Static task
static1
Behavioral task
behavioral1
Sample
24f7991f713dbde43018eb8fdd0f74ce4fb645cbd12cec722a29f3f3fcc38e2a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
24f7991f713dbde43018eb8fdd0f74ce4fb645cbd12cec722a29f3f3fcc38e2a.exe
Resource
win10v2004-20220901-en
General
-
Target
24f7991f713dbde43018eb8fdd0f74ce4fb645cbd12cec722a29f3f3fcc38e2a
-
Size
997KB
-
MD5
684fe88227458df14054f06f7fe00040
-
SHA1
3c4e277e38ab3ac8c041f39702586ff3ca68a8f8
-
SHA256
24f7991f713dbde43018eb8fdd0f74ce4fb645cbd12cec722a29f3f3fcc38e2a
-
SHA512
80893ce7b2d00ce31105e08680eb5a0371b8c33e22c36695419c5d995b2100d8e79c0c1b83e3dcd29f7e47f8cd2a153d7e81283a56453fb1031002155700a58d
-
SSDEEP
12288:+yeLP4DGDACqgh1/B/CoRW7aOjGUeuOB01CbpceLF0g6yHAnS50GBQHTwIZSsPK:7ybq+FCoRAaAyMSceLFUnSGGBJoSoK
Malware Config
Signatures
Files
-
24f7991f713dbde43018eb8fdd0f74ce4fb645cbd12cec722a29f3f3fcc38e2a.exe windows x86
21e7ca335e42dff8d656d78e17055324
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
storm
ord140
ord106
ord119
ord109
ord130
ord115
ord137
ord139
ord117
ord120
ord123
ord102
ord122
ord121
ord128
ord138
ord101
ord116
ord256
ord462
ord134
ord440
ord436
ord443
ord438
ord432
ord354
ord437
ord468
ord351
ord523
ord524
ord529
ord525
ord452
ord334
ord331
ord332
ord261
ord257
ord264
ord275
ord255
ord258
ord423
ord252
ord266
ord272
ord502
ord118
ord133
ord103
ord451
ord424
ord421
ord321
ord105
ord112
ord107
ord457
ord454
ord458
ord313
ord386
ord389
ord393
ord390
ord385
ord383
ord314
ord216
ord422
ord425
ord206
ord211
ord431
ord221
ord434
ord445
ord125
ord113
ord222
ord357
ord346
ord506
ord208
ord114
ord505
ord323
ord325
ord269
ord265
ord253
ord267
ord268
ord463
ord276
ord274
ord342
ord442
ord465
ord503
ord350
ord356
ord453
ord501
ord260
ord426
ord127
ord401
ord403
shell32
FindExecutableA
ShellExecuteA
SHGetSpecialFolderLocation
SHGetPathFromIDListA
kernel32
WriteFile
VirtualFree
HeapCreate
HeapDestroy
GetFileType
GetStdHandle
SetHandleCount
GetOEMCP
GetACP
GetCPInfo
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
HeapFree
HeapSize
HeapAlloc
HeapReAlloc
GetCurrentProcess
GetLocaleInfoA
SetLastError
TlsAlloc
LCMapStringW
LCMapStringA
WideCharToMultiByte
MultiByteToWideChar
ExitProcess
GetVersion
GetStartupInfoA
RtlUnwind
SetConsoleCtrlHandler
ExitThread
TlsSetValue
CreateThread
InterlockedIncrement
InterlockedDecrement
GetLocalTime
GetSystemTime
GetTimeZoneInformation
GetFileSize
RaiseException
GetStringTypeA
GetStringTypeW
VirtualAlloc
SetStdHandle
FlushFileBuffers
CreateFileA
SetFilePointer
SetEndOfFile
ReadFile
GetLocaleInfoW
CompareStringA
CompareStringW
SetEnvironmentVariableA
SetFileAttributesA
FreeLibrary
TlsGetValue
TerminateProcess
GetCurrentThreadId
LoadLibraryA
GetProcAddress
GetDateFormatA
GetTimeFormatA
SetEvent
EnterCriticalSection
LeaveCriticalSection
GetModuleFileNameA
FindClose
FindNextFileA
FindFirstFileA
DeleteFileA
GetTickCount
Sleep
IsBadReadPtr
GetModuleHandleA
VirtualQuery
lstrcpynA
IsBadWritePtr
FormatMessageA
SetUnhandledExceptionFilter
GetLastError
CloseHandle
WaitForMultipleObjects
MulDiv
DeleteCriticalSection
GlobalMemoryStatus
FileTimeToSystemTime
FileTimeToLocalFileTime
CreateProcessA
GetFileAttributesA
WaitForSingleObject
CreateEventA
GetCommandLineA
GetDriveTypeA
GetLogicalDriveStringsA
SizeofResource
GetDiskFreeSpaceA
GetSystemInfo
LockResource
LoadResource
FindResourceA
CompareFileTime
CreateDirectoryA
InitializeCriticalSection
user32
PeekMessageA
InvalidateRect
ClipCursor
LoadStringA
PtInRect
DestroyAcceleratorTable
ReleaseCapture
SetCapture
PostMessageA
GetKeyState
SetFocus
FindWindowA
ShowCursor
SetCursorPos
GetCursorPos
SetCursor
LoadCursorA
EndPaint
BeginPaint
DefWindowProcA
DispatchMessageA
TranslateMessage
LoadAcceleratorsA
GetMessageA
TranslateAcceleratorA
GetWindow
GetClassNameA
GetForegroundWindow
GetDesktopWindow
SetRect
GetActiveWindow
ReleaseDC
GetDC
SendMessageA
GetDlgItem
GetWindowLongA
OffsetRect
GetWindowRect
GetParent
SendDlgItemMessageA
ShowWindow
EnableWindow
UpdateWindow
DrawTextA
GetSysColor
GetFocus
ScreenToClient
GetClientRect
SetWindowLongA
MessageBoxA
SetWindowTextA
SetActiveWindow
SetForegroundWindow
EnumWindows
GetWindowThreadProcessId
WaitForInputIdle
KillTimer
SetTimer
DialogBoxParamA
SetDlgItemTextA
SetWindowPos
EndDialog
CreateWindowExA
GetSystemMetrics
RegisterClassA
LoadIconA
GetTopWindow
GetLastActivePopup
IsIconic
gdi32
GetPaletteEntries
DeleteDC
GetTextExtentPoint32A
SelectObject
CreateCompatibleDC
CreateFontIndirectA
GetObjectA
DeleteObject
GetTextMetricsA
ExtTextOutA
GetTextExtentExPointA
SetTextColor
SetBkColor
SetTextAlign
TextOutA
MoveToEx
CreateFontA
GetDeviceCaps
GetStockObject
version
GetFileVersionInfoA
VerQueryValueA
GetFileVersionInfoSizeA
advapi32
RegDeleteValueA
GetUserNameA
RegOpenKeyA
Sections
.text Size: 853KB - Virtual size: 853KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 84KB - Virtual size: 1.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 46KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE