Static task
static1
Behavioral task
behavioral1
Sample
c162176578a21570597bdec4ad9c68a9f50afb144757d277c3b3a986d3e04d98.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c162176578a21570597bdec4ad9c68a9f50afb144757d277c3b3a986d3e04d98.exe
Resource
win10v2004-20220812-en
General
-
Target
c162176578a21570597bdec4ad9c68a9f50afb144757d277c3b3a986d3e04d98
-
Size
680KB
-
MD5
7b4110c060ba564029dfea1b4694d98b
-
SHA1
cfd8ffbb9c318320b5ca3f0db3acc2b77ee36b48
-
SHA256
c162176578a21570597bdec4ad9c68a9f50afb144757d277c3b3a986d3e04d98
-
SHA512
a6177d80197f7e14fe59ec507c660bab724b38a1dacc372e1dc3df439e848296f9b1f3f9355051d858966aad504fa7b9803cbf92979365cfebb69c15b690303f
-
SSDEEP
12288:V8QL21wnmOGl/UDTDPAE94IPPH9xxbUN4RLk:KQL2CmTRUDTDz4IPpbUNh
Malware Config
Signatures
Files
-
c162176578a21570597bdec4ad9c68a9f50afb144757d277c3b3a986d3e04d98.exe windows x86
56add8805281d13c8439d867eb420d1b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shfolder
SHGetFolderPathA
kernel32
UnhandledExceptionFilter
GetStdHandle
VirtualFree
HeapCreate
HeapDestroy
GetCurrentProcessId
QueryPerformanceCounter
HeapSize
ExitThread
HeapReAlloc
LCMapStringA
GetCommandLineA
GetStartupInfoA
TerminateProcess
VirtualQuery
LCMapStringW
GetStringTypeA
GetStringTypeW
GetTimeZoneInformation
IsBadCodePtr
MapViewOfFile
CreateFileMappingA
UnmapViewOfFile
SetThreadExecutionState
ResetEvent
PulseEvent
GetUserDefaultLangID
MulDiv
SetFilePointer
SetEndOfFile
FileTimeToLocalFileTime
FileTimeToSystemTime
GetSystemInfo
GetTempPathA
WriteFile
FreeResource
GetTempFileNameA
IsBadWritePtr
LoadLibraryA
GetTickCount
lstrcmpW
DeleteFileA
GetVolumeInformationA
LocalFree
FormatMessageA
GetFullPathNameA
GlobalAlloc
GlobalReAlloc
GetFileTime
GetFileSize
WritePrivateProfileStringA
LoadLibraryExA
lstrcpynA
GetProcAddress
GetModuleHandleA
FreeLibrary
LeaveCriticalSection
FreeEnvironmentStringsA
CreateThread
CreateEventA
WaitForMultipleObjects
GetCurrentDirectoryA
FindFirstFileA
FindNextFileA
FindClose
GlobalLock
GlobalUnlock
GlobalFree
SystemTimeToFileTime
GetSystemTimeAsFileTime
VirtualAlloc
VirtualProtect
HeapFree
HeapAlloc
ExitProcess
RtlUnwind
CompareFileTime
lstrcmpA
SetEvent
WaitForSingleObject
ReleaseSemaphore
FindResourceExA
Sleep
CreateSemaphoreA
lstrcpyA
GetModuleFileNameA
lstrcatA
CreateFileA
ReadFile
CloseHandle
GetFileAttributesA
SetStdHandle
SetCurrentDirectoryA
OutputDebugStringA
FindResourceA
LoadResource
LockResource
SizeofResource
SetErrorMode
GetOEMCP
GetCPInfo
GlobalFlags
TlsFree
LocalReAlloc
TlsSetValue
CompareStringW
CompareStringA
lstrlenA
lstrcmpiA
GetVersion
DeleteCriticalSection
InitializeCriticalSection
GetLastError
RaiseException
WideCharToMultiByte
MultiByteToWideChar
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
EnterCriticalSection
SetUnhandledExceptionFilter
IsBadReadPtr
GetProcessHeap
SetEnvironmentVariableA
SetLastError
EnumResourceLanguagesA
ConvertDefaultLocale
GlobalDeleteAtom
GetCurrentThreadId
GetCurrentThread
TlsAlloc
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
SetThreadPriority
ResumeThread
SuspendThread
InterlockedDecrement
FlushFileBuffers
LockFile
UnlockFile
DuplicateHandle
GetCurrentProcess
InterlockedIncrement
LocalAlloc
GlobalHandle
TlsGetValue
user32
GrayStringA
BeginPaint
EndPaint
PostQuitMessage
GetNextDlgTabItem
IsWindowEnabled
CreateDialogIndirectParamA
SetActiveWindow
GetActiveWindow
GetWindow
SystemParametersInfoA
CallWindowProcA
DefWindowProcA
GetDlgCtrlID
RegisterClassA
GetClassInfoA
AdjustWindowRectEx
GetMenu
IsWindowVisible
SetForegroundWindow
GetKeyState
TrackPopupMenuEx
MapWindowPoints
GetMessagePos
GetMessageTime
UnhookWindowsHookEx
GetTopWindow
DispatchMessageA
GetLastActivePopup
GetForegroundWindow
SetFocus
GetFocus
DrawTextExA
GetPropA
SetPropA
GetClassNameA
GetClassInfoExA
GetClassLongA
CallNextHookEx
SetWindowsHookExA
CreateWindowExA
GetCapture
WinHelpA
RegisterWindowMessageA
IsDialogMessageA
MoveWindow
LoadBitmapA
GetMenuCheckMarkDimensions
CheckMenuItem
EnableMenuItem
ModifyMenuA
SetMenuItemBitmaps
ValidateRect
TranslateMessage
GetMessageA
DestroyMenu
GetSysColorBrush
SetRectEmpty
GetWindowRect
IsIconic
TabbedTextOutA
FillRect
GetMenuState
SetWindowPos
RemovePropA
CharUpperA
UnregisterClassA
GetClientRect
EnableWindow
SetCursor
GetDesktopWindow
DrawFrameControl
SendMessageA
DestroyWindow
DestroyIcon
CopyRect
DrawTextA
IntersectRect
InflateRect
IsRectEmpty
GetMonitorInfoA
SetParent
OffsetRect
GetSysColor
GetSystemMetrics
KillTimer
SetTimer
RedrawWindow
AppendMenuA
CreatePopupMenu
DialogBoxIndirectParamA
GetMenuItemCount
GetMenuItemID
GetSubMenu
PtInRect
CharNextA
SetRect
PeekMessageA
ClientToScreen
GetCursorPos
WindowFromPoint
UpdateWindow
SendDlgItemMessageA
ShowWindow
GetDlgItem
SetDlgItemTextA
wsprintfA
GetDlgItemTextA
CreateDialogParamA
LoadStringA
InvalidateRect
LoadIconA
GetParent
LoadCursorA
EndDialog
PostMessageA
GetWindowLongA
SetWindowLongA
SetWindowTextA
IsDlgButtonChecked
MessageBoxA
GetWindowTextA
ReleaseDC
GetDC
GetWindowPlacement
ScreenToClient
IsWindow
gdi32
PlayEnhMetaFile
DeleteEnhMetaFile
SetDIBitsToDevice
CreatePalette
GetDIBColorTable
GetObjectA
GetStockObject
GetClipBox
SetMapMode
SetStretchBltMode
RestoreDC
SaveDC
Escape
LineTo
MoveToEx
CreateDIBSection
GetPixel
SetTextColor
SetBkColor
GetBkMode
SetBkMode
CreateSolidBrush
Rectangle
CreatePen
CreateFontIndirectA
CreateCompatibleDC
SelectObject
BitBlt
DeleteDC
DeleteObject
GetDeviceCaps
PtVisible
RectVisible
TextOutA
ExtTextOutA
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
CreateBitmap
StretchDIBits
comdlg32
GetFileTitleA
ole32
CoCreateInstance
CoTaskMemFree
CoUninitialize
CoTaskMemAlloc
CoInitialize
oleaut32
SysAllocString
SysFreeString
SysAllocStringLen
VariantClear
VariantChangeType
VariantInit
winmm
timeEndPeriod
timeKillEvent
timeGetDevCaps
timeBeginPeriod
timeGetTime
timeSetEvent
msimg32
AlphaBlend
advapi32
RegQueryValueExA
RegOpenKeyExA
RegEnumKeyExA
RegCreateKeyExA
RegDeleteValueA
RegSetValueExA
RegEnumKeyA
RegDeleteKeyA
RegOpenKeyA
RegQueryValueA
RegCloseKey
shell32
ExtractIconExA
SHGetMalloc
comctl32
ord17
shlwapi
PathFindFileNameA
PathStripToRootA
PathIsUNCA
PathFindExtensionA
imagehlp
ImageEnumerateCertificates
ImageGetCertificateHeader
ImageGetCertificateData
ImageGetDigestStream
version
GetFileVersionInfoSizeA
VerQueryValueA
GetFileVersionInfoA
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
Sections
.text Size: 312KB - Virtual size: 311KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 72KB - Virtual size: 69KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 108KB - Virtual size: 104KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
PACK Size: 160KB - Virtual size: 416KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE