Static task
static1
Behavioral task
behavioral1
Sample
389ede3d0f267f994d42fe729fb8c8b7c9af18a14f4c353d446e89301e316e91.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
389ede3d0f267f994d42fe729fb8c8b7c9af18a14f4c353d446e89301e316e91.exe
Resource
win10v2004-20220901-en
General
-
Target
389ede3d0f267f994d42fe729fb8c8b7c9af18a14f4c353d446e89301e316e91
-
Size
765KB
-
MD5
41ec9d4afec2c86939542f35a7c28eab
-
SHA1
0f0ed243e638c1549ad8e9735f71031994c21922
-
SHA256
389ede3d0f267f994d42fe729fb8c8b7c9af18a14f4c353d446e89301e316e91
-
SHA512
87b13aa680fb40a51c6398d0b4297a6354ea2ef1e76ba3a28376127eda428739ae30455d046aae44d1f5050209f39ccf59ffb7e7624169734f46e905ba6fbdd4
-
SSDEEP
12288:+n7LUbtVKo11yrlRyljHViVHMwtOitidSGeum411rW6V:+n7LUbt5Wl4lzkcitidSGeumw1q
Malware Config
Signatures
Files
-
389ede3d0f267f994d42fe729fb8c8b7c9af18a14f4c353d446e89301e316e91.exe windows x86
1794cd06a9c01e44d1299d92687ed0be
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
psapi
EnumProcessModules
EnumProcesses
GetModuleBaseNameA
kernel32
HeapFree
HeapAlloc
ExitProcess
RaiseException
GetModuleHandleA
GetCommandLineA
GetLocalTime
HeapSize
HeapReAlloc
GetCPInfo
GetStartupInfoA
GetOEMCP
UnhandledExceptionFilter
SetStdHandle
GetFileType
GetACP
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
HeapCreate
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
SetErrorMode
RtlUnwind
IsBadWritePtr
IsBadCodePtr
LCMapStringA
LCMapStringW
CompareStringA
CompareStringW
SetEnvironmentVariableA
Sleep
LocalFree
CreateProcessA
WaitForSingleObject
CloseHandle
MoveFileExA
RemoveDirectoryA
MoveFileA
DeleteFileA
GetFileAttributesA
lstrcpyA
lstrlenA
FindFirstFileA
lstrcatA
lstrcmpA
SetFileAttributesA
CopyFileA
FindNextFileA
GetLastError
FindClose
GetProfileStringA
GlobalGetAtomNameA
GlobalAddAtomA
GetModuleFileNameA
GetFileTime
GetFileSize
SetEndOfFile
GetFullPathNameA
GetVolumeInformationA
FlushFileBuffers
UnlockFile
LockFile
ReadFile
SetFilePointer
WriteFile
DuplicateHandle
CreateFileA
GetCurrentProcess
WritePrivateProfileStringA
LoadLibraryA
GetProcessVersion
GetVersion
GetProcAddress
FreeLibrary
TlsSetValue
SetLastError
LocalReAlloc
GlobalReAlloc
TlsGetValue
EnterCriticalSection
GlobalHandle
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
TlsAlloc
FileTimeToLocalFileTime
lstrcmpiA
SizeofResource
MultiByteToWideChar
FileTimeToSystemTime
InterlockedIncrement
WideCharToMultiByte
InterlockedDecrement
lstrcpynA
CreateEventA
SetEvent
GetCurrentThread
GlobalAlloc
GlobalDeleteAtom
GlobalLock
MulDiv
GetCurrentThreadId
LockResource
GlobalUnlock
GlobalFree
OpenProcess
FindResourceA
LoadResource
GetTimeZoneInformation
LocalAlloc
IsBadReadPtr
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
user32
SetRectEmpty
LoadStringA
LoadAcceleratorsA
TranslateAcceleratorA
LoadMenuA
SetMenu
ReuseDDElParam
UnpackDDElParam
BringWindowToTop
RegisterClipboardFormatA
GetDC
ReleaseDC
GetMenuCheckMarkDimensions
LoadBitmapA
IntersectRect
ModifyMenuA
SetMenuItemBitmaps
InvalidateRect
CheckMenuItem
ShowWindow
IsDialogMessageA
PostMessageA
UpdateWindow
SendDlgItemMessageA
SystemParametersInfoA
MapWindowPoints
GetSysColor
GetFocus
SetFocus
AdjustWindowRectEx
EqualRect
CopyRect
EndDeferWindowPos
IsWindowVisible
ScreenToClient
EnableMenuItem
LoadCursorA
DestroyMenu
GetCapture
WinHelpA
wsprintfA
GetClassInfoA
RegisterClassA
GetMenuItemCount
GetSubMenu
GetMenuItemID
GetMenu
GetDlgItem
GetWindowTextLengthA
GetWindowTextA
GetDlgCtrlID
GetKeyState
DefWindowProcA
CreateWindowExA
CallNextHookEx
UnhookWindowsHookEx
SetWindowsHookExA
SetPropA
GetLastActivePopup
GetForegroundWindow
SetForegroundWindow
GetPropA
RemovePropA
CallWindowProcA
GetMessageTime
GetMessagePos
GetWindow
GetWindowRect
GetWindowLongA
SetWindowLongA
SetWindowPos
RegisterWindowMessageA
ClientToScreen
PtInRect
GetClassNameA
GetNextDlgTabItem
EndDialog
IsWindowEnabled
GetActiveWindow
SetActiveWindow
IsWindow
CreateDialogIndirectParamA
DestroyWindow
GetParent
MessageBoxA
DispatchMessageA
PeekMessageA
SetWindowTextA
SetDlgItemTextA
ReleaseCapture
InflateRect
GetDesktopWindow
EnableWindow
IsIconic
GetSystemMetrics
GetClientRect
DrawIcon
SendMessageA
LoadIconA
GetScrollInfo
CharLowerA
CharUpperA
GetMessageA
TranslateMessage
ValidateRect
GetCursorPos
SetMessageQueue
SetCursor
ShowOwnedPopups
PostQuitMessage
GrayStringA
DrawTextA
TabbedTextOutA
EndPaint
BeginPaint
GetWindowDC
GetTopWindow
BeginDeferWindowPos
DeferWindowPos
GetMenuState
UnregisterClassA
HideCaret
OffsetRect
ShowCaret
ExcludeUpdateRgn
DrawFocusRect
DefDlgProcA
CharNextA
IsWindowUnicode
gdi32
PatBlt
SaveDC
DeleteDC
SelectObject
GetStockObject
RestoreDC
SetBkMode
SetMapMode
OffsetViewportOrgEx
SetViewportExtEx
SetViewportOrgEx
ScaleViewportExtEx
ScaleWindowExtEx
GetClipBox
SetWindowExtEx
IntersectClipRect
SetBkColor
GetObjectA
DeleteObject
GetDeviceCaps
CreatePen
CreateSolidBrush
PtVisible
RectVisible
ExtTextOutA
Escape
TextOutA
GetTextExtentPointA
CreateDIBitmap
CreateCompatibleDC
CreateBitmap
SetTextColor
BitBlt
comdlg32
GetFileTitleA
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
advapi32
RegOpenKeyExA
RegCreateKeyExA
CloseServiceHandle
OpenSCManagerA
QueryServiceLockStatusA
RegCloseKey
RegSetValueExA
shell32
DragQueryFileA
DragFinish
comctl32
ord17
ImageList_Destroy
Sections
.text Size: 121KB - Virtual size: 121KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 19KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 82KB - Virtual size: 82KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 22KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.vmp0 Size: 500KB - Virtual size: 1.6MB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE