Static task
static1
Behavioral task
behavioral1
Sample
33138b8feb2ab5888b04ebcf82abe90c5f6dabd2f4434826c8c638e997bcfd44.exe
Resource
win7-20220901-en
General
-
Target
33138b8feb2ab5888b04ebcf82abe90c5f6dabd2f4434826c8c638e997bcfd44
-
Size
184KB
-
MD5
68985fd10a010979b34e42155ea63a81
-
SHA1
08621e2eae2129e69b7222c10426ae47535e7cfc
-
SHA256
33138b8feb2ab5888b04ebcf82abe90c5f6dabd2f4434826c8c638e997bcfd44
-
SHA512
798a1612db34a25f87e9134258e0fdb6d96adc06b390141fa0ce4a473434288027436d375962499d8871af6412d133745e34a006d103478dc861f49c35d50141
-
SSDEEP
3072:+1qn4NVFS/YK/xuBAKdJlR2m+aJLtpbh3RgOliwhBIba0ExQ0+1f2H1mXumbjHb:9ITS/zZ1KImJbtRgO3DTlH8+mbLb
Malware Config
Signatures
Files
-
33138b8feb2ab5888b04ebcf82abe90c5f6dabd2f4434826c8c638e997bcfd44.exe windows x86
5523dda9a438aa3992e03f3746f19bf6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
version
VerInstallFileA
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
kernel32
GetLastError
SetLastError
lstrcmpiA
lstrlenA
CompareStringW
GetVersionExA
DeleteFileA
CompareStringA
GetWindowsDirectoryA
GetTempPathA
GetFileAttributesA
GetTempFileNameA
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalFree
GetTickCount
LockResource
LoadResource
FindResourceA
lstrcpyA
SetErrorMode
FreeLibrary
RemoveDirectoryA
LeaveCriticalSection
EnterCriticalSection
CreateThread
CreateMutexA
WaitForSingleObject
ReleaseMutex
InitializeCriticalSection
DeleteCriticalSection
SetEvent
OpenEventA
GetModuleHandleA
GetCurrentThreadId
HeapAlloc
GetSystemInfo
HeapCreate
lstrcpynA
lstrcatA
GetPrivateProfileIntA
lstrlenW
FindFirstFileA
SetFilePointer
GetProcAddress
LoadLibraryA
GetShortPathNameA
GetSystemDefaultLangID
MoveFileA
FindResourceExA
GetFileSize
HeapDestroy
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
SizeofResource
GetStartupInfoA
ExitProcess
GetCommandLineA
DebugBreak
HeapReAlloc
HeapFree
VirtualQuery
VirtualProtect
SearchPathA
ResetEvent
QueryPerformanceCounter
SystemTimeToFileTime
lstrcmpA
MultiByteToWideChar
GetCurrentThread
GetVersion
IsBadReadPtr
ReadFile
Sleep
WriteFile
CloseHandle
CreateEventA
QueryPerformanceFrequency
InterlockedDecrement
InterlockedIncrement
CreateFileA
GetModuleFileNameA
CreateDirectoryA
WideCharToMultiByte
WritePrivateProfileStringA
GetPrivateProfileStringA
FindClose
CreateProcessA
GetCurrentProcess
user32
MsgWaitForMultipleObjects
LoadStringA
CharNextA
PeekMessageA
PostThreadMessageA
CharUpperA
SetTimer
SetWindowRgn
DialogBoxIndirectParamA
SetActiveWindow
CharLowerBuffA
CreateDialogIndirectParamA
GetDlgItem
SendMessageA
SetDlgItemTextA
LoadIconA
GetWindowRect
SystemParametersInfoA
SetWindowPos
CharLowerA
GetWindowTextA
GetDesktopWindow
ScreenToClient
MoveWindow
KillTimer
DestroyWindow
GetMessageA
IsDialogMessageA
TranslateMessage
DispatchMessageA
GetDC
ReleaseDC
SetWindowTextA
ShowWindow
EndDialog
wsprintfA
gdi32
CreateFontIndirectA
LPtoDP
GetTextExtentPoint32A
DeleteObject
GetObjectA
advapi32
RegCreateKeyExA
OpenThreadToken
OpenProcessToken
GetTokenInformation
RegCloseKey
RegOpenKeyExA
RegSetValueExA
AllocateAndInitializeSid
RegQueryValueExA
RegDeleteKeyA
RegEnumKeyExA
RegOpenKeyA
RegQueryValueA
FreeSid
EqualSid
ole32
CoTaskMemFree
StringFromGUID2
GetRunningObjectTable
CoCreateInstance
CoCreateGuid
CoReleaseMarshalData
CoInitialize
CoGetInterfaceAndReleaseStream
CoUninitialize
CoRevokeClassObject
CoRegisterClassObject
StringFromCLSID
CoTaskMemAlloc
CoMarshalInterThreadInterfaceInStream
oleaut32
SysStringLen
SysFreeString
SysAllocStringLen
VariantCopy
VariantClear
LoadRegTypeLi
LoadTypeLi
RegisterTypeLi
SysAllocString
lz32
LZClose
LZCopy
LZOpenFileA
Sections
.text Size: 57KB - Virtual size: 57KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 111KB - Virtual size: 112KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE