Static task
static1
Behavioral task
behavioral1
Sample
8689f701da299f1fc3d7b766767823b25ab5594190fc2edc74de99d3afa2194c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8689f701da299f1fc3d7b766767823b25ab5594190fc2edc74de99d3afa2194c.exe
Resource
win10v2004-20220812-en
General
-
Target
8689f701da299f1fc3d7b766767823b25ab5594190fc2edc74de99d3afa2194c
-
Size
252KB
-
MD5
4f0979be8b629043de6661afa7543010
-
SHA1
04c195be568a7740251652b2b350b9f885710474
-
SHA256
8689f701da299f1fc3d7b766767823b25ab5594190fc2edc74de99d3afa2194c
-
SHA512
7af40e205a7b9499484f36d7e5e7f181a96a0bfd877068e7fe4171d744f18b574e80dd66145ae55e1772e5f2bb5dbe5363934ae289fea9044b04ddba6111088b
-
SSDEEP
6144:iDz0HH8cV68a/KHwH/ChB9QIV/KzUTOk0l1yG3kzDM54u3i4T:iIH8E68IEwqX9UkQ3k/I4Ui4T
Malware Config
Signatures
Files
-
8689f701da299f1fc3d7b766767823b25ab5594190fc2edc74de99d3afa2194c.exe windows x86
b42262dde5309dbdac9091d402499671
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
SetWindowLongA
ShowWindow
LoadStringA
DispatchMessageA
TranslateMessage
GetMessageA
PeekMessageA
CharNextA
DestroyWindow
RegisterClassExA
LoadImageA
LoadCursorA
GetClassLongW
MapDialogRect
FindWindowA
keybd_event
UnregisterClassW
GetDialogBaseUnits
GetTopWindow
DrawAnimatedRects
EnableWindow
SendDlgItemMessageA
ChildWindowFromPoint
DialogBoxIndirectParamA
CreateIconIndirect
GetGuiResources
FindWindowExA
EnumThreadWindows
SetScrollPos
SetScrollInfo
SetClassLongA
SetWindowsHookA
DefWindowProcA
GetScrollRange
ScrollWindowEx
WaitForInputIdle
GetDlgItemInt
SetDlgItemInt
FlashWindow
GetMenuStringA
GetNextDlgTabItem
GetAsyncKeyState
AdjustWindowRectEx
IsChild
BeginDeferWindowPos
DeferWindowPos
EndDeferWindowPos
SetRect
GetDesktopWindow
LockWindowUpdate
EqualRect
IsRectEmpty
SetParent
IsDlgButtonChecked
CheckDlgButton
GetDCEx
LoadBitmapA
RegisterWindowMessageA
GetMessagePos
WindowFromPoint
GetSysColorBrush
FrameRect
DrawFrameControl
GetWindowThreadProcessId
GetActiveWindow
GetMenuItemID
DrawIconEx
CharUpperBuffA
IsCharAlphaNumericA
SetWindowsHookExA
UnhookWindowsHookEx
DialogBoxParamA
EndDialog
SetDlgItemTextA
InflateRect
DestroyIcon
DrawEdge
DrawStateA
OffsetRect
GetCapture
ReleaseCapture
EndPaint
BeginPaint
GetScrollPos
DrawFocusRect
FillRect
GetDlgCtrlID
SetCapture
IsWindowEnabled
ScreenToClient
GetWindowTextLengthA
CallNextHookEx
SetRectEmpty
PtInRect
MessageBeep
GetSysColor
GetWindowDC
CheckMenuRadioItem
GetForegroundWindow
MonitorFromRect
SystemParametersInfoA
AppendMenuA
ModifyMenuA
MonitorFromPoint
CallWindowProcA
LoadStringW
PostQuitMessage
SetFocus
SetMenuDefaultItem
CopyRect
KillTimer
ClientToScreen
IsZoomed
IsIconic
SetMenu
GetMenu
TranslateAcceleratorA
LockWorkStation
ExitWindowsEx
UnregisterHotKey
RegisterHotKey
CharLowerBuffA
GetKeyState
UnregisterClassA
GetLayeredWindowAttributes
SetLayeredWindowAttributes
GetWindowPlacement
GetMenuState
GetDlgItemTextA
DragDetect
IsMenu
GetMenuItemInfoA
SetMenuItemInfoA
LoadIconA
DeleteMenu
InvalidateRect
UpdateWindow
MoveWindow
GetCursorPos
EnumChildWindows
GetSystemMetrics
CreateDialogParamA
GetWindowTextA
GetClassNameA
ReleaseDC
GetDC
DrawTextA
MonitorFromWindow
GetMonitorInfoA
GetClientRect
MapWindowPoints
IsDialogMessageA
GetParent
GetSubMenu
GetMenuItemCount
GetWindowRect
GetFocus
IntersectRect
PostMessageA
SetCursor
SetWindowPos
GetDlgItem
SetTimer
RedrawWindow
BringWindowToTop
SetWindowTextA
GetWindowLongA
InsertMenuItemA
RemoveMenu
InsertMenuA
CharLowerA
CharUpperA
CreatePopupMenu
TrackPopupMenuEx
TrackPopupMenu
DestroyMenu
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
SendMessageA
SendMessageTimeoutA
GetClassLongA
GetWindow
GetShellWindow
wvsprintfA
IsWindow
MessageBoxA
wsprintfA
EnumWindows
IsWindowVisible
ShowWindowAsync
SetForegroundWindow
LoadMenuA
LoadAcceleratorsA
CreateWindowExA
GetClassInfoExA
comdlg32
CommDlgExtendedError
ChooseColorA
ChooseFontA
ole32
OleUninitialize
CLSIDFromProgID
OleInitialize
CoLockObjectExternal
CoGetClassObject
OleSetContainedObject
ProgIDFromCLSID
CoCreateInstance
RevokeDragDrop
CoGetInterfaceAndReleaseStream
CoTaskMemFree
RegisterDragDrop
ReleaseStgMedium
advapi32
RegQueryInfoKeyW
CreateRestrictedToken
DuplicateTokenEx
DuplicateToken
EqualSid
LookupPrivilegeValueW
CopySid
CreateWellKnownSid
CreateProcessAsUserW
OpenProcessToken
RegCreateKeyExW
RegOpenKeyExW
RegEnumKeyExW
RegCloseKey
RegQueryValueExW
RegDisablePredefinedCache
RevertToSelf
SetTokenInformation
GetUserNameW
SetThreadToken
gdi32
CreateDIBPatternBrush
CreateDIBSection
CheckColorsInGamut
CreateBitmapIndirect
CreateDCA
ChoosePixelFormat
AbortPath
comctl32
FlatSB_GetScrollPos
FlatSB_SetScrollInfo
FlatSB_SetScrollPos
FlatSB_SetScrollProp
InitializeFlatSB
FlatSB_GetScrollInfo
ImageList_SetIconSize
ord17
ImageList_Create
ImageList_Destroy
ImageList_GetImageCount
ImageList_SetImageCount
ImageList_Add
ImageList_ReplaceIcon
ImageList_SetBkColor
ImageList_GetBkColor
ImageList_SetOverlayImage
ImageList_Draw
ImageList_Replace
ImageList_DrawEx
ImageList_Remove
ImageList_GetIconSize
ImageList_Write
ImageList_Read
ImageList_GetDragImage
ImageList_GetIcon
ImageList_LoadImageW
ImageList_BeginDrag
ImageList_EndDrag
ImageList_DragEnter
ImageList_DragLeave
ImageList_DragMove
ImageList_DragShowNolock
shlwapi
PathRemoveFileSpecW
kernel32
GetDriveTypeA
GetLogicalDriveStringsA
SetFileAttributesA
WritePrivateProfileStringA
GetPrivateProfileStringA
RemoveDirectoryA
GetLocalTime
GetCurrentThreadId
UnmapViewOfFile
MapViewOfFile
OpenFileMappingA
CreateMutexA
SetErrorMode
FindCloseChangeNotification
FindNextChangeNotification
WaitForMultipleObjects
FindFirstChangeNotificationA
GetEnvironmentVariableA
GetShortPathNameA
CompareFileTime
GetFileTime
ReleaseMutex
GetTimeZoneInformation
LocalAlloc
LocalReAlloc
LocalFree
CopyFileA
MoveFileA
SetLastError
GetTempPathA
EnterCriticalSection
SetStdHandle
GetSystemTimeAsFileTime
CreateThread
TlsGetValue
TlsSetValue
ExitThread
RtlUnwind
HeapFree
HeapAlloc
TerminateProcess
GetModuleHandleA
ExitProcess
GetSystemDefaultLangID
CreateEventA
WaitForSingleObject
LoadLibraryA
GetProcAddress
FreeLibrary
GetCurrentThread
SetThreadPriority
SetEvent
Sleep
WideCharToMultiByte
CloseHandle
GetLocaleInfoA
GetTickCount
FindResourceA
LoadResource
LockResource
LeaveCriticalSection
HeapReAlloc
FileTimeToSystemTime
FileTimeToLocalFileTime
SetConsoleCtrlHandler
GetACP
GetOEMCP
GetCPInfo
RaiseException
GetTimeFormatA
GetDateFormatA
GetStartupInfoA
GetCommandLineA
TlsFree
TlsAlloc
DeleteCriticalSection
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
UnhandledExceptionFilter
LCMapStringA
LCMapStringW
SetHandleCount
GetStdHandle
InitializeCriticalSection
GetFullPathNameA
GetCurrentDirectoryA
SetCurrentDirectoryA
GetStringTypeA
GetStringTypeW
HeapSize
SetUnhandledExceptionFilter
SetEnvironmentVariableA
SetEnvironmentVariableW
VirtualProtect
GetSystemInfo
VirtualQuery
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCurrentProcessId
CompareStringA
CompareStringW
IsBadReadPtr
IsBadCodePtr
GetFileInformationByHandle
GetVolumeInformationA
PeekNamedPipe
DeleteFileA
CreateDirectoryA
FlushFileBuffers
ReadFile
SetFilePointer
GetLastError
MulDiv
GlobalSize
WriteFile
FindFirstFileA
FindNextFileA
FindClose
WinExec
GetFileAttributesA
GetFileType
QueryDosDeviceA
GetCurrentProcess
GetDiskFreeSpaceA
LoadLibraryExA
EnumResourceTypesA
EnumResourceNamesA
CreateFileA
QueryPerformanceFrequency
QueryPerformanceCounter
GetVersionExA
lstrcpyW
lstrlenW
lstrcatW
GlobalAlloc
GlobalFree
GlobalLock
GlobalUnlock
GetModuleFileNameA
SetEndOfFile
GetWindowsDirectoryA
GetSystemDefaultLCID
FindFirstFileExW
EnumSystemCodePagesA
GetDiskFreeSpaceExW
GlobalUnfix
MoveFileWithProgressW
CancelWaitableTimer
HeapSetInformation
GetStartupInfoW
IsDebuggerPresent
DecodePointer
EncodePointer
GetModuleHandleW
GetModuleFileNameW
InitializeCriticalSectionAndSpinCount
InterlockedIncrement
InterlockedDecrement
IsValidCodePage
LoadLibraryW
GetConsoleCP
GetConsoleMode
IsProcessorFeaturePresent
WriteConsoleW
CreateFileW
MultiByteToWideChar
Sections
.text Size: 50KB - Virtual size: 49KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 19KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.code Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 170KB - Virtual size: 169KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ