Static task
static1
Behavioral task
behavioral1
Sample
0071b61df96798ff269243754db4d3b251ab4e2c94a8c9e8928487ff288904ec.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
0071b61df96798ff269243754db4d3b251ab4e2c94a8c9e8928487ff288904ec.exe
Resource
win10v2004-20220901-en
General
-
Target
0071b61df96798ff269243754db4d3b251ab4e2c94a8c9e8928487ff288904ec
-
Size
368KB
-
MD5
41291578aef671fef7dbab341edda403
-
SHA1
4b16bc99e4f73c8269acdb53187e5d928c9fc03f
-
SHA256
0071b61df96798ff269243754db4d3b251ab4e2c94a8c9e8928487ff288904ec
-
SHA512
f94fb79b740bab8f246419fce8d5f431abcc442cd542c2d52cab8d8c9e7012d0831cdecbdd943620eac63425cc44ac308a0b0d1b6f5316784c160c3846dd0d0e
-
SSDEEP
6144:T3qKOhd7sARC+x92Bf+0OjmqH0FoVVx0Pqbm:Tajhd768XH0Pqb
Malware Config
Signatures
Files
-
0071b61df96798ff269243754db4d3b251ab4e2c94a8c9e8928487ff288904ec.exe windows x86
868f28e423970edded90369cc7b529b4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
DragQueryFileA
SHBrowseForFolderA
SHChangeNotify
DragFinish
shlwapi
UrlUnescapeA
PathFindExtensionA
PathStripToRootA
PathFindFileNameA
PathIsUNCA
advapi32
RegEnumKeyExW
RegSetValueExW
RegCreateKeyW
RegOpenKeyExW
SetFileSecurityW
RegQueryValueExA
RegCreateKeyExW
RegCloseKey
GetFileSecurityW
RegQueryInfoKeyW
RegEnumKeyW
RegQueryValueW
RegDeleteKeyW
RegSetValueW
RegOpenKeyW
RegQueryValueExW
comctl32
InitCommonControlsEx
ImageList_LoadImageA
ImageList_Create
kernel32
GetTickCount
IsBadCodePtr
GetTempPathA
DeleteFileA
DeleteCriticalSection
GetOEMCP
VirtualQuery
QueryPerformanceCounter
WideCharToMultiByte
MapViewOfFile
MultiByteToWideChar
FreeEnvironmentStringsW
RemoveDirectoryA
GetModuleFileNameA
CreateFileMappingA
GetFileTime
GlobalFree
WriteFile
TerminateProcess
GetStringTypeW
GlobalLock
HeapAlloc
LocalReAlloc
GetWindowsDirectoryA
HeapCreate
DeviceIoControl
HeapSize
MoveFileA
GetFileType
SetUnhandledExceptionFilter
GetStdHandle
GetStringTypeA
GetVersion
GetCurrentThreadId
HeapFree
LocalFree
LCMapStringW
LeaveCriticalSection
HeapDestroy
LoadResource
HeapReAlloc
ResetEvent
GetLastError
ResumeThread
SizeofResource
LocalAlloc
GetDateFormatA
GlobalAlloc
PeekNamedPipe
GetCommandLineA
lstrlenW
CreateEventA
FreeEnvironmentStringsA
TlsGetValue
GetExitCodeThread
ExitProcess
GetCPInfo
CloseHandle
CopyFileA
FindClose
CreateProcessA
SetErrorMode
GetProcessHeap
GetACP
CreateSemaphoreA
GetFileAttributesA
DuplicateHandle
SuspendThread
lstrcpyA
GlobalMemoryStatus
GetVolumeInformationA
TlsAlloc
FindNextFileA
GetFullPathNameA
GlobalDeleteAtom
GetEnvironmentStrings
GetFileSize
GetLocaleInfoA
GetCurrentProcess
GetTimeZoneInformation
FindResourceA
LoadLibraryA
VirtualAlloc
GetStartupInfoA
VirtualFree
EnterCriticalSection
InitializeCriticalSection
GetSystemInfo
GetEnvironmentStringsW
SetLastError
GetEnvironmentVariableA
InterlockedDecrement
FileTimeToLocalFileTime
RtlUnwind
TerminateThread
ReleaseSemaphore
SetEndOfFile
VirtualProtect
RaiseException
lstrlenA
CreateMutexA
SetEnvironmentVariableA
FileTimeToSystemTime
SetHandleCount
GetTimeFormatA
SetStdHandle
UnhandledExceptionFilter
ReadFile
SetFilePointer
WaitForSingleObject
TlsSetValue
GetProcAddress
LockResource
CompareStringA
GetModuleHandleA
FindFirstFileA
InterlockedExchange
GetCurrentProcessId
GetCurrentDirectoryA
CompareStringW
FlushFileBuffers
LCMapStringA
GetVersionExA
TlsFree
Sleep
GetSystemTimeAsFileTime
gdi32
DeleteDC
DeleteObject
GetCharABCWidthsFloatA
PlgBlt
CreateSolidBrush
ExtEscape
GetAspectRatioFilterEx
GetClipRgn
CreatePolyPolygonRgn
GdiComment
SetColorAdjustment
CreateFontA
GetCurrentObject
AnimatePalette
GetKerningPairsA
Rectangle
AngleArc
EnumObjects
CreateDIBPatternBrushPt
PolyDraw
GetMiterLimit
DrawEscape
WidenPath
OffsetRgn
GetClipBox
GetColorAdjustment
SetMapperFlags
SetMiterLimit
GetBrushOrgEx
CreateDiscardableBitmap
GetDeviceCaps
PlayMetaFileRecord
GetCharWidthFloatA
EnumMetaFile
AbortPath
ArcTo
user32
IsZoomed
SetWindowLongA
FillRect
ValidateRect
GetDlgItem
GetMessagePos
ReleaseCapture
MessageBoxA
CreateWindowExA
ShowWindow
LoadBitmapA
SetParent
DestroyWindow
IsChild
EnableMenuItem
DestroyAcceleratorTable
SetMenu
ClientToScreen
DeferWindowPos
GetMessageA
FrameRect
MsgWaitForMultipleObjects
IsWindowVisible
GetSysColorBrush
LockWindowUpdate
CharNextA
BeginPaint
PostQuitMessage
KillTimer
MapDialogRect
OffsetRect
RegisterClassExA
WaitForInputIdle
DrawEdge
PtInRect
CheckMenuItem
EndPaint
SetWindowRgn
RegisterWindowMessageA
IntersectRect
RegisterHotKey
SetWindowsHookExA
GetActiveWindow
InflateRect
GetClientRect
GetTopWindow
SetWindowPos
DestroyCursor
GetParent
LoadIconA
GetFocus
CreateDialogIndirectParamA
GetWindowRect
LoadCursorA
GetSystemMetrics
GetKeyboardState
GetWindowLongA
DestroyIcon
SendDlgItemMessageA
CharUpperBuffA
CreateIconIndirect
SetFocus
TranslateMessage
GetMenuItemID
SetMenuDefaultItem
SetRect
SetScrollInfo
GetMenu
SetForegroundWindow
ReleaseDC
GetWindowThreadProcessId
IsWindow
InvalidateRect
UnregisterHotKey
RegisterClassA
GetDlgCtrlID
LoadStringA
DefWindowProcA
GetForegroundWindow
ScreenToClient
Sections
.text Size: 81KB - Virtual size: 81KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 98KB - Virtual size: 98KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 84KB - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 89KB - Virtual size: 89KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ