Static task
static1
Behavioral task
behavioral1
Sample
d24b9de7a925c2d376460e139d97c60f9502b14f8202803fc92dad05366e400e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d24b9de7a925c2d376460e139d97c60f9502b14f8202803fc92dad05366e400e.exe
Resource
win10v2004-20220812-en
General
-
Target
d24b9de7a925c2d376460e139d97c60f9502b14f8202803fc92dad05366e400e
-
Size
530KB
-
MD5
6206c79aa36a7264f56e89e28ee37136
-
SHA1
d2f428feb4dae8d975fc9fbab11550236b2a8792
-
SHA256
d24b9de7a925c2d376460e139d97c60f9502b14f8202803fc92dad05366e400e
-
SHA512
913c2f78b549c2e422849c9fdd9263d749f19d097e7774dc03a277df1a6c662902db73fd05f2e27eb5df03636a64287771a9e8aca6952600025d82d471e9c231
-
SSDEEP
12288:rMAU8Yvgs98L1F4lF11gsWV0lznAPValPMTn5EmTr/SQfCN1Hz:44s98LQjCsWV0FAPYpMVfTr/SDHz
Malware Config
Signatures
Files
-
d24b9de7a925c2d376460e139d97c60f9502b14f8202803fc92dad05366e400e.exe windows x86
28d5cb284f0966c44b72cc0305ade4d2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
version
GetFileVersionInfoA
VerQueryValueA
GetFileVersionInfoSizeA
wininet
InternetOpenA
InternetConnectA
InternetGetLastResponseInfoA
HttpOpenRequestA
InternetWriteFile
InternetSetFilePointer
InternetSetStatusCallback
InternetReadFile
InternetCloseHandle
InternetGetConnectedState
InternetGetCookieA
HttpQueryInfoA
HttpSendRequestA
InternetQueryDataAvailable
shlwapi
PathIsDirectoryA
PathRemoveFileSpecA
PathRemoveExtensionA
PathFindExtensionA
PathFileExistsA
PathAppendA
SHGetValueA
PathStripToRootA
PathIsUNCA
PathFindFileNameA
advapi32
RegEnumValueA
RegQueryValueA
RegEnumKeyA
RegDeleteValueA
RegCreateKeyExA
RegDeleteKeyA
RegCloseKey
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
RegOpenKeyA
SetNamedSecurityInfoA
RegQueryValueExA
RegSetValueExA
RegOpenKeyExA
kernel32
FindResourceA
FreeResource
SetFilePointer
CloseHandle
CreateActCtxW
ReleaseActCtx
GetModuleFileNameW
InterlockedDecrement
lstrcmpW
CompareStringA
GlobalDeleteAtom
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
MulDiv
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalFree
CreateSemaphoreA
ReleaseSemaphore
CreateEventA
FlushFileBuffers
LockFile
UnlockFile
SetEndOfFile
GetFileSize
DuplicateHandle
GetFullPathNameA
SetThreadPriority
ResumeThread
SuspendThread
GetFileAttributesExA
GetFileSizeEx
GetModuleHandleW
InterlockedExchange
LoadLibraryExA
GetLocaleInfoA
GetSystemDefaultUILanguage
ConvertDefaultLocale
GetUserDefaultUILanguage
GetCurrentThread
GetPrivateProfileIntA
WritePrivateProfileStringA
GetPrivateProfileStringA
LocalAlloc
GetUserDefaultLCID
InterlockedIncrement
TlsGetValue
GlobalReAlloc
GlobalHandle
InitializeCriticalSection
TlsAlloc
TlsSetValue
LocalReAlloc
TlsFree
GlobalFlags
GetCPInfo
GetOEMCP
SetErrorMode
EncodePointer
DecodePointer
HeapFree
GetSystemTimeAsFileTime
HeapAlloc
HeapReAlloc
VirtualProtect
VirtualAlloc
GetSystemInfo
GetFileInformationByHandle
PeekNamedPipe
GetFileType
HeapSetInformation
GetStartupInfoW
RtlUnwind
RaiseException
ExitThread
CreateThread
HeapQueryInformation
HeapSize
SetStdHandle
UnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
IsValidCodePage
LCMapStringW
HeapCreate
GetStringTypeW
CompareStringW
GetConsoleCP
GetConsoleMode
GetStdHandle
GetLocaleInfoW
SetHandleCount
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
WriteConsoleW
EnumSystemLocalesA
IsValidLocale
GetProcessHeap
CreateFileW
SetEnvironmentVariableA
FindClose
FindFirstFileA
GetFileAttributesA
TerminateProcess
OpenProcess
LocalFree
FormatMessageA
ReadFile
lstrlenA
lstrcmpiA
GetCommandLineA
CreateProcessA
GetVolumeInformationA
ExitProcess
CreateMutexA
Sleep
GetModuleHandleA
VirtualQuery
WriteFile
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetModuleFileNameA
SetUnhandledExceptionFilter
GetFileTime
CreateFileA
GetShortPathNameA
GetTempPathA
CopyFileA
lstrcmpA
WaitForSingleObject
DeleteFileA
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
FileTimeToLocalFileTime
FileTimeToSystemTime
GetTimeZoneInformation
GetSystemTime
LoadLibraryA
FreeLibrary
lstrcpyA
GetProcAddress
GetVersionExA
LoadLibraryW
GetSystemDirectoryW
GetACP
MultiByteToWideChar
FindResourceW
LoadResource
LockResource
SizeofResource
WideCharToMultiByte
ActivateActCtx
GetLastError
DeactivateActCtx
SetLastError
SetEvent
user32
IsDialogMessageA
ShowWindow
UnregisterClassA
DestroyMenu
RealChildWindowFromPoint
InvalidateRect
ValidateRect
CharUpperA
IsWindowEnabled
EndPaint
BeginPaint
GetWindowDC
ReleaseDC
GetDC
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
GetMenuState
LoadIconW
LoadIconA
SendDlgItemMessageA
WinHelpA
GetCapture
SetWindowsHookExA
CallNextHookEx
GetClassLongA
SetPropA
GetPropA
RemovePropA
GetFocus
IsWindow
SetFocus
GetLastActivePopup
SetActiveWindow
DispatchMessageA
GetDlgItem
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
PeekMessageA
MonitorFromWindow
GetKeyState
SetMenu
UpdateWindow
GetSubMenu
GetMenuItemID
GetMenuItemCount
MessageBoxA
CreateWindowExA
GetClassInfoExA
RegisterClassA
AdjustWindowRectEx
GetWindowRect
ScreenToClient
PtInRect
GetDlgCtrlID
CallWindowProcA
GetWindowLongA
SetWindowLongA
SetWindowPos
UnhookWindowsHookEx
SetForegroundWindow
IsWindowVisible
FindWindowExA
PostMessageA
GetWindowThreadProcessId
SetWindowTextA
GetForegroundWindow
EnableWindow
SetTimer
KillTimer
GetWindowTextA
GetCursorPos
SetCursor
EnumChildWindows
SendMessageTimeoutA
RegisterWindowMessageA
LoadCursorA
SendMessageA
MapWindowPoints
GetParent
GetSysColorBrush
GetSysColor
SystemParametersInfoA
EnumDisplayMonitors
SetRectEmpty
CopyRect
GetMonitorInfoA
GetSystemMetrics
GetClientRect
GetClassNameA
GetWindow
DefWindowProcA
GetClassInfoA
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapW
ModifyMenuA
EnableMenuItem
CheckMenuItem
GetDesktopWindow
CreateDialogIndirectParamA
GetNextDlgTabItem
EndDialog
PostQuitMessage
GetMessageA
TranslateMessage
GetActiveWindow
GetMenu
gdi32
SaveDC
RestoreDC
SetBkColor
SetTextColor
CreateDIBitmap
GetTextMetricsA
CreatePatternBrush
CreatePen
CreateSolidBrush
GetObjectA
GetStockObject
CreateFontIndirectA
EnumFontFamiliesA
GetTextCharsetInfo
DeleteObject
GetDeviceCaps
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
SelectObject
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
DeleteDC
CreateBitmap
GetClipBox
SetMapMode
comdlg32
GetFileTitleA
winspool.drv
DocumentPropertiesA
OpenPrinterA
ClosePrinter
shell32
SHGetSpecialFolderPathA
ole32
CoInitialize
StringFromIID
CoGetMalloc
CoUninitialize
CoTaskMemFree
CoCreateGuid
CoDisconnectObject
oleaut32
SysStringLen
SysFreeString
SysAllocStringLen
SysAllocString
VariantClear
VariantInit
VariantChangeType
VariantCopy
LoadTypeLi
SysAllocStringByteLen
oleacc
LresultFromObject
CreateStdAccessibleObject
Sections
.text Size: 349KB - Virtual size: 348KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 108KB - Virtual size: 107KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 133KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 45KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ