboardFormatA
IsCharUpperA
RegisterClassA
LoadIconA
PostMessageA
DrawFocusRect
EnableWindow
EnableScrollBar
SystemParametersInfoA
GetClipboardData
CreatePopupMenu
AppendMenuA
IsClipboardFormatAvailable
EnableMenuItem
ClientToScreen
TrackPopupMenu
DestroyMenu
GetScrollInfo
ScrollWindow
DestroyCaret
DrawFrameControl
GetCaretPos
CreateCaret
ShowCaret
IsWindowEnabled
SetCaretPos
SetScrollPos
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
GetFocus
SetScrollInfo
SetTimer
KillTimer
GetSystemMetrics
GetKeyState
ReleaseCapture
InvalidateRect
SetCapture
MonitorFromWindow
gdi32
ExtTextOutA
GetBkMode
GetBkColor
GetTextColor
GetObjectA
GetDeviceCaps
EnumFontFamiliesA
Ellipse
GetTextAlign
EndDoc
Rectangle
StartPage
StartDocA
SetAbortProc
CreateDCA
GetTextCharsetInfo
SetPixelFormat
DescribePixelFormat
ChoosePixelFormat
SetTextJustification
CreateDIBitmap
SetPixel
SetTextAlign
SetTextCharacterExtra
RoundRect
GetStockObject
Polygon
CreateFontIndirectA
SetBkMode
CreateCompatibleDC
CreateCompatibleBitmap
BitBlt
DeleteDC
CreateRectRgn
CreateRectRgnIndirect
CombineRgn
FrameRgn
GetTextMetricsA
SetTextColor
DeleteObject
LineTo
MoveToEx
SelectObject
CreateSolidBrush
CreatePen
CreateFontA
PatBlt
CreatePatternBrush
CreateBitmap
GetTextExtentPoint32A
EndPage
SetBkColor
TextOutA
comdlg32
GetSaveFileNameA
PrintDlgA
ChooseFontA
CommDlgExtendedError
ChooseColorA
GetOpenFileNameA
advapi32
RegCloseKey
RegQueryValueExA
RegCreateKeyExA
RegSetValueExA
RegEnumKeyExA
RegOpenKeyExA
shell32
Shell_NotifyIconA
SHBrowseForFolderA
SHGetSpecialFolderLocation
SHGetPathFromIDListA
SHGetMalloc
SHChangeNotify
SHFileOperationA
ShellExecuteA
DragQueryFileA
DragAcceptFiles
ole32
OleInitialize
OleUninitialize
CoLockObjectExternal
CreateILockBytesOnHGlobal
CoInitialize
CoUninitialize
CoCreateInstance
RevokeDragDrop
comctl32
ord6
PropertySheetA
ImageList_BeginDrag
InitCommonControlsEx
ImageList_DragShowNolock
ImageList_DragLeave
ImageList_EndDrag
ImageList_Destroy
ImageList_LoadImageA
ImageList_Remove
ImageList_ReplaceIcon
CreateToolbarEx
ImageList_DragEnter
ImageList_DragMove
imm32
ImmReleaseContext
ImmGetContext
ImmNotifyIME
ImmGetVirtualKey
ImmSetOpenStatus
ImmGetOpenStatus
ImmSetConversionStatus
ImmGetConversionStatus
ImmGetCompositionStringA
shlwapi
SHDeleteKeyA
setupapi
CM_Free_Log_Conf_Handle
CM_Free_Log_Conf
wtsapi32
WTSQuerySessionInformationA
wininet
InternetCloseHandle
InternetGetCookieA
InternetGetLastResponseInfoA
FtpRenameFileA
InternetOpenUrlA
FtpDeleteFileA
FtpRemoveDirectoryA
FtpCreateDirectoryA
InternetWriteFile
FtpSetCurrentDirectoryA
FtpOpenFileA
InternetQueryDataAvailable
InternetReadFile
FtpFindFirstFileA
InternetFindNextFileA
InternetOpenA
InternetConnectA
d2d1
ord1
dwrite
DWriteCreateFactory
Sections
.text Size: 394KB - Virtual size: 393KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 68KB - Virtual size: 67KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 15KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 228KB - Virtual size: 227KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ