Static task
static1
Behavioral task
behavioral1
Sample
0a80c93b6c6cdb527584c3c226d5951553d47976f106fce3a4e0a0c92cd959eb.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0a80c93b6c6cdb527584c3c226d5951553d47976f106fce3a4e0a0c92cd959eb.exe
Resource
win10v2004-20220812-en
General
-
Target
0a80c93b6c6cdb527584c3c226d5951553d47976f106fce3a4e0a0c92cd959eb
-
Size
711KB
-
MD5
597405605c40b385694649c34b4c0130
-
SHA1
29d9eb920add5a1facecdbd7e3059a37cce818cf
-
SHA256
0a80c93b6c6cdb527584c3c226d5951553d47976f106fce3a4e0a0c92cd959eb
-
SHA512
440d6edd37def8ee7d5d406a92cbcb9b815b78c20d86c2bfb9aaa50187fe0dbf51afd7a9667f23234119917aae29cf7f5bec9f89215c4582cc903f53b1a8943c
-
SSDEEP
12288:ZMYO6QJr1PJ8HaXlgz7c8JnB9JDuxb4j5U2X4cDhLHZ9pGHNu4B2UlpymP4V:O2eWc8Jd8b4y2ocLUI4rlco
Malware Config
Signatures
Files
-
0a80c93b6c6cdb527584c3c226d5951553d47976f106fce3a4e0a0c92cd959eb.exe windows x86
e6bdb9257448528da2f1f57bd2360b7f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
InterlockedIncrement
LocalAlloc
TlsGetValue
GlobalReAlloc
GlobalHandle
TlsAlloc
TlsSetValue
LocalReAlloc
TlsFree
GlobalFlags
SetFilePointer
FlushFileBuffers
LockFile
UnlockFile
SetEndOfFile
GetFileSize
DuplicateHandle
FileTimeToLocalFileTime
GetFileTime
GetStartupInfoW
UnhandledExceptionFilter
HeapFree
HeapAlloc
GetSystemTimeAsFileTime
HeapReAlloc
RtlUnwind
RaiseException
Sleep
HeapSize
VirtualProtect
VirtualAlloc
GetSystemInfo
lstrlenA
FileTimeToSystemTime
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
HeapCreate
VirtualFree
QueryPerformanceCounter
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetTimeZoneInformation
GetTimeFormatA
GetDateFormatA
InitializeCriticalSectionAndSpinCount
GetConsoleCP
GetConsoleMode
GetLocaleInfoA
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CreateFileA
SetEnvironmentVariableA
InterlockedCompareExchange
GetProcessHeap
GetStdHandle
GetThreadLocale
GetModuleHandleA
InterlockedDecrement
GlobalFindAtomW
CompareStringW
LoadLibraryA
GetVersionExA
GlobalAddAtomW
FreeResource
GlobalDeleteAtom
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesW
lstrcmpA
GetLocaleInfoW
LoadLibraryExW
CompareStringA
InterlockedExchange
lstrcmpW
SetLastError
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageW
LocalFree
lstrlenW
MulDiv
MultiByteToWideChar
WideCharToMultiByte
IsDebuggerPresent
CreateDirectoryW
SetUnhandledExceptionFilter
CreateProcessA
GetFileSizeEx
ReadFile
CopyFileW
WriteFile
GetModuleFileNameW
FreeLibrary
GetModuleHandleW
DefineDosDeviceW
GetLogicalDrives
GetLocalTime
ExpandEnvironmentStringsW
GetTickCount
FindNextFileW
GetLastError
DeleteFileW
GetCurrentProcess
CreateMutexW
OpenMutexW
SetCurrentDirectoryW
GetCurrentDirectoryW
SetErrorMode
TerminateProcess
GetCurrentProcessId
ExitProcess
GetVolumeInformationW
DeviceIoControl
RemoveDirectoryW
CreateFileW
GetFileAttributesW
GetFullPathNameW
SetFileAttributesW
FindResourceW
LoadResource
LockResource
SizeofResource
GetPrivateProfileIntW
GetVersionExW
GetPrivateProfileStringW
GetExitCodeProcess
CreateProcessW
WinExec
FindClose
FindFirstFileW
GetWindowsDirectoryW
GetProcAddress
LoadLibraryW
WritePrivateProfileStringW
GetCurrentThreadId
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
CloseHandle
TerminateThread
WaitForSingleObject
VirtualQuery
CreateThread
user32
DestroyMenu
MessageBeep
GetNextDlgGroupItem
ReleaseCapture
SetCapture
InvalidateRgn
InvalidateRect
SetRect
IsRectEmpty
CopyAcceleratorTableW
CharNextW
LoadCursorW
GetSysColorBrush
EndPaint
BeginPaint
GetWindowDC
ClientToScreen
GrayStringW
DrawTextExW
DrawTextW
TabbedTextOutW
ShowWindow
MoveWindow
SetWindowTextW
IsDialogMessageW
RegisterWindowMessageW
SendDlgItemMessageW
SendDlgItemMessageA
WinHelpW
IsChild
GetCapture
GetClassLongW
GetClassNameW
SetPropW
GetPropW
SetFocus
GetWindowTextW
GetForegroundWindow
CharUpperW
RegisterClipboardFormatW
GetMessageTime
GetMessagePos
MapWindowPoints
SetMenu
SetForegroundWindow
UpdateWindow
CreateWindowExW
GetClassInfoExW
GetClassInfoW
RegisterClassW
GetSysColor
AdjustWindowRectEx
EqualRect
SetWindowPlacement
GetDlgCtrlID
DefWindowProcW
CallWindowProcW
PtInRect
GetMenu
SetWindowLongW
OffsetRect
IntersectRect
EnableWindow
LoadIconW
SendMessageW
PostMessageW
SystemParametersInfoA
GetWindowPlacement
GetWindowThreadProcessId
GetLastActivePopup
MessageBoxW
SetCursor
SetWindowsHookExW
CallNextHookEx
GetMessageW
TranslateMessage
DispatchMessageW
IsWindowVisible
PeekMessageW
GetCursorPos
ValidateRect
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
PostThreadMessageW
GetTopWindow
IsIconic
GetSystemMetrics
UnhookWindowsHookEx
UnregisterClassW
GetClientRect
DrawIcon
EnumDisplaySettingsW
ChangeDisplaySettingsExW
GetKeyState
GetSubMenu
GetMenuItemCount
GetMenuItemID
GetMenuState
PostQuitMessage
SetWindowPos
MapDialogRect
GetParent
SetWindowContextHelpId
GetWindow
EndDialog
GetNextDlgTabItem
IsWindowEnabled
GetDlgItem
GetWindowLongW
IsWindow
DestroyWindow
CreateDialogIndirectParamW
SetActiveWindow
GetActiveWindow
GetDesktopWindow
GetWindowRect
CopyRect
LoadBitmapW
GetFocus
ModifyMenuW
EnableMenuItem
CheckMenuItem
ReleaseDC
GetDC
RemovePropW
gdi32
GetStockObject
GetBkColor
GetTextColor
GetMapMode
DeleteDC
ExtSelectClipRgn
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
Escape
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
GetRgnBox
GetDeviceCaps
ExtTextOutW
TextOutW
RectVisible
PtVisible
GetWindowExtEx
GetViewportExtEx
DeleteObject
SetMapMode
RestoreDC
SaveDC
GetObjectW
SetBkColor
SetTextColor
GetClipBox
CreateBitmap
CreateRectRgnIndirect
SelectObject
comdlg32
GetFileTitleW
winspool.drv
ClosePrinter
DocumentPropertiesW
OpenPrinterW
advapi32
RegQueryValueW
RegEnumKeyW
AdjustTokenPrivileges
RegOpenKeyExW
RegCreateKeyExW
LookupPrivilegeValueW
OpenProcessToken
RegQueryValueExW
RegDeleteKeyW
RegOpenKeyW
RegCloseKey
RegSetValueExW
shell32
SHChangeNotify
ShellExecuteW
SHCreateDirectoryExW
SHGetFolderPathW
comctl32
InitCommonControlsEx
shlwapi
PathFileExistsW
PathFindFileNameW
PathFindExtensionW
PathStripToRootW
PathIsUNCW
oledlg
OleUIBusyW
ole32
CoFreeUnusedLibraries
OleUninitialize
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoGetClassObject
CLSIDFromString
CLSIDFromProgID
CoTaskMemFree
OleInitialize
CoInitializeEx
OleRun
CoCreateInstance
CoRevokeClassObject
OleIsCurrentClipboard
OleFlushClipboard
CoRegisterMessageFilter
CoTaskMemAlloc
oleaut32
VariantInit
VariantCopy
VariantClear
VariantChangeType
SysStringLen
SysFreeString
SysAllocStringLen
SafeArrayDestroy
VariantTimeToSystemTime
SystemTimeToVariantTime
OleCreateFontIndirect
SysAllocString
GetErrorInfo
iphlpapi
GetAdaptersInfo
Sections
.text Size: 408KB - Virtual size: 407KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 82KB - Virtual size: 82KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 13KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 79KB - Virtual size: 79KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 41KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
�BW Size: 86KB - Virtual size: 88KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE