Static task
static1
Behavioral task
behavioral1
Sample
81c8b4a326b3b873bc2160899666f121b7fe737860567509fda64605ff6553ec.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
81c8b4a326b3b873bc2160899666f121b7fe737860567509fda64605ff6553ec.exe
Resource
win10v2004-20220812-en
General
-
Target
81c8b4a326b3b873bc2160899666f121b7fe737860567509fda64605ff6553ec
-
Size
605KB
-
MD5
69727ff0363ecc1b464ba80d37627b91
-
SHA1
2f64af2873fa5a5d4043660a7c96988919ce11a9
-
SHA256
81c8b4a326b3b873bc2160899666f121b7fe737860567509fda64605ff6553ec
-
SHA512
15d00296019a95d0636f0f5ebbad8964900ddb47ed097922b2145a5b441dccae99c07173bb9c0bf39c09ed19590c39d5ff14e886dd0d86ebbadf7133a1822ec5
-
SSDEEP
12288:k3fgUGIqbuWg95sfRoykMBr6s1QG9iRpSsPE:kDQuWg95KCDMl6sV9gpSoE
Malware Config
Signatures
Files
-
81c8b4a326b3b873bc2160899666f121b7fe737860567509fda64605ff6553ec.exe windows x86
27b5ee809aa181f18726d6efd638a996
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetVolumeInformationA
GetFullPathNameA
GetCPInfo
GetOEMCP
GetFileSizeEx
GetFileTime
SetErrorMode
GetTickCount
HeapFree
UnhandledExceptionFilter
IsDebuggerPresent
GetCommandLineA
GetStartupInfoA
HeapAlloc
RtlUnwind
RaiseException
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
HeapReAlloc
ExitProcess
SetStdHandle
GetFileType
HeapSize
IsValidCodePage
LCMapStringA
LCMapStringW
DuplicateHandle
GetStdHandle
GetConsoleCP
GetConsoleMode
HeapCreate
VirtualFree
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetSystemTimeAsFileTime
InitializeCriticalSectionAndSpinCount
GetTimeZoneInformation
GetDriveTypeA
GetStringTypeA
GetStringTypeW
GetTimeFormatA
GetDateFormatA
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetLocaleInfoW
GetProcessHeap
CompareStringW
SetEnvironmentVariableA
InterlockedCompareExchange
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
GlobalFlags
GetCurrentDirectoryA
GetThreadLocale
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
InterlockedIncrement
GetModuleHandleW
FindFirstFileA
FileTimeToLocalFileTime
FileTimeToSystemTime
FindNextFileA
FindClose
GlobalGetAtomNameA
GlobalFindAtomA
lstrcmpW
GetVersionExA
InterlockedDecrement
GetModuleFileNameW
GlobalAddAtomA
FreeResource
GlobalDeleteAtom
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
CompareStringA
InterlockedExchange
FreeLibrary
GetModuleHandleA
SetLastError
MulDiv
WritePrivateProfileStringA
SetFileAttributesA
RemoveDirectoryA
CopyFileA
CreateDirectoryA
DeleteFileA
WinExec
GetSystemDirectoryA
lstrcmpA
TerminateProcess
OpenProcess
Process32Next
Process32First
CreateToolhelp32Snapshot
GetPrivateProfileIntA
Sleep
LocalAlloc
lstrlenA
LocalFree
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
CreateFileA
GetProcAddress
LoadLibraryA
SetUnhandledExceptionFilter
FormatMessageA
GetLastError
MultiByteToWideChar
GetACP
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
lstrcpyA
CloseHandle
CreateProcessA
WaitForSingleObject
GetFileAttributesA
OutputDebugStringA
GetPrivateProfileStringA
FindResourceA
LoadResource
LockResource
SizeofResource
WideCharToMultiByte
SetHandleCount
GetModuleFileNameA
CreateFileW
user32
PostThreadMessageA
SetMenu
SetForegroundWindow
UpdateWindow
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
GetSysColor
AdjustWindowRectEx
EqualRect
CopyRect
DefWindowProcA
CallWindowProcA
PtInRect
GetMenu
OffsetRect
IntersectRect
SystemParametersInfoA
GetWindowPlacement
GetWindowRect
GetWindowTextA
SetFocus
ShowWindow
MoveWindow
SetWindowLongA
GetDlgCtrlID
SetWindowTextA
IsDialogMessageA
SendDlgItemMessageA
GetLastActivePopup
MessageBoxA
SetCursor
SetWindowsHookExA
CallNextHookEx
GetMessageA
TranslateMessage
DispatchMessageA
IsWindowVisible
GetKeyState
PeekMessageA
GetCursorPos
ValidateRect
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
GetFocus
ModifyMenuA
EnableMenuItem
CheckMenuItem
GetDesktopWindow
GetActiveWindow
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
IsWindow
GetWindowLongA
GetDlgItem
IsWindowEnabled
GetNextDlgTabItem
EndDialog
GetWindow
SetWindowContextHelpId
GetParent
MapDialogRect
SetWindowPos
PostQuitMessage
GetMenuState
FindWindowA
MessageBeep
GetNextDlgGroupItem
GetMenuItemID
GetMenuItemCount
GetSubMenu
EnableWindow
ChangeDisplaySettingsA
DrawIcon
GetClientRect
GetSystemMetrics
IsIconic
PostMessageA
RegisterClipboardFormatA
SendMessageA
LoadIconA
DestroyMenu
UnregisterClassA
GetWindowThreadProcessId
CharUpperA
InvalidateRgn
InvalidateRect
SetRect
IsRectEmpty
CopyAcceleratorTableA
CharNextA
ReleaseCapture
SetCapture
LoadCursorA
GetSysColorBrush
EndPaint
BeginPaint
GetWindowDC
ReleaseDC
GetDC
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
RegisterWindowMessageA
WinHelpA
IsChild
GetCapture
GetClassLongA
GetClassNameA
SetPropA
GetPropA
RemovePropA
GetForegroundWindow
MapWindowPoints
GetTopWindow
GetMessageTime
UnhookWindowsHookEx
GetMessagePos
gdi32
SetMapMode
DeleteObject
GetViewportExtEx
GetWindowExtEx
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
SelectObject
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
ExtSelectClipRgn
DeleteDC
GetStockObject
GetBkColor
GetTextColor
CreateRectRgnIndirect
GetRgnBox
GetMapMode
RestoreDC
SaveDC
GetObjectA
SetBkColor
SetTextColor
GetClipBox
CreateBitmap
GetDeviceCaps
comdlg32
GetFileTitleA
winspool.drv
DocumentPropertiesA
ClosePrinter
OpenPrinterA
advapi32
RegQueryValueA
RegOpenKeyA
RegEnumKeyA
RegDeleteKeyA
RegOpenKeyExA
RegSetValueExA
RegCreateKeyExA
RegQueryValueExA
RegCloseKey
shell32
ShellExecuteExA
SHGetSpecialFolderPathA
ShellExecuteA
comctl32
InitCommonControlsEx
shlwapi
PathRemoveBackslashA
SHGetValueA
PathFileExistsA
PathRemoveFileSpecA
PathAddBackslashA
PathFindExtensionA
PathFindFileNameA
PathStripToRootA
PathIsUNCA
SHSetValueA
oledlg
ord8
ole32
CoFreeUnusedLibraries
OleUninitialize
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoGetClassObject
CLSIDFromString
CLSIDFromProgID
CoRevokeClassObject
OleInitialize
CoTaskMemFree
CoCreateInstance
CoInitialize
OleIsCurrentClipboard
OleFlushClipboard
CoRegisterMessageFilter
CoTaskMemAlloc
oleaut32
SysStringLen
SysAllocStringByteLen
SysAllocStringLen
VariantClear
VariantChangeType
VariantInit
VariantCopy
SafeArrayDestroy
VariantTimeToSystemTime
SystemTimeToVariantTime
OleCreateFontIndirect
SysAllocString
SysFreeString
version
VerQueryValueA
GetFileVersionInfoA
GetFileVersionInfoSizeA
wininet
InternetSetCookieA
Sections
.text Size: 373KB - Virtual size: 373KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 82KB - Virtual size: 82KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 15KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 52KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 80KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ