Static task
static1
Behavioral task
behavioral1
Sample
525a120ecd92f3c648764f2fe667e0100ae3ac2fa66c3addff4fb92f434fc699.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
525a120ecd92f3c648764f2fe667e0100ae3ac2fa66c3addff4fb92f434fc699.exe
Resource
win10v2004-20220812-en
General
-
Target
525a120ecd92f3c648764f2fe667e0100ae3ac2fa66c3addff4fb92f434fc699
-
Size
531KB
-
MD5
58b169efc55bfa624d028ac27b974430
-
SHA1
41d779cf14febb738e9b4915cd8af31b95886bd5
-
SHA256
525a120ecd92f3c648764f2fe667e0100ae3ac2fa66c3addff4fb92f434fc699
-
SHA512
c8370869dabc846525b2b89b1f5e4514455c81d1cf8d6e6a603a3d462eaa7b20c9520f4d6319ad66e58231c8fcb7e87843b510cc71ba0b174cf4af6603feb381
-
SSDEEP
12288:FQd0gWX2HauvRFCaRK5j+RRoFBtlrHokf49/UixOWPJ3cFzFbO7jhXNoQ1NhXS42:Kd9a2HauvR0aRK5j+RRKrHokf49/nxOH
Malware Config
Signatures
Files
-
525a120ecd92f3c648764f2fe667e0100ae3ac2fa66c3addff4fb92f434fc699.exe windows x86
909eb49e8b15e8ce8e4d22eaf2a2e0f6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
UnhandledExceptionFilter
TerminateProcess
GetStartupInfoA
SetUnhandledExceptionFilter
Sleep
InterlockedExchange
IsDebuggerPresent
HeapFree
HeapAlloc
LoadLibraryA
IsProcessorFeaturePresent
VirtualFree
VirtualAlloc
InitializeCriticalSection
GetVersionExA
GetModuleHandleW
GetProcAddress
GetProcessHeap
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
VirtualProtect
CloseHandle
GetLastError
ReadDirectoryChangesW
CreateFileW
SleepEx
CancelIo
DeleteCriticalSection
InterlockedIncrement
SetLastError
FlushInstructionCache
GetCurrentProcess
InterlockedDecrement
RaiseException
LeaveCriticalSection
AddAtomW
EnterCriticalSection
SetProcessShutdownParameters
InterlockedCompareExchange
user32
UnregisterClassA
RegisterWindowMessageW
CallWindowProcW
CreateWindowExW
GetWindowLongW
SetWindowLongW
DefWindowProcW
DestroyWindow
LoadCursorW
GetClassInfoExW
RegisterClassExW
MsgWaitForMultipleObjectsEx
IsWindow
DispatchMessageW
PeekMessageW
shell32
SHGetPathFromIDListW
SHGetFolderLocation
ole32
OleUninitialize
OleInitialize
CoTaskMemFree
grooveutil
?int_ErrorBase@GCError@@CG?AV1@KJPB_W00PAUIErrorInfo@@JABU_GUID@@0K@Z
?HandleAllErrorCatch@@YGXXZ
??1GCSmartInvalidParameterHandler@@QAE@XZ
??0GCSmartInvalidParameterHandler@@QAE@_N@Z
??1GCSmartExceptionFilter@@QAE@XZ
??0GCSmartExceptionFilter@@QAE@_N@Z
??1GCSmartTerminateHandler@@QAE@XZ
??0GCSmartTerminateHandler@@QAE@_N@Z
??1GCSmartExceptionTranslator@@UAE@XZ
??0GCSmartExceptionTranslator@@QAE@_N0@Z
??0GCStr@@QAE@PB_W@Z
?InitThread@GCMso@@SGXXZ
?ms_Is32BitAppOn64BitWindows@GCOSVersionInformation@@0_NA
?HandleMessageMapErrorCatch@@YGXKIJ@Z
?HandleAllNoUIErrorCatch@@YGXXZ
?EndErrorBlock@GCCriticalErrorInfo@@SGXXZ
?StartErrorBlock@GCCriticalErrorInfo@@SGX_N@Z
?Set@GCStr@@QAEXPB_W@Z
?EqualsNoCase@GCStr@@QBE_NPB_W@Z
??1GCAnyIPtr@@QAE@XZ
?CreateInstanceNoRelease@GCIPtrBase@@IAEXABU_GUID@@0K@Z
?QueryInterfaceNoRelease@GCIPtrBase@@IAEXABU_GUID@@PAUIUnknown@@@Z
?_Release@GCStr@@AAEXXZ
??1GCError@@QAE@XZ
?TerminateGrooveProcess@GCError@@SGXPBV1@K_NJPBU_EXCEPTION_POINTERS@@@Z
?int_RawError@GCError@@CG?AV1@KJ@Z
?Uninit@GCMso@@SGX_N@Z
?Set@GCErrorInfo@@SGXPAUIErrorInfo@@@Z
?Throw@GCError@@QBEXXZ
msvcr80
__dllonexit
__CxxFrameHandler3
_controlfp_s
_invoke_watson
_decode_pointer
_recalloc
swprintf_s
memcpy_s
memset
free
wcsncpy_s
_amsg_exit
__getmainargs
_cexit
_exit
_XcptFilter
_ismbblead
exit
_acmdln
_initterm
_initterm_e
_configthreadlocale
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
_encode_pointer
__set_app_type
_crt_debugger_hook
_except_handler4_common
_unlock
_lock
_onexit
groovenew
?GrooveDelete@@YAXPAX@Z
?GrooveNew@@YAPAXI@Z
atl80
ord44
ord43
shlwapi
PathIsDirectoryW
PathFileExistsW
PathCombineW
Sections
.text Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vmp0 Size: 508KB - Virtual size: 1.6MB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE