Static task
static1
Behavioral task
behavioral1
Sample
71d442b7002c6677ac484ff8a4e6f33e301d03ca57cd6852b29c7fdeb5d06c2a.exe
Resource
win7-20220812-en
General
-
Target
71d442b7002c6677ac484ff8a4e6f33e301d03ca57cd6852b29c7fdeb5d06c2a
-
Size
322KB
-
MD5
0517b38fcdbd066a89f3726940314010
-
SHA1
0f467f35dae20389a12b70317431ab57cbeae170
-
SHA256
71d442b7002c6677ac484ff8a4e6f33e301d03ca57cd6852b29c7fdeb5d06c2a
-
SHA512
fd53f5247b125fb34cc0dce4d3d195c7d23ac71a3e5c2fe1345764e8fa147aad319f292acf1479c5e9a4f41079d6399a0dc449f79dc152f5e1988186b483bdea
-
SSDEEP
6144:XM/IGU1/BQc8MCFMLIcNtqGHrOyHqM1vTG92yq53Xlv5:8/IGa5I2OpX3qZL
Malware Config
Signatures
Files
-
71d442b7002c6677ac484ff8a4e6f33e301d03ca57cd6852b29c7fdeb5d06c2a.exe windows x86
890ae55e9c609c1bbae8ef9ce39e8438
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalFindAtomA
GlobalAddAtomA
GetCurrentDirectoryA
GlobalFlags
GetCPInfo
GetOEMCP
GetTimeFormatA
GetDateFormatA
GetSystemTimeAsFileTime
CreateDirectoryA
HeapAlloc
HeapFree
RtlUnwind
RaiseException
VirtualAlloc
HeapReAlloc
SetStdHandle
GetFileType
ExitThread
CreateThread
ExitProcess
HeapSize
UnhandledExceptionFilter
IsDebuggerPresent
GetACP
IsValidCodePage
LCMapStringA
GlobalGetAtomNameA
SetHandleCount
GetStdHandle
GetStartupInfoA
GetConsoleCP
GetConsoleMode
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
InitializeCriticalSectionAndSpinCount
GetDriveTypeA
GetStringTypeA
GetStringTypeW
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetProcessHeap
CompareStringW
SetEnvironmentVariableA
TlsFree
LocalReAlloc
TlsSetValue
lstrcmpW
GlobalHandle
GlobalReAlloc
TlsGetValue
LocalAlloc
GetCurrentProcessId
InterlockedDecrement
InterlockedIncrement
GetModuleFileNameW
GetModuleHandleW
SetErrorMode
GlobalDeleteAtom
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
LoadLibraryExA
CompareStringA
InterlockedExchange
lstrcmpA
FreeLibrary
SuspendThread
ResumeThread
SetThreadPriority
GetFullPathNameA
GetVolumeInformationA
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
LoadLibraryA
GetFileTime
GetFileSizeEx
GetFileAttributesA
CreateFileA
SetFileTime
SystemTimeToFileTime
LocalFileTimeToFileTime
GetFileAttributesExA
FileTimeToLocalFileTime
FileTimeToSystemTime
SetLastError
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
MultiByteToWideChar
OutputDebugStringA
GetCurrentThreadId
GetLocalTime
SetEvent
UnmapViewOfFile
MapViewOfFile
CreateEventA
CreateFileMappingA
TlsAlloc
WritePrivateProfileStringA
GetPrivateProfileStringA
GetProcAddress
GetVersionExA
GetTimeZoneInformation
FindClose
FindNextFileA
DeleteFileA
FindFirstFileA
IsBadWritePtr
GetModuleFileNameA
VirtualQuery
FormatMessageA
GetCurrentProcess
TerminateProcess
SetUnhandledExceptionFilter
lstrlenA
WaitForSingleObject
GetModuleHandleA
GetCommandLineA
LocalFree
GetComputerNameA
CloseHandle
Sleep
CreateMutexA
CreateProcessA
Process32Next
Process32First
CreateToolhelp32Snapshot
GetLastError
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
SetFileAttributesA
FindResourceA
LoadResource
LockResource
SizeofResource
LCMapStringW
WideCharToMultiByte
user32
DestroyMenu
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
SetCursor
ShowWindow
SetWindowTextA
RegisterWindowMessageA
LoadIconA
WinHelpA
GetCapture
GetClassLongA
GetClassNameA
SetPropA
GetPropA
RemovePropA
IsWindow
GetForegroundWindow
GetDlgItem
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetMenu
SetForegroundWindow
GetClientRect
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
CopyRect
PtInRect
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
GetMenu
SetWindowLongA
SetWindowPos
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowRect
GetWindow
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
GetFocus
ModifyMenuA
EnableMenuItem
CheckMenuItem
GetWindowTextA
GetWindowThreadProcessId
GetParent
GetWindowLongA
GetLastActivePopup
IsWindowEnabled
EnableWindow
MessageBoxA
UnhookWindowsHookEx
LoadCursorA
GetDC
ReleaseDC
GetSysColor
GetSysColorBrush
PostMessageA
PostQuitMessage
SetWindowsHookExA
CallNextHookEx
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
IsWindowVisible
SendMessageA
GetKeyState
PeekMessageA
GetCursorPos
ValidateRect
CharUpperA
GetSystemMetrics
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
wsprintfA
gdi32
ExtTextOutA
GetStockObject
DeleteDC
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
GetDeviceCaps
TextOutA
RectVisible
PtVisible
DeleteObject
SetMapMode
RestoreDC
SaveDC
SetBkColor
SetTextColor
GetClipBox
CreateBitmap
Escape
comdlg32
GetFileTitleA
winspool.drv
DocumentPropertiesA
OpenPrinterA
ClosePrinter
advapi32
RegQueryValueA
RegOpenKeyA
RegSetValueExA
RegQueryValueExA
RegDeleteKeyA
RegCloseKey
RegOpenKeyExA
RegCreateKeyExA
SetNamedSecurityInfoA
SetEntriesInAclA
BuildExplicitAccessWithNameA
GetNamedSecurityInfoA
CloseServiceHandle
StartServiceA
QueryServiceStatusEx
OpenServiceA
OpenSCManagerA
RegEnumKeyA
shlwapi
PathFindFileNameA
PathFindExtensionA
PathStripToRootA
PathIsUNCA
oleaut32
VariantInit
VariantClear
VariantChangeType
ws2_32
select
closesocket
accept
listen
recv
socket
WSAStartup
htons
htonl
send
WSACleanup
gethostbyname
ioctlsocket
connect
getsockopt
bind
Sections
.text Size: 184KB - Virtual size: 184KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 40KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 30KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.rmnet Size: 56KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE