Static task
static1
Behavioral task
behavioral1
Sample
2fc97a9025f097a4c1040c2a50d644ad2979f56e8caf337a1a788297f6be7123.exe
Resource
win7-20220812-en
General
-
Target
2fc97a9025f097a4c1040c2a50d644ad2979f56e8caf337a1a788297f6be7123.exe
-
Size
2.0MB
-
MD5
01028a50efa2f9e058f61a39b2b412c9
-
SHA1
bc8dcbc889c867fd8be2a3a16d2944107046651f
-
SHA256
2fc97a9025f097a4c1040c2a50d644ad2979f56e8caf337a1a788297f6be7123
-
SHA512
efbc5a1f76469dba0ef096c5d297bd8760e59567f4314a611b528f83fe088de389a40137a890179c3976abfb1c4e520e8ef3674d99b2db2d4fe136449a9da4bf
-
SSDEEP
49152:H1YeYEFZvp1kRXOUhuKYNls0whaTqojsiaYf:HXFpgDQKYU0whjojs
Malware Config
Signatures
Files
-
2fc97a9025f097a4c1040c2a50d644ad2979f56e8caf337a1a788297f6be7123.exe.exe windows x86
69f674075e09732dbab62f425d734f96
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
MoveFileW
GetDiskFreeSpaceExW
InterlockedExchange
LocalAlloc
UnmapViewOfFile
CreateFileMappingA
MapViewOfFile
SetEnvironmentVariableA
GetOEMCP
GetACP
CompareStringA
SetEndOfFile
LoadLibraryA
SetStdHandle
GetCommandLineA
GetEnvironmentStrings
GetEnvironmentStringsW
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetTimeZoneInformation
GetUserDefaultLCID
EnumSystemLocalesA
GetLocaleInfoA
IsValidCodePage
IsValidLocale
GetCPInfo
GetDriveTypeA
LCMapStringW
LCMapStringA
UnhandledExceptionFilter
TerminateProcess
GetNumberFormatW
SetLastError
TlsAlloc
RaiseException
GetStringTypeW
GetStringTypeA
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
RtlUnwind
DeleteCriticalSection
InitializeCriticalSection
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
GetEnvironmentVariableA
GetModuleFileNameA
LeaveCriticalSection
EnterCriticalSection
GetVersion
GetStartupInfoW
GetModuleHandleA
CreateDirectoryW
SetCurrentDirectoryA
GetCurrentDirectoryW
SetEnvironmentVariableW
DeleteFileW
ExitThread
TlsSetValue
HeapReAlloc
HeapAlloc
HeapFree
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
GetLocaleInfoW
GetModuleHandleW
GetVersionExA
CreateEventW
ExitProcess
CreateThread
SetEvent
FlushFileBuffers
SetFileTime
GetFileTime
GetTickCount
MoveFileExW
FindResourceExW
GetProfileStringW
GetFileAttributesW
GetEnvironmentVariableW
LocalFileTimeToFileTime
FileTimeToLocalFileTime
CompareFileTime
SystemTimeToFileTime
GetDateFormatW
GetFullPathNameW
GetCommandLineW
SetFileAttributesW
MulDiv
SetCurrentDirectoryW
FreeResource
FindNextFileW
InterlockedDecrement
InterlockedIncrement
GetSystemDirectoryW
CompareStringW
GetLogicalDrives
GetDriveTypeW
FindFirstFileW
FindClose
CopyFileW
SetDllDirectoryW
CreateProcessW
GetLocalTime
GetPrivateProfileIntA
GetModuleFileNameW
GetTempPathW
GlobalSize
GetCurrentThreadId
ResumeThread
WaitForSingleObject
GetCurrentProcess
GetProcessAffinityMask
WritePrivateProfileStringW
GetPrivateProfileStringW
GlobalUnlock
GetWindowsDirectoryW
Sleep
WideCharToMultiByte
GetLastError
GetPrivateProfileIntW
LoadLibraryW
GetProcAddress
GetFileSize
GetShortPathNameW
GetVersionExW
MultiByteToWideChar
WriteFile
LoadLibraryExW
EnumResourceNamesW
FreeLibrary
FindResourceW
LoadResource
LockResource
SizeofResource
CreateFileW
CloseHandle
SetFilePointer
ReadFile
GlobalHandle
GlobalFree
GlobalAlloc
GlobalLock
TlsGetValue
user32
CallNextHookEx
IsChild
GetSysColor
LoadImageW
CreateAcceleratorTableW
CopyAcceleratorTableW
GetKeyboardLayout
MapVirtualKeyExW
GetKeyNameTextW
CharNextW
CharLowerBuffW
GetMenuItemInfoW
InsertMenuW
ModifyMenuW
LoadAcceleratorsW
RegisterWindowMessageW
GetMessageW
TranslateAcceleratorW
IsDialogMessageW
GetWindowPlacement
UnregisterHotKey
DestroyAcceleratorTable
PostQuitMessage
CheckMenuItem
DeleteMenu
RegisterHotKey
GetMenuItemCount
AppendMenuW
GetMenuItemID
EnableMenuItem
DrawMenuBar
WinHelpW
GetDesktopWindow
GetWindow
GetMenuItemRect
CallWindowProcW
IsIconic
GetMenuState
GetWindowLongW
GetMessagePos
SystemParametersInfoW
BringWindowToTop
ShowCursor
GetScrollPos
GetSysColorBrush
CopyRect
DrawEdge
FrameRect
DrawFocusRect
GetFocus
EnumChildWindows
IsWindowEnabled
CheckRadioButton
EmptyClipboard
SetClipboardData
GetForegroundWindow
ScreenToClient
SetWindowTextA
GetDlgItemTextA
SetDlgItemTextA
GetKeyState
SetCapture
CloseWindow
FindWindowW
IsMenu
GetMenuStringW
UnhookWindowsHookEx
SetWindowsHookExW
FindWindowExW
SetCursorPos
ShowScrollBar
GetScrollRange
SetScrollInfo
DrawFrameControl
ReleaseCapture
OffsetRect
IntersectRect
SystemParametersInfoA
GetAsyncKeyState
GetCapture
SendNotifyMessageW
SetWindowPos
GetSubMenu
TrackPopupMenu
MessageBoxW
GetWindowTextW
DialogBoxParamW
CreateDialogParamW
SetWindowLongW
PeekMessageW
TranslateMessage
DispatchMessageW
MessageBoxA
LoadIconW
RegisterClassW
LoadMenuW
GetMenu
DestroyMenu
SetMenu
SetScrollRange
SetScrollPos
BeginPaint
EndPaint
GetParent
SetActiveWindow
ScrollWindow
DefWindowProcW
ShowWindow
SetWindowTextW
MoveWindow
KillTimer
InvalidateRect
UpdateWindow
SetTimer
OpenClipboard
IsClipboardFormatAvailable
GetClipboardData
CloseClipboard
ClientToScreen
IsZoomed
GetScrollInfo
GetClientRect
GetClassNameW
IsWindowVisible
GetWindowRect
IsRectEmpty
GetCursor
GetCursorPos
WindowFromPoint
AttachThreadInput
DrawIconEx
GetDC
ReleaseDC
LoadCursorW
SetCursor
MessageBeep
EndDialog
IsDlgButtonChecked
GetDlgItemTextW
GetDlgItemInt
SetFocus
SendDlgItemMessageW
SetDlgItemTextW
SetDlgItemInt
GetDlgItem
EnableWindow
GetActiveWindow
GetWindowThreadProcessId
SetForegroundWindow
PostMessageW
PostThreadMessageW
DrawTextW
DrawTextA
IsWindow
DestroyIcon
GetIconInfo
GetSystemMetrics
FillRect
DrawIcon
CreateWindowExW
DestroyWindow
wsprintfW
SendMessageW
LoadStringW
HiliteMenuItem
gdi32
CreateEnhMetaFileW
PatBlt
GetTextMetricsW
GetStockObject
CreateFontIndirectW
GetDIBits
Ellipse
CreatePen
CreateBrushIndirect
DeleteDC
BitBlt
CreateCompatibleBitmap
CreateDCW
CreateDIBitmap
GetSystemPaletteEntries
GetNearestPaletteIndex
Rectangle
SetTextColor
GetPixel
SetBkColor
EndPage
StretchBlt
SetDIBits
StartPage
ResetDCW
EndDoc
StartDocW
LineTo
MoveToEx
GetTextExtentPoint32W
GetDCOrgEx
GetClipBox
SetStretchBltMode
StretchDIBits
CloseEnhMetaFile
GetEnhMetaFilePaletteEntries
CreatePalette
GetEnhMetaFileW
GetMetaFileW
GetMetaFileBitsEx
DeleteMetaFile
SetWinMetaFileBits
GetEnhMetaFileHeader
SelectPalette
DeleteEnhMetaFile
RealizePalette
PlayEnhMetaFile
GetObjectW
DeleteObject
CreateICW
CreateCompatibleDC
GetDeviceCaps
CreateBitmap
SelectObject
CreateSolidBrush
SetBkMode
TextOutA
comctl32
CreateStatusWindowW
ImageList_LoadImageW
ImageList_Draw
ImageList_Replace
ord17
ImageList_GetIconSize
CreateToolbarEx
ImageList_Destroy
ImageList_Create
ImageList_Add
ImageList_ReplaceIcon
ImageList_AddMasked
shell32
SHBrowseForFolderW
ShellExecuteExW
SHChangeNotify
SHGetSpecialFolderLocation
DragAcceptFiles
DragFinish
SHGetPathFromIDListW
SHFileOperationW
ShellExecuteW
SHGetMalloc
SHGetDesktopFolder
SHGetDataFromIDListW
SHGetFileInfoW
DragQueryFileW
ExtractIconW
advapi32
RegOpenKeyExA
RegSetValueW
RegDeleteValueW
RegDeleteKeyW
RegCreateKeyW
RegSetValueExW
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
IsTextUnicode
RegQueryValueExA
Sections
.text Size: 1.3MB - Virtual size: 1.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 274KB - Virtual size: 274KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 75KB - Virtual size: 143KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 219KB - Virtual size: 218KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 203KB - Virtual size: 202KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
jlg Size: 512B - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
obbdlhc Size: 512B - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
iyw Size: 512B - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
wjl Size: 512B - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
vmhxsm Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ