Static task
static1
Behavioral task
behavioral1
Sample
ee21a2f8c3cd9673217acfff58d08aedad1b48661bd4e9bebe81565460b1fd27.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ee21a2f8c3cd9673217acfff58d08aedad1b48661bd4e9bebe81565460b1fd27.exe
Resource
win10v2004-20220812-en
General
-
Target
ee21a2f8c3cd9673217acfff58d08aedad1b48661bd4e9bebe81565460b1fd27
-
Size
253KB
-
MD5
491d5f3c5fb1cdc7fb8f327d44697d20
-
SHA1
27fb962e064eaa4a663774bfbc6825fb8202a01f
-
SHA256
ee21a2f8c3cd9673217acfff58d08aedad1b48661bd4e9bebe81565460b1fd27
-
SHA512
5f45db3e3e919686bd1a171c83140448f7ad456e910d975cbeb68258400f6015264a3e1780aba5f030eccf3af35f24cfc9d06d66b13b9c141d38fa70c8d413cc
-
SSDEEP
6144:BL0DjFKScTrlvfsD656QJnwsbU0QCPIQWKp7:+DjVcXl3K656QFfA0Qe
Malware Config
Signatures
Files
-
ee21a2f8c3cd9673217acfff58d08aedad1b48661bd4e9bebe81565460b1fd27.exe windows x86
d649f3df50578b2c9cb7c077c36b26f8
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
IsRectEmpty
ModifyMenuA
BeginDeferWindowPos
DestroyWindow
GetAsyncKeyState
IsDlgButtonChecked
ScreenToClient
GetMessagePos
CallWindowProcW
IsWindowVisible
LoadBitmapW
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
TrackPopupMenu
GetWindowRect
AppendMenuW
CreatePopupMenu
GetSystemMetrics
EndDialog
EnableMenuItem
GetSystemMenu
SetClassLongW
IsWindowEnabled
SetWindowPos
DialogBoxParamW
CheckDlgButton
CreateWindowExW
SystemParametersInfoW
RegisterClassW
SetDlgItemTextW
GetDlgItemTextW
MessageBoxIndirectW
CharNextA
CharUpperW
CharPrevW
wvsprintfW
DispatchMessageW
PeekMessageW
wsprintfA
GetWindowRgn
CreateDialogParamW
SetTimer
SetWindowTextW
PostQuitMessage
SetForegroundWindow
ShowWindow
wsprintfW
SendMessageTimeoutW
LoadCursorW
SetCursor
GetWindowLongW
GetSysColor
CharNextW
GetClassInfoW
ExitWindowsEx
IsWindow
GetDlgItem
SetWindowLongW
LoadImageW
GetDC
EnableWindow
InvalidateRect
SendMessageW
DefWindowProcW
BeginPaint
GetClientRect
FillRect
DrawTextW
EndPaint
FindWindowExW
GetWindowLongA
SystemParametersInfoA
CallWindowProcA
GetKeyboardLayoutList
PeekMessageA
IntersectRect
GetWindowTextA
SetWindowTextA
TranslateMessage
comdlg32
GetOpenFileNameW
shell32
ShellExecuteA
advapi32
RegDeleteValueA
GetSecurityDescriptorLength
RegCreateKeyW
gdi32
CreateBrushIndirect
SetBkMode
SetTextColor
SelectObject
SelectClipRgn
CreatePatternBrush
Ellipse
GetClipBox
CreateMetaFileA
CreateICA
GetMetaFileBitsEx
SetViewportExtEx
CreateDCA
DeleteObject
CreateFontIndirectW
GetObjectA
GetDeviceCaps
CreateFontA
GetCharWidthFloatA
PtVisible
GetDeviceGammaRamp
GetAspectRatioFilterEx
CreateCompatibleBitmap
SaveDC
MoveToEx
GetTextAlign
GetPath
EnumMetaFile
GetCharWidthA
SetBkColor
dbghelp
UnDecorateSymbolName
comctl32
ord17
InitCommonControlsEx
version
VerQueryValueW
kernel32
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
SetUnhandledExceptionFilter
GetModuleFileNameA
GetStdHandle
HeapCreate
HeapReAlloc
VirtualAlloc
VirtualFree
HeapFree
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
GetStartupInfoA
GetCommandLineA
HeapAlloc
SetFileTime
GetFileType
GetFullPathNameW
MoveFileW
SetCurrentDirectoryW
GetFileAttributesW
GetLastError
CreateDirectoryW
SetFileAttributesW
Sleep
GetTickCount
GetFileSize
GetCurrentProcess
CopyFileW
ExitProcess
GetWindowsDirectoryW
GetTempPathW
GetCommandLineW
SetErrorMode
lstrcpynA
TlsGetValue
TlsAlloc
CloseHandle
lstrcpynW
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
InitializeCriticalSectionAndSpinCount
TerminateProcess
UnhandledExceptionFilter
IsDebuggerPresent
RtlUnwind
GetCPInfo
GetACP
IsValidCodePage
HeapSize
GetLocaleInfoA
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
SearchPathW
GetDiskFreeSpaceW
GlobalUnlock
CompareFileTime
PeekNamedPipe
GlobalLock
CreateThread
GlobalCompact
LockResource
MulDiv
GetThreadContext
FlushViewOfFile
DecodePointer
GetThreadLocale
DeviceIoControl
GetDriveTypeW
CopyFileA
FindFirstFileExA
GetOEMCP
FileTimeToSystemTime
CreateHardLinkW
CreateSemaphoreW
SetEvent
GetModuleFileNameW
GetShortPathNameW
GetProcessHeap
GetVersionExA
GetLogicalDrives
lstrcatA
lstrlenW
DeleteFileW
FindFirstFileW
FindNextFileW
FindClose
SetFilePointer
MultiByteToWideChar
ReadFile
WriteFile
lstrlenA
WideCharToMultiByte
GetPrivateProfileStringW
WritePrivateProfileStringW
FreeLibrary
LoadLibraryExW
GetModuleHandleW
GlobalFree
GetExitCodeProcess
WaitForSingleObject
GlobalAlloc
ExpandEnvironmentStringsW
lstrcmpW
lstrcmpiW
lstrcmpA
RemoveDirectoryW
lstrcpyA
GetVersion
GetSystemDirectoryW
GetVersionExW
lstrcpyW
OpenProcess
GetModuleHandleA
LoadLibraryA
GetProcAddress
lstrcatW
GetTempFileNameW
CreateFileW
lstrcmpiA
CreateProcessW
LoadLibraryW
Sections
.text Size: 151KB - Virtual size: 150KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 14KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 74KB - Virtual size: 73KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ