Static task
static1
Behavioral task
behavioral1
Sample
17624046b5e154aa94d8fb7a10d4fcb94edeec60d292c120c3fa2fcacdfe7fdc.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
17624046b5e154aa94d8fb7a10d4fcb94edeec60d292c120c3fa2fcacdfe7fdc.exe
Resource
win10v2004-20220901-en
General
-
Target
17624046b5e154aa94d8fb7a10d4fcb94edeec60d292c120c3fa2fcacdfe7fdc
-
Size
880KB
-
MD5
bbd6460e424d941f43442010632101bf
-
SHA1
5e07d3d2ff29392c14de72ecf5c84aabde9f7492
-
SHA256
17624046b5e154aa94d8fb7a10d4fcb94edeec60d292c120c3fa2fcacdfe7fdc
-
SHA512
079b86b33e39fbc64041e6f0748a58e040f45be7fd7ff0f60b4a73b684a5b1951852d4fac7d6db6b2c036ac850ecd393764cc43cc21c8d025ea100e095ade566
-
SSDEEP
12288:zaU2cXK/sB2aakQBcHM0N9XDv6XRaVMSpVcbbMzIHq0bgm5b4gZJFgu4ZWmReGBq:527KXNhDqRm9pkgzIK0bgm5Wu44+4zSs
Malware Config
Signatures
Files
-
17624046b5e154aa94d8fb7a10d4fcb94edeec60d292c120c3fa2fcacdfe7fdc.exe windows x86
fbf02b612b405719f9b041608db07c6a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLocalTime
OpenFileMappingW
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
lstrcpynW
GetVersion
VirtualAllocEx
ReadProcessMemory
VirtualFreeEx
GetVolumeInformationW
GetCurrentThread
LocalAlloc
GetProcessHeap
HeapAlloc
GetModuleHandleW
HeapFree
ReleaseMutex
CreateMutexW
SetUnhandledExceptionFilter
VirtualProtect
WriteProcessMemory
GetCurrentProcess
GetCurrentThreadId
GlobalLock
GlobalUnlock
GetFileSize
ReadFile
FormatMessageW
LocalFree
GlobalAlloc
TerminateProcess
GetLastError
GetExitCodeProcess
CreateProcessW
GetTickCount
WideCharToMultiByte
MultiByteToWideChar
CreateDirectoryW
GetCurrentProcessId
CreateThread
WaitForSingleObject
GetPrivateProfileIntW
GetFileAttributesW
GetProcAddress
FreeLibrary
lstrlenW
GetSystemInfo
GetVersionExW
GetFileTime
CreateFileW
DeviceIoControl
GetSystemDirectoryW
FindClose
RemoveDirectoryW
LoadLibraryW
DeleteFileW
WritePrivateProfileStringW
Sleep
GetTempPathW
GetModuleFileNameW
CopyFileW
GlobalFree
FindFirstFileA
MoveFileExW
GetLongPathNameW
lstrcpyW
FindFirstFileW
FindNextFileW
GetWindowsDirectoryW
LoadResource
LockResource
SizeofResource
FindResourceW
GetPrivateProfileStringW
OpenProcess
CreateToolhelp32Snapshot
Process32FirstW
lstrcmpiW
Process32NextW
CloseHandle
ExpandEnvironmentStringsW
WaitForMultipleObjects
PeekNamedPipe
GetSystemDirectoryA
SleepEx
SetEnvironmentVariableA
CreateFileA
GetFullPathNameA
GetDriveTypeA
GetCurrentDirectoryA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
InitializeCriticalSectionAndSpinCount
QueryPerformanceCounter
FileTimeToSystemTime
FileTimeToLocalFileTime
SetLastError
MoveFileW
WriteFile
SetFilePointer
FlushFileBuffers
LockFile
UnlockFile
SetEndOfFile
DuplicateHandle
GetFullPathNameW
LeaveCriticalSection
TlsGetValue
EnterCriticalSection
GlobalReAlloc
GlobalHandle
InitializeCriticalSection
TlsAlloc
TlsSetValue
LocalReAlloc
DeleteCriticalSection
TlsFree
InterlockedDecrement
InterlockedIncrement
CompareStringW
lstrcmpA
lstrlenA
GetFileSizeEx
lstrcmpW
GlobalFlags
GlobalAddAtomW
GetModuleHandleA
GetVersionExA
LoadLibraryA
GlobalDeleteAtom
GlobalFindAtomW
InterlockedExchange
CompareStringA
GetLocaleInfoW
RtlUnwind
UnhandledExceptionFilter
IsDebuggerPresent
RaiseException
GetSystemTimeAsFileTime
GetStartupInfoW
HeapReAlloc
ExitThread
HeapSize
ExitProcess
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
LCMapStringW
GetStdHandle
GetModuleFileNameA
LCMapStringA
GetTimeZoneInformation
GetConsoleCP
GetConsoleMode
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetStringTypeA
GetStringTypeW
HeapCreate
VirtualFree
VirtualAlloc
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
GetFileInformationByHandle
user32
SetWindowLongW
SetWindowPos
TabbedTextOutW
DrawTextW
DrawTextExW
GrayStringW
GetWindowPlacement
IsIconic
SystemParametersInfoA
GetMenu
CopyRect
CallWindowProcW
DefWindowProcW
AdjustWindowRectEx
RegisterClassW
GetClassInfoW
GetClassInfoExW
CreateWindowExW
GetClientRect
SetMenu
MapWindowPoints
GetMessagePos
GetMessageTime
DestroyWindow
GetTopWindow
RemovePropW
GetPropW
SetPropW
GetClassLongW
GetCapture
WinHelpW
LoadIconW
RegisterWindowMessageW
CheckMenuItem
EnableMenuItem
ModifyMenuW
LoadBitmapW
GetMenuCheckMarkDimensions
SetMenuItemBitmaps
PostQuitMessage
DestroyMenu
GetFocus
ClientToScreen
GetWindow
GetDlgCtrlID
GetClassNameW
PtInRect
SetWindowTextW
SetWindowsHookExW
CallNextHookEx
DispatchMessageW
GetKeyState
PeekMessageW
ValidateRect
GetWindowTextW
LoadCursorW
GetDC
ReleaseDC
GetSysColor
GetSysColorBrush
UnhookWindowsHookEx
GetLastActivePopup
IsWindowEnabled
EnableWindow
MessageBoxW
GetWindowLongW
FindWindowExW
PostMessageW
GetWindowRect
GetDesktopWindow
FindWindowW
SystemParametersInfoW
CharLowerBuffW
CloseClipboard
SetClipboardData
GetDlgItem
CharUpperW
GetMenuState
EmptyClipboard
OpenClipboard
GetClipboardData
BringWindowToTop
GetMenuItemID
GetMenuItemCount
GetSubMenu
LoadStringW
IsWindow
OffsetRect
SendMessageW
GetCursorPos
GetActiveWindow
GetMessageExtraInfo
SendInput
SetCursorPos
SetActiveWindow
GetShellWindow
GetParent
GetSystemMetrics
GetForegroundWindow
GetWindowThreadProcessId
AttachThreadInput
SetForegroundWindow
advapi32
AccessCheck
GetSecurityDescriptorControl
SetFileSecurityW
RegCreateKeyExA
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
DuplicateTokenEx
CreateProcessAsUserW
RegDeleteValueW
RegDeleteKeyW
RegEnumKeyExW
ChangeServiceConfig2W
ControlService
DeleteService
OpenServiceW
StartServiceW
OpenSCManagerW
CreateServiceW
CloseServiceHandle
RegCreateKeyExW
RegSetValueExW
RegEnumKeyW
RegOpenKeyW
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
OpenProcessToken
AddAce
EqualSid
GetAce
InitializeAcl
GetLengthSid
GetAclInformation
GetSecurityDescriptorDacl
GetFileSecurityW
LookupAccountNameW
FreeSid
RevertToSelf
AddAccessAllowedAce
IsValidSecurityDescriptor
SetSecurityDescriptorOwner
SetSecurityDescriptorGroup
AllocateAndInitializeSid
OpenThreadToken
ImpersonateSelf
shell32
SHGetFolderLocation
SHGetFileInfoW
ord155
ShellExecuteExW
ShellExecuteW
SHGetFolderPathW
SHGetSpecialFolderPathW
ole32
CoInitialize
CoCreateInstance
CoUninitialize
oleaut32
VariantInit
SysAllocString
SysFreeString
VariantClear
VariantChangeType
shlwapi
PathFileExistsW
PathStripToRootW
PathIsUNCW
PathFindFileNameW
PathAppendW
version
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
wldap32
ord145
ord14
ord118
ord26
ord46
ord41
ord27
ord301
ord167
ord147
ord79
ord142
ord127
ord216
ord208
ord133
iphlpapi
GetAdaptersInfo
ws2_32
getservbyport
gethostbyaddr
getservbyname
htonl
inet_ntoa
gethostbyname
inet_addr
WSASetLastError
connect
setsockopt
getpeername
getsockopt
sendto
gethostname
accept
listen
__WSAFDIsSet
select
ioctlsocket
recvfrom
WSACleanup
WSAStartup
WSAGetLastError
closesocket
socket
recv
send
getsockname
ntohs
bind
htons
oleacc
LresultFromObject
CreateStdAccessibleObject
gdi32
ScaleWindowExtEx
DeleteDC
CreateBitmap
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetWindowExtEx
SelectObject
Escape
ExtTextOutW
TextOutW
RectVisible
PtVisible
SetViewportOrgEx
GetDeviceCaps
GetClipBox
SetMapMode
SetTextColor
SetBkColor
RestoreDC
SaveDC
DeleteObject
GetStockObject
winspool.drv
ClosePrinter
DocumentPropertiesW
OpenPrinterW
comdlg32
GetFileTitleW
Sections
.text Size: 715KB - Virtual size: 714KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 121KB - Virtual size: 120KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ