Static task
static1
Behavioral task
behavioral1
Sample
49e268455bb04e7e51956ed6cdada6f76dbcd64085d5dca569c1801cf045f22d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
49e268455bb04e7e51956ed6cdada6f76dbcd64085d5dca569c1801cf045f22d.exe
Resource
win10v2004-20220812-en
General
-
Target
49e268455bb04e7e51956ed6cdada6f76dbcd64085d5dca569c1801cf045f22d
-
Size
264KB
-
MD5
b3384f02d2f06a9ea42d843843703948
-
SHA1
78b0a34f02c90486abdb833bca670da5a6f3e5ce
-
SHA256
49e268455bb04e7e51956ed6cdada6f76dbcd64085d5dca569c1801cf045f22d
-
SHA512
cc5dafa03ae2b47f5ce83a2fcb86edb3168856edf303a6f1906d27e89b6057c99863355e96e331efb20ad29e3e58ebe8b3119768128e7381965d69ceb9948e32
-
SSDEEP
6144:YNo+eTo1oV0eZDCQX6k2wchQOCNld4uIyPP:YNJMo1oOmlk6bd4uBPP
Malware Config
Signatures
Files
-
49e268455bb04e7e51956ed6cdada6f76dbcd64085d5dca569c1801cf045f22d.exe windows x86
c67a26c2ca7e37d8b3013457ab705557
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegCreateKeyExA
SetServiceStatus
SetSecurityDescriptorGroup
RegisterServiceCtrlHandlerA
RegDeleteKeyA
SetSecurityDescriptorDacl
InitializeAcl
RegQueryValueExA
GetLengthSid
RegDeleteValueA
ControlService
AllocateAndInitializeSid
OpenThreadToken
OpenServiceA
RegOpenKeyExA
GetTokenInformation
InitializeSecurityDescriptor
RegQueryInfoKeyA
RegCloseKey
RegEnumKeyExA
SetSecurityDescriptorOwner
OpenProcessToken
RegSetValueExA
FreeSid
CopySid
shell32
DragQueryFileA
SHBrowseForFolderA
ord155
ShellExecuteA
comctl32
ImageList_GetIcon
ImageList_EndDrag
ImageList_Destroy
ImageList_GetImageInfo
ImageList_DragMove
ord17
InitCommonControlsEx
oleaut32
LoadTypeLi
user32
DefWindowProcA
ShowWindow
DestroyIcon
CreateWindowExA
DestroyWindow
SendMessageA
DeferWindowPos
UnhookWindowsHookEx
IntersectRect
GetWindow
RegisterClassA
FillRect
KillTimer
CloseClipboard
SetFocus
MessageBoxA
UpdateWindow
GetSysColor
BringWindowToTop
GetClassNameA
EqualRect
GetFocus
LoadImageA
SetWindowPlacement
RegisterClassExA
GetIconInfo
GetWindowRect
MessageBeep
GetSystemMetrics
GetDC
GetScrollRange
ClientToScreen
wsprintfA
SetRectEmpty
CheckMenuItem
WaitForInputIdle
SystemParametersInfoA
SetWindowTextA
DrawFocusRect
FlashWindow
DestroyMenu
SetParent
CallNextHookEx
ole32
OleLockRunning
OleSetClipboard
OleGetClipboard
GetRunningObjectTable
OleRun
CreateFileMoniker
CreateGenericComposite
kernel32
GetProcessHeap
ConvertDefaultLocale
EnumSystemLocalesA
GlobalAlloc
GetEnvironmentStrings
LCMapStringA
IsValidCodePage
SetFileTime
GetCurrentProcessId
CopyFileW
GetSystemTimeAsFileTime
CreateDirectoryW
GetLastError
lstrlenA
GlobalFree
GlobalSize
Sleep
GetCurrentThreadId
TlsAlloc
CreateProcessW
GetLocaleInfoW
SetErrorMode
SetFilePointer
GetTimeZoneInformation
lstrcmpiA
ResumeThread
HeapDestroy
IsValidLocale
EnterCriticalSection
MoveFileA
GlobalFlags
FreeResource
GetLogicalDrives
CreateFileA
HeapFree
FreeLibrary
GetCPInfo
IsBadCodePtr
InterlockedExchange
GetFileType
TlsSetValue
GetVersionExA
GetProcAddress
lstrlenW
DeleteCriticalSection
InterlockedIncrement
GetFileTime
GetCurrentProcess
GetThreadLocale
GetCurrentDirectoryA
GetEnvironmentStringsW
MultiByteToWideChar
TlsFree
SetCurrentDirectoryA
GetDateFormatA
CopyFileA
GetCommandLineA
SetHandleCount
CloseHandle
LockResource
RaiseException
MulDiv
FindClose
HeapSize
GetWindowsDirectoryA
ReadFile
GetCurrentThread
SetUnhandledExceptionFilter
LeaveCriticalSection
UnhandledExceptionFilter
VirtualFree
ExitProcess
GlobalHandle
FreeEnvironmentStringsW
GetModuleHandleA
SetEnvironmentVariableA
CreateThread
GetStringTypeExA
GetModuleFileNameA
WriteConsoleA
LCMapStringW
UnmapViewOfFile
OutputDebugStringA
GetTimeFormatA
WaitForSingleObject
SetConsoleCtrlHandler
GetModuleFileNameW
FindFirstFileW
SetLastError
GetStringTypeW
LockFile
GetFileSize
FatalAppExitA
HeapAlloc
VirtualAlloc
FlushFileBuffers
WideCharToMultiByte
ExitThread
HeapCreate
LocalAlloc
lstrcpyA
GetOEMCP
VirtualQuery
FileTimeToSystemTime
IsDebuggerPresent
TerminateProcess
SetStdHandle
CompareStringA
CreateFileW
MoveFileW
SetFileAttributesA
LocalFileTimeToFileTime
GlobalDeleteAtom
GetUserDefaultLCID
FindNextFileW
VirtualProtect
QueryPerformanceCounter
GetStartupInfoA
GetSystemDirectoryA
DeleteFileA
GetStdHandle
FileTimeToLocalFileTime
CreateEventA
RtlUnwind
LocalReAlloc
HeapReAlloc
FindResourceA
MapViewOfFile
UnlockFile
GlobalReAlloc
IsBadReadPtr
GetTempPathW
GlobalLock
GetFullPathNameA
GetVersion
InterlockedDecrement
FreeEnvironmentStringsA
CompareStringW
SetEvent
GetTempFileNameA
GlobalUnlock
GetFileAttributesA
WriteFile
GetSystemTime
LoadLibraryA
GetSystemInfo
lstrcmpW
lstrcmpA
SetEndOfFile
GetDriveTypeA
GetStringTypeA
GetACP
CreateMutexA
GetLocalTime
SetThreadPriority
GlobalMemoryStatus
LoadResource
FindNextFileA
InitializeCriticalSection
GetLocaleInfoA
FindFirstFileA
SystemTimeToFileTime
TlsGetValue
CreateDirectoryA
GetTickCount
LocalFree
IsBadWritePtr
shlwapi
PathRemoveExtensionA
PathStripToRootA
PathRemoveFileSpecA
PathIsUNCA
PathFileExistsA
PathSkipRootA
PathAppendA
PathFindFileNameA
SHDeleteKeyA
PathAddBackslashA
PathFindExtensionA
Sections
.text Size: 80KB - Virtual size: 79KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 96KB - Virtual size: 92KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 52KB - Virtual size: 63KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ