Static task
static1
Behavioral task
behavioral1
Sample
71bb303621f3c5bcef89ca3ce709ceaa8a028c04e2bc8543db8459c4f29a89a8.exe
Resource
win7-20220812-en
General
-
Target
71bb303621f3c5bcef89ca3ce709ceaa8a028c04e2bc8543db8459c4f29a89a8
-
Size
376KB
-
MD5
006fd4447f0b1ad126069b007bea4f36
-
SHA1
fcd4d6341b94893b0ff30d4cbd4d277d4ad2e0b8
-
SHA256
71bb303621f3c5bcef89ca3ce709ceaa8a028c04e2bc8543db8459c4f29a89a8
-
SHA512
948d6c64029037eb4a9b349e73326ff9aa420c482b01b0e3a70665360f6912102adb28a4c8bdf4d68374927be7327e4cff3765b3007b1a63472b5064311c6b88
-
SSDEEP
6144:u1qxrXG8rfElTLRNhZmJdAvnTqLAe4L9CQkXwGYhUV1/XSEYfA9m7f91m:BxrXXfAXhEJuvnTqf4L4rw7o1/C409E
Malware Config
Signatures
Files
-
71bb303621f3c5bcef89ca3ce709ceaa8a028c04e2bc8543db8459c4f29a89a8.exe windows x86
313595ddb4dbb6f99092159b1fbb886c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetVersionExW
CloseHandle
Module32FirstW
CreateToolhelp32Snapshot
Process32NextW
GetCurrentProcessId
Process32FirstW
DeleteFileW
CreateMutexW
GetTickCount
CreateEventW
WaitForSingleObject
SetEvent
CreateThread
DeviceIoControl
CreateFileW
GetModuleHandleW
lstrcmpiW
SizeofResource
LoadResource
FindResourceW
LoadLibraryExW
GetFileSizeEx
GetCommandLineW
lstrcmpW
GetLastError
InitializeCriticalSection
SetLastError
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
FlushFileBuffers
SetStdHandle
SetFilePointer
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
LCMapStringA
MultiByteToWideChar
GetStartupInfoA
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetModuleHandleA
LCMapStringW
GetConsoleMode
GetConsoleCP
InitializeCriticalSectionAndSpinCount
GetModuleFileNameA
GetStdHandle
HeapCreate
HeapSize
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
HeapReAlloc
GetStartupInfoW
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
ExitProcess
Sleep
RtlUnwind
TlsFree
DeleteAtom
FindAtomW
TlsAlloc
ReleaseMutex
AddAtomW
OpenThread
GetAtomNameW
TlsSetValue
TlsGetValue
GetSystemTime
LocalFree
FormatMessageW
ReadFile
WriteFile
SetFilePointerEx
LocalFileTimeToFileTime
GetSystemTimeAsFileTime
SystemTimeToFileTime
WideCharToMultiByte
RemoveDirectoryW
FreeLibrary
GetProcAddress
LoadLibraryW
SetCurrentDirectoryW
GlobalAlloc
GlobalLock
GlobalUnlock
GetModuleFileNameW
GetCurrentProcess
MulDiv
FlushInstructionCache
DeleteCriticalSection
GetCurrentThreadId
OutputDebugStringW
DebugBreak
lstrlenA
InterlockedIncrement
lstrlenW
InterlockedDecrement
LeaveCriticalSection
EnterCriticalSection
CreateFileA
VirtualAlloc
VirtualFree
IsProcessorFeaturePresent
QueryPerformanceCounter
LoadLibraryA
HeapAlloc
GetProcessHeap
HeapFree
InterlockedCompareExchange
RaiseException
user32
IsWindowVisible
SetTimer
KillTimer
SetFocus
GetParent
SetWindowPos
MoveWindow
SetWindowLongW
LoadStringW
GetFocus
SetActiveWindow
GetActiveWindow
EnumChildWindows
CharNextW
ShowWindow
DispatchMessageW
TranslateMessage
GetMessageW
PeekMessageW
DefWindowProcW
DestroyWindow
UnregisterClassA
PostMessageW
GetSysColor
CreateDialogParamW
GetClientRect
ClientToScreen
ScreenToClient
SendMessageW
GetWindowLongW
wvsprintfW
IsWindow
GetSystemMetrics
LoadImageW
DisableProcessWindowsGhosting
PostQuitMessage
SystemParametersInfoW
IsRectEmpty
PtInRect
FindWindowExW
MonitorFromWindow
GetMonitorInfoW
MapWindowPoints
UpdateWindow
GetWindowRect
IsIconic
BringWindowToTop
SetForegroundWindow
CharLowerW
FindWindowW
RegisterWindowMessageW
GetWindowTextLengthW
GetWindowTextW
SetWindowTextW
MessageBoxW
CreateAcceleratorTableW
CreateWindowExW
RegisterClassExW
LoadCursorW
GetClassInfoExW
GetWindow
DestroyAcceleratorTable
GetDesktopWindow
BeginPaint
EndPaint
CallWindowProcW
FillRect
ReleaseCapture
GetClassNameW
GetDlgItem
IsChild
SetCapture
RedrawWindow
InvalidateRgn
InvalidateRect
ReleaseDC
GetDC
gdi32
GetStockObject
GetObjectW
CreateSolidBrush
GetDeviceCaps
BitBlt
CreateCompatibleDC
CreateCompatibleBitmap
SelectObject
DeleteObject
DeleteDC
advapi32
RegCreateKeyExW
OpenProcessToken
GetTokenInformation
RegEnumKeyExW
RegQueryInfoKeyW
RegSetValueExW
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
RegDeleteValueW
RegDeleteKeyW
RegQueryValueExA
shell32
SHGetSpecialFolderPathW
ShellExecuteW
SHCreateDirectoryExW
ShellExecuteExW
ole32
CoCreateInstance
CLSIDFromString
CLSIDFromProgID
CoGetClassObject
OleLockRunning
CoTaskMemAlloc
StringFromGUID2
CreateStreamOnHGlobal
OleInitialize
OleUninitialize
CoUninitialize
CoInitialize
CoTaskMemRealloc
CoTaskMemFree
oleaut32
VarUI4FromStr
SafeArrayGetLBound
SafeArrayGetUBound
SafeArrayCreate
SafeArrayAccessData
SysFreeString
SysAllocString
VariantClear
SysAllocStringByteLen
SysStringByteLen
SysStringLen
SysAllocStringLen
VariantInit
OleCreateFontIndirect
LoadRegTypeLi
LoadTypeLi
DispCallFunc
VariantChangeType
SafeArrayUnaccessData
shlwapi
PathRemoveFileSpecW
PathCombineW
PathIsDirectoryW
PathIsRelativeW
PathFindFileNameW
PathRemoveExtensionW
StrStrIW
SHGetValueW
PathFileExistsW
PathAppendW
comctl32
InitCommonControlsEx
setupapi
SetupIterateCabinetW
gdiplus
GdiplusStartup
GdiplusShutdown
Sections
.text Size: 188KB - Virtual size: 187KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 44KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 38KB - Virtual size: 50KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 97KB - Virtual size: 100KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE