Static task
static1
Behavioral task
behavioral1
Sample
11366f95b9a92f2df9edd0626ff84937f93c47f008603e8d9d6cd2c8256c4f73.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
11366f95b9a92f2df9edd0626ff84937f93c47f008603e8d9d6cd2c8256c4f73.exe
Resource
win10v2004-20220812-en
General
-
Target
11366f95b9a92f2df9edd0626ff84937f93c47f008603e8d9d6cd2c8256c4f73
-
Size
836KB
-
MD5
747535f502aa6a03306421f2625eb5a0
-
SHA1
88787abba781df3149d556e3636cdc1ee904fd73
-
SHA256
11366f95b9a92f2df9edd0626ff84937f93c47f008603e8d9d6cd2c8256c4f73
-
SHA512
6d4d89b5ce7e4a400baec73507120bf3795d78df4b8d296b77ae08908b16de385d3e6d7df208bc417c369e4bbed794ba2c30d9145ecb6f6322bba070974f01e3
-
SSDEEP
24576:L+xubQXPuAUIJX0WHRqLDmD5aohCIuoRZsO/SrSUL:Lsu8/uAvJXNH2SDfuoEO/CS
Malware Config
Signatures
Files
-
11366f95b9a92f2df9edd0626ff84937f93c47f008603e8d9d6cd2c8256c4f73.exe windows x86
b15258bbad30a19934f4ecbb058ff056
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_AGGRESIVE_WS_TRIM
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_FILE_BYTES_REVERSED_HI
Imports
kernel32
GetFileType
GetSystemDirectoryW
GetModuleHandleW
GetLastError
GetFileInformationByHandle
GetProcessWorkingSetSize
GetProfileIntW
SizeofResource
ConvertDefaultLocale
SearchPathW
GetPrivateProfileIntW
SetEndOfFile
FreeLibrary
GlobalHandle
CopyFileW
FindNextFileW
MoveFileExW
CloseHandle
LocalFree
UnhandledExceptionFilter
VirtualQuery
GetTickCount
FormatMessageW
SetThreadPriority
GlobalDeleteAtom
TlsSetValue
LoadLibraryA
HeapReAlloc
GetSystemInfo
WaitForSingleObject
GetVersion
LocalReAlloc
EnumSystemLocalesA
lstrcpyW
RaiseException
GlobalAddAtomA
LoadLibraryExA
FindResourceExW
ExitProcess
FindResourceW
IsDebuggerPresent
HeapQueryInformation
HeapSize
WideCharToMultiByte
GlobalMemoryStatus
GetLongPathNameW
CreateThread
Sleep
HeapCreate
InitializeCriticalSection
SetLastError
FlushFileBuffers
lstrlenA
RtlUnwind
VirtualUnlock
PeekNamedPipe
GetFileTime
FreeResource
GetDriveTypeW
HeapDestroy
LoadResource
GlobalFree
InterlockedCompareExchange
GetCurrentDirectoryW
GetLocaleInfoW
WriteFile
VirtualLock
WriteConsoleW
TlsGetValue
IsProcessorFeaturePresent
HeapAlloc
lstrcmpW
DeleteAtom
MulDiv
TlsFree
InterlockedIncrement
ExitThread
GetOEMCP
FileTimeToSystemTime
GetStdHandle
GetStartupInfoW
VirtualProtect
GetFullPathNameW
InitializeCriticalSectionAndSpinCount
LocalAlloc
GlobalFindAtomW
GetCommandLineW
GetProcAddress
InterlockedDecrement
GetTempFileNameW
ReadFile
FindFirstFileW
GetCurrentThread
DeleteFileW
GetWindowsDirectoryW
GetTempPathW
GlobalAlloc
GlobalAddAtomW
QueryPerformanceCounter
GetConsoleMode
GetStartupInfoA
GlobalUnlock
GetCurrentProcessId
GetProcessHeap
GetSystemTimeAsFileTime
ReleaseMutex
GetFileSizeEx
LockResource
GetEnvironmentStringsW
GetFileSize
FreeEnvironmentStringsW
CreateMutexW
GetPrivateProfileStringW
UnlockFile
lstrlenW
DeleteCriticalSection
FindFirstFileExW
GetThreadTimes
LoadLibraryExW
GlobalReAlloc
InterlockedExchange
SetErrorMode
GetFileAttributesW
lstrcmpA
GetSystemDefaultUILanguage
WritePrivateProfileStringW
FlushInstructionCache
SetHandleCount
CompareStringA
GetConsoleCP
IsValidCodePage
GetACP
MultiByteToWideChar
GetCurrentProcess
LeaveCriticalSection
GetVolumeInformationW
GlobalFlags
FileTimeToLocalFileTime
LoadLibraryW
GetNumberFormatW
GlobalSize
GetProcessTimes
GetFileAttributesExW
VirtualFree
ResumeThread
SetUnhandledExceptionFilter
FindClose
CreateFileW
EnterCriticalSection
IsValidLocale
DuplicateHandle
GetThreadLocale
GetCurrentThreadId
GetTimeZoneInformation
SuspendThread
CreateEventW
SetFilePointer
LockFile
lstrcmpiW
GetModuleFileNameW
SetStdHandle
GetLocaleInfoA
CompareStringW
GlobalLock
SetEnvironmentVariableA
GlobalGetAtomNameW
HeapSetInformation
GetUserDefaultLCID
GetVersionExW
user32
SetFocus
SetMenuDefaultItem
SetTimer
GetMenuCheckMarkDimensions
AppendMenuW
GetDoubleClickTime
ReleaseDC
GetWindowTextW
MoveWindow
RemovePropW
SetWindowLongW
UnregisterClassW
GetMenuItemID
GetWindowDC
SetPropW
IsDialogMessageW
SystemParametersInfoW
DefMDIChildProcW
CopyImage
SetClipboardData
TrackPopupMenu
GetIconInfo
InsertMenuW
DefWindowProcW
MapDialogRect
UnhookWindowsHookEx
DestroyCursor
MapVirtualKeyExW
CharUpperW
TranslateMDISysAccel
InsertMenuItemW
OffsetRect
SetWindowRgn
LoadBitmapW
IsClipboardFormatAvailable
CopyIcon
DrawFrameControl
AdjustWindowRectEx
RegisterClassW
CallWindowProcW
SetWindowContextHelpId
GetNextDlgTabItem
SetScrollPos
GetAsyncKeyState
GetMenu
GetSystemMenu
DrawTextExW
DeleteMenu
SetCapture
GetSysColorBrush
SetRect
CharUpperBuffW
GetWindowTextLengthW
GetDC
FrameRect
DrawEdge
GetClassLongW
GetCaretPos
TranslateMessage
EndPaint
GetForegroundWindow
SetCursor
CreatePopupMenu
DrawIcon
KillTimer
GetKeyNameTextW
GetWindow
HideCaret
DrawTextW
CreateIconFromResourceEx
MapWindowPoints
TranslateAcceleratorW
LoadCursorW
GetWindowRect
PeekMessageW
SetMenu
CheckDlgButton
GetMenuState
RemoveMenu
GetDlgItem
IsWindowEnabled
GetQueueStatus
DialogBoxParamW
GetMessageTime
CopyRect
PostMessageW
CloseClipboard
GetSubMenu
CreateWindowExW
GetOpenClipboardWindow
SetWindowsHookExW
GetWindowLongW
ClientToScreen
EndDeferWindowPos
SetActiveWindow
GetLastActivePopup
ClipCursor
OpenClipboard
GetSystemMetrics
DrawIconEx
IsMenu
ShowOwnedPopups
DrawFocusRect
ShowWindow
GetClassNameW
GetWindowThreadProcessId
RegisterWindowMessageW
GetMenuItemInfoW
MapVirtualKeyW
EnableMenuItem
GetClassInfoW
CheckMenuItem
EmptyClipboard
SetWindowPos
CreateIcon
InvertRect
GetDlgItemTextW
CreateMenu
EqualRect
EndDialog
GetWindowRgn
BeginDeferWindowPos
UpdateLayeredWindow
CharNextW
SetLayeredWindowAttributes
CallNextHookEx
DestroyIcon
SetWindowTextW
CreateDialogIndirectParamW
GetScrollPos
WaitMessage
FillRect
GetDesktopWindow
DefFrameProcW
GetClassInfoExW
LoadImageW
GetClipboardViewer
DispatchMessageW
TabbedTextOutW
UnionRect
ReleaseCapture
GetDialogBaseUnits
GetClientRect
DialogBoxIndirectParamW
GetMonitorInfoW
RegisterClipboardFormatW
SetMenuItemBitmaps
ModifyMenuW
SetScrollInfo
GetFocus
LoadIconW
IsChild
PtInRect
MonitorFromWindow
ValidateRect
GetDlgCtrlID
InflateRect
UnregisterClassA
GetScrollRange
GetMessagePos
GetPropW
GetProcessWindowStation
SetWindowPlacement
EnableWindow
GetMessageW
ScrollWindow
GetScrollInfo
LoadMenuW
EnableScrollBar
SetScrollRange
GetCapture
GetMenuStringW
InvalidateRect
SendMessageW
RealChildWindowFromPoint
GetUpdateRect
WinHelpW
SetDlgItemTextW
GetTopWindow
PostQuitMessage
MonitorFromPoint
UpdateWindow
GetKeyState
DrawStateW
IntersectRect
gdi32
IntersectClipRect
CreateRectRgn
CreatePen
CreatePatternBrush
GetBkMode
OffsetRgn
GetNearestPaletteIndex
SelectPalette
GetCurrentObject
GetTextExtentPoint32W
SetDIBitsToDevice
SetBitmapBits
ScaleWindowExtEx
GetLayout
GetBoundsRect
LPtoDP
SetLayout
GetRgnBox
GetBkColor
GetTextExtentPointW
RestoreDC
SaveDC
OffsetWindowOrgEx
DeleteObject
GetTextMetricsW
GetWindowExtEx
CreateFontW
GetViewportExtEx
CreateDIBSection
ExtSelectClipRgn
FillRgn
CreateDIBitmap
CreateCompatibleDC
GetWindowOrgEx
SetMapMode
FrameRgn
Rectangle
EnumFontFamiliesExW
GetStockObject
CombineRgn
CreateEllipticRgn
ExcludeClipRect
Ellipse
GetObjectType
SetWindowExtEx
EnumFontFamiliesW
RoundRect
SelectObject
RectVisible
OffsetViewportOrgEx
SelectClipRgn
SetStretchBltMode
ScaleViewportExtEx
GetTextCharsetInfo
SetDIBits
SetViewportOrgEx
CreateCompatibleBitmap
SetTextAlign
PtInRegion
DPtoLP
StretchBlt
RealizePalette
CreatePolygonRgn
SetROP2
GetPaletteEntries
SetRectRgn
SetPixel
SetBkColor
SetPixelV
ExtTextOutW
SetDIBColorTable
CreateBitmap
TextOutW
MoveToEx
LineTo
CreateHatchBrush
CreateSolidBrush
GetMapMode
GetViewportOrgEx
GetObjectW
GetSystemPaletteEntries
DeleteDC
SetViewportExtEx
GetDeviceCaps
CreatePalette
CreateRoundRectRgn
SetBkMode
SetPolyFillMode
PtVisible
GetTextColor
GetClipBox
SetWindowOrgEx
CreateRectRgnIndirect
CreateDCW
Polyline
CreateFontIndirectW
GetBitmapBits
GetTextFaceW
Escape
SetPaletteEntries
ExtFloodFill
GetPixel
SetTextColor
CopyMetaFileW
PatBlt
BitBlt
Polygon
advapi32
RegEnumValueW
CheckTokenMembership
RegEnumKeyW
RegDeleteValueW
RegOpenKeyExW
RegOpenKeyExA
RegCreateKeyExW
CryptGenRandom
RegQueryValueExW
RegDeleteKeyW
RegEnumKeyExW
RegQueryInfoKeyW
RegSetValueExW
RegQueryValueExA
RegQueryValueW
RegCloseKey
shell32
ExtractIconExW
DragFinish
SHAppBarMessage
DragQueryFileW
SHGetDesktopFolder
SHGetSpecialFolderLocation
ShellExecuteW
DuplicateIcon
ShellExecuteExW
SHGetFileInfoW
SHGetPathFromIDListW
Shell_NotifyIconW
SHBrowseForFolderW
ole32
OleUninitialize
RegisterDragDrop
CoLockObjectExternal
CoTaskMemAlloc
CoTaskMemFree
CoGetClassObject
OleDestroyMenuDescriptor
StgCreateDocfileOnILockBytes
CreateStreamOnHGlobal
OleIsCurrentClipboard
StgOpenStorageOnILockBytes
IsAccelerator
RevokeDragDrop
DoDragDrop
OleTranslateAccelerator
OleInitialize
OleGetClipboard
CoRegisterClassObject
OleLockRunning
CoInitialize
CLSIDFromString
CoFreeUnusedLibraries
OleDuplicateData
CoCreateGuid
StringFromGUID2
OleFlushClipboard
CLSIDFromProgID
OleCreateMenuDescriptor
ReleaseStgMedium
CoCreateInstance
CoInitializeEx
CreateILockBytesOnHGlobal
CoUninitialize
CoTaskMemRealloc
CoRegisterMessageFilter
CoRevokeClassObject
oleaut32
VariantCopy
VariantInit
VariantClear
OleCreateFontIndirect
VarBstrCat
VarBstrFromDate
VarUI4FromStr
SystemTimeToVariantTime
SysAllocStringByteLen
SysStringLen
SysFreeString
LoadTypeLi
SysAllocStringLen
SysStringByteLen
VariantTimeToSystemTime
RegisterTypeLi
UnRegisterTypeLi
VarBstrCmp
SysAllocString
SafeArrayDestroy
VariantChangeType
comctl32
ImageList_DragShowNolock
InitCommonControlsEx
_TrackMouseEvent
ImageList_DragMove
ImageList_GetIconSize
ord17
Sections
.text Size: 641KB - Virtual size: 641KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 140KB - Virtual size: 5.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: - Virtual size: 101B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ