Static task
static1
Behavioral task
behavioral1
Sample
9ee2fdba97da83540491ceb3d69914e61528f2897d8f1692140befb8e1acc55c.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
9ee2fdba97da83540491ceb3d69914e61528f2897d8f1692140befb8e1acc55c.exe
Resource
win10v2004-20220812-en
General
-
Target
9ee2fdba97da83540491ceb3d69914e61528f2897d8f1692140befb8e1acc55c
-
Size
1.8MB
-
MD5
fff4bf12d57cd90dcbf51f6632ef7fb1
-
SHA1
0c90c79877c8da1c823e84b47227e26fa14131ce
-
SHA256
9ee2fdba97da83540491ceb3d69914e61528f2897d8f1692140befb8e1acc55c
-
SHA512
e1977d5fabd1b54a92ffd5007f5eb38803979b0058539a0a3911dd02d59b519da605c06f660479d7a5ddade8212dde39b795b67818016bd8caf8298b1487f70f
-
SSDEEP
24576:Hp+LNykO/t4xQijmPQWsXKxYjMSKkOlhcx8jW5egSlFN2fwVytKRDxBQaUnu:JmFO1sOwU2OlhcxaW5NWtytKRFBQBu
Malware Config
Signatures
Files
-
9ee2fdba97da83540491ceb3d69914e61528f2897d8f1692140befb8e1acc55c.exe windows x86
80d60710b0ca792ff5736567fff811db
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mfc71
ord5914
ord1619
ord1402
ord5206
ord3344
ord1360
ord5166
ord1562
ord2717
ord4273
ord410
ord648
ord2164
ord4127
ord4125
ord6065
ord6283
ord1903
ord2419
ord2420
ord2421
ord2418
ord2417
ord3684
ord3430
ord1931
ord1483
ord1547
ord5915
ord4234
ord5214
ord4261
ord591
ord762
ord304
ord5731
ord2263
ord2367
ord709
ord602
ord5613
ord1929
ord1934
ord5888
ord347
ord501
ord5807
ord2469
ord3255
ord5331
ord6297
ord2346
ord1580
ord5320
ord6286
ord3161
ord3210
ord1280
ord1279
ord5637
ord2902
ord4098
ord2089
ord2991
ord3171
ord572
ord297
ord907
ord3454
ord1554
ord620
ord3195
ord6090
ord2131
ord3934
ord784
ord4353
ord2372
ord2468
ord4104
ord6167
ord3761
ord6236
ord3650
ord3477
ord741
ord6119
ord2095
ord1591
ord4240
ord3317
ord265
ord266
ord1614
ord760
ord5563
ord3997
ord4394
ord4648
ord1728
ord1024
ord1084
ord3204
ord4749
ord1966
ord4001
ord4123
ord5641
ord5833
ord3287
ord5403
ord2475
ord4035
ord3989
ord2272
ord2654
ord4320
ord300
ord1486
ord2662
ord6144
ord2371
ord1283
ord1063
ord6179
ord1439
ord6288
ord631
ord629
ord4384
ord384
ord1440
ord3974
ord386
ord2751
ord3931
ord2288
ord911
ord1916
ord5529
ord3908
ord1396
ord807
ord795
ord4081
ord1263
ord1489
ord299
ord2933
ord6118
ord1482
ord5642
ord6037
ord1395
ord2451
ord3244
ord416
ord651
ord1930
ord2075
ord326
ord2477
ord2938
ord1565
ord2869
ord1091
ord3163
ord4100
ord2094
ord1955
ord4888
ord3635
ord3595
ord1920
ord2931
ord5224
ord5227
ord3948
ord4569
ord5230
ord5213
ord5567
ord2838
ord4481
ord759
ord570
ord2249
ord4541
ord3683
ord4085
ord4038
ord4014
ord6278
ord3801
ord6276
ord4326
ord2063
ord2018
ord5583
ord3806
ord1010
ord5102
ord6219
ord5382
ord3832
ord5226
ord2248
ord4568
ord5566
ord3333
ord757
ord566
ord586
ord1054
ord1544
ord322
ord1123
ord3830
ord751
ord1025
ord4189
ord3182
ord562
ord5715
ord5491
ord785
ord4041
ord1185
ord5323
ord557
ord745
ord908
ord5154
ord1191
ord1187
ord3760
ord630
ord3088
ord2021
ord385
ord3596
ord748
ord2098
ord1650
ord1594
ord4243
ord2983
ord3324
ord1545
ord4232
ord3164
ord587
ord4115
ord5640
ord2368
ord2086
ord4381
ord4399
ord4401
ord4386
ord4776
ord4587
ord4178
ord4171
ord912
ord4860
ord4863
ord2280
ord4379
ord4980
ord4389
ord4781
ord4204
ord4790
ord4443
ord4444
ord3740
ord4914
ord4519
ord4520
ord4920
ord4559
ord5049
ord4439
ord4368
ord4501
ord4846
ord4970
ord4529
ord4480
ord4971
ord4516
ord4673
ord4948
ord4794
ord4287
ord4376
ord1207
ord4377
ord4963
ord4796
ord4710
ord4364
ord4805
ord5053
ord4964
ord4649
ord4946
ord4507
ord4961
ord4674
ord4131
ord1302
ord2008
ord4132
ord781
ord4580
ord310
ord2322
ord876
ord2657
ord6067
ord578
ord1794
ord764
ord354
ord605
ord4262
ord4486
ord3949
ord2644
ord3709
ord3719
ord3718
ord2533
ord2646
ord2540
ord2862
ord2714
ord4307
ord2835
ord2731
ord2537
ord5200
ord1599
ord1655
ord1656
ord1964
ord5175
ord1362
ord4967
ord3345
ord6277
ord3802
ord6279
ord1522
ord2172
ord2178
ord2405
ord2387
ord2385
ord2403
ord2415
ord2392
ord2408
ord2413
ord2396
ord2398
ord2400
ord2394
ord2410
ord2390
ord934
ord930
ord932
ord928
ord923
ord5233
ord5235
ord5960
ord1600
ord4282
ord4722
ord3403
ord5203
ord4185
ord6275
ord5073
ord1908
ord5152
ord4244
ord1401
ord3946
ord1617
ord1620
ord5912
ord1551
ord1670
ord1671
ord2020
ord4890
ord4735
ord4212
ord5182
ord3441
ord5089
ord3641
msvcr71
sprintf
malloc
memcpy
free
calloc
fseek
ftell
fread
_strdup
_except_handler3
_mbctype
labs
fopen
fwrite
fclose
strncmp
__p___argv
strrchr
strstr
ceil
_splitpath
strftime
_localtime64
memmove
tolower
strchr
_mbsnbicmp
_mbsrchr
strcpy
strcmp
strcat
??0exception@@QAE@XZ
??1exception@@UAE@XZ
_time64
atoi
strlen
_itoa
_strnicmp
memcmp
time
srand
rand
_strupr
_setmbcp
memset
strncpy
_CxxThrowException
??0exception@@QAE@ABV0@@Z
__CxxFrameHandler
??1type_info@@UAE@XZ
__security_error_handler
__dllonexit
_onexit
?terminate@@YAXXZ
_c_exit
_exit
_XcptFilter
_ismbblead
_cexit
exit
_acmdln
_amsg_exit
__getmainargs
_initterm
abs
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_controlfp
kernel32
lstrlenA
DeleteFileA
GetLastError
WaitForMultipleObjects
ExitProcess
CreateThread
TerminateThread
WritePrivateProfileStringA
GetTickCount
GetPrivateProfileStringA
MulDiv
CreateToolhelp32Snapshot
Process32First
Process32Next
CreateEventA
WaitForSingleObject
ResumeThread
WinExec
GetPrivateProfileIntA
FreeLibrary
OutputDebugStringA
LoadLibraryA
GetProcAddress
GetSystemDirectoryA
Sleep
CreateFileA
GetCurrentThreadId
GetCurrentProcessId
GetCurrentProcess
CloseHandle
MultiByteToWideChar
GetModuleFileNameA
GetLocalTime
EnterCriticalSection
LeaveCriticalSection
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
GetVersionExA
DeleteCriticalSection
lstrcpyA
GetFileAttributesA
lstrcatA
CreateDirectoryA
SetFileTime
LocalFileTimeToFileTime
DosDateTimeToFileTime
GetFileTime
GetStartupInfoA
QueryPerformanceCounter
GetSystemTimeAsFileTime
TerminateProcess
OpenProcess
WideCharToMultiByte
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
InterlockedIncrement
WriteFile
SetFilePointer
FreeResource
LockResource
LoadResource
SizeofResource
FindResourceA
GetModuleHandleA
CreateMutexA
InitializeCriticalSection
SetThreadPriority
GetCurrentThread
Module32Next
Module32First
Thread32Next
CreateProcessA
OpenThread
Thread32First
FindClose
FindNextFileA
FindFirstFileA
GlobalHandle
ReadFile
GetFileSize
CreateRemoteThread
WriteProcessMemory
VirtualAllocEx
SetUnhandledExceptionFilter
lstrcmpiA
user32
ReleaseCapture
SetCapture
InvalidateRect
SendMessageA
DrawEdge
SetWindowTextA
SetWindowLongA
EnableWindow
SystemParametersInfoA
GetSystemMetrics
GetClientRect
SetTimer
LoadIconA
GetAsyncKeyState
PeekMessageA
GetDlgItem
GetWindowRect
KillTimer
GetWindowLongA
SetLayeredWindowAttributes
CopyRect
DrawStateA
DrawFocusRect
GetWindowTextA
GetClassNameA
GetFocus
GetWindowDC
RemoveMenu
InsertMenuA
EnableMenuItem
IsIconic
DrawIcon
RegisterWindowMessageA
wsprintfA
MessageBeep
FlashWindow
GetWindowThreadProcessId
AttachThreadInput
SetFocus
keybd_event
BringWindowToTop
SetActiveWindow
CallNextHookEx
PtInRect
ModifyMenuA
GetMenuItemID
GetMenuItemCount
FillRect
InflateRect
IsWindowVisible
GetSysColor
DrawTextA
LoadCursorA
ScreenToClient
SetCursor
LoadMenuA
GetSubMenu
GetDesktopWindow
SetForegroundWindow
GetForegroundWindow
EnumWindows
UnhookWindowsHookEx
PostMessageA
GetCursorPos
SetCursorPos
ClipCursor
ShowWindow
SetWindowsHookExA
SetWindowPos
GetDC
ReleaseDC
FindWindowA
LoadBitmapA
PostQuitMessage
CallWindowProcA
gdi32
SetMapMode
GetWindowExtEx
GetViewportExtEx
CreateDCA
GetDIBits
GetTextExtentPoint32A
GetObjectA
CreateFontIndirectA
DeleteObject
GetStockObject
CreatePen
GetDeviceCaps
CreateFontA
CreateSolidBrush
StretchBlt
SetPixel
PatBlt
CreateBitmap
BitBlt
GetMapMode
CreateCompatibleDC
CreateCompatibleBitmap
Rectangle
advapi32
AdjustTokenPrivileges
RegCloseKey
RegOpenKeyExA
LookupPrivilegeValueA
OpenProcessToken
RegQueryValueExA
RegCreateKeyExA
RegSetValueExA
shell32
Shell_NotifyIconA
ShellExecuteA
comctl32
ord17
ImageList_Draw
_TrackMouseEvent
shlwapi
SHDeleteKeyA
PathRemoveFileSpecA
StrStrIA
StrRStrIA
PathFileExistsA
ole32
CoInitialize
CreateStreamOnHGlobal
CoCreateInstance
CoUninitialize
oleaut32
SystemTimeToVariantTime
VarUdateFromDate
VariantTimeToSystemTime
VarBstrFromDate
VariantChangeType
VariantClear
OleLoadPicture
SysFreeString
ws2_32
connect
socket
inet_addr
gethostbyname
inet_ntoa
gethostname
WSAGetLastError
WSACleanup
ntohl
send
WSAStartup
listen
accept
WSACreateEvent
WSAEventSelect
shutdown
WSACloseEvent
closesocket
bind
select
recv
htonl
htons
msvcp71
??Y?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@ABV01@@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
??Y?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@PBD@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?clear@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEXXZ
??0?$basic_ifstream@DU?$char_traits@D@std@@@std@@QAE@PBDHH@Z
?getline@?$basic_istream@DU?$char_traits@D@std@@@std@@QAEAAV12@PADH@Z
??Bios_base@std@@QBEPAXXZ
??0?$basic_stringstream@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@1@H@Z
??_D?$basic_stringstream@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEXXZ
?clear@?$basic_ios@DU?$char_traits@D@std@@@std@@QAEXH_N@Z
?close@?$basic_ifstream@DU?$char_traits@D@std@@@std@@QAEXXZ
??_D?$basic_ifstream@DU?$char_traits@D@std@@@std@@QAEXXZ
?begin@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE?AViterator@12@XZ
?end@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE?AViterator@12@XZ
?find@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDI@Z
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@ABV01@@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?c_str@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEPBDXZ
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@PBD@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?size@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIXZ
dbghelp
MiniDumpWriteDump
libeay32
ord3171
ord3106
ord3024
psapi
EnumProcessModules
GetModuleBaseNameA
GetProcessImageFileNameA
EnumProcesses
netapi32
Netbios
gdiplus
GdiplusStartup
GdiplusShutdown
GdipCreateSolidFill
GdipDeleteBrush
GdipCloneBrush
GdipFillRectangleI
GdipGetImageWidth
GdipLoadImageFromStreamICM
GdipCloneImage
GdipDisposeImage
GdipFree
GdipLoadImageFromFileICM
GdipLoadImageFromFile
GdipDrawImageRectRect
GdipDeleteGraphics
GdipCreateFromHDC
GdipLoadImageFromStream
GdipAlloc
GdipGetImageHeight
version
VerQueryValueA
GetFileVersionInfoSizeA
GetFileVersionInfoA
Sections
.text Size: 340KB - Virtual size: 336KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 80KB - Virtual size: 77KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1.4MB - Virtual size: 1.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ