Static task
static1
Behavioral task
behavioral1
Sample
d744e3c3e43a525f220220783d4519069c31ade0dcd688b2e3e1b80ae389c165.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d744e3c3e43a525f220220783d4519069c31ade0dcd688b2e3e1b80ae389c165.exe
Resource
win10v2004-20220901-en
General
-
Target
d744e3c3e43a525f220220783d4519069c31ade0dcd688b2e3e1b80ae389c165
-
Size
156KB
-
MD5
329b86085bd0058ad41bfa621ec84ab8
-
SHA1
f32a2286a4a4914ed5c5f6aa6ddc0a7205f8fab4
-
SHA256
d744e3c3e43a525f220220783d4519069c31ade0dcd688b2e3e1b80ae389c165
-
SHA512
7085c83dd2ec522095322f432b3530790bc6ea5eaa3e0afb56aed83dad6ed5c63d7719f35653586e26fb1fb85447bbea8181a52cdf002de5b9d751cb78f6d8f6
-
SSDEEP
3072:7V3Lvhd2FbXWoO6rUSEPNWrnWA8/3CIOezrHZkTTDTE8gO:B7vhd2s1TSE1Wrnx8/keznO
Malware Config
Signatures
Files
-
d744e3c3e43a525f220220783d4519069c31ade0dcd688b2e3e1b80ae389c165.exe windows x86
9c04923dbd9eff4b1dcdfbe8035461b9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mfc42u
ord6868
ord2933
ord1775
ord801
ord686
ord6139
ord384
ord541
ord798
ord1989
ord5461
ord6874
ord6278
ord3313
ord5188
ord533
ord6403
ord2089
ord640
ord2442
ord1633
ord323
ord3093
ord4219
ord5604
ord2809
ord6655
ord6219
ord1900
ord1683
ord2520
ord6051
ord1768
ord5284
ord4433
ord2046
ord4425
ord496
ord771
ord4254
ord1143
ord6218
ord5845
ord3470
ord3471
ord4709
ord4667
ord4269
ord6371
ord4480
ord2546
ord2504
ord5727
ord3917
ord1089
ord5193
ord2388
ord3341
ord5296
ord5298
ord4074
ord4692
ord5303
ord5285
ord5710
ord4616
ord4418
ord3733
ord561
ord815
ord1220
ord1203
ord6211
ord2717
ord1008
ord617
ord2613
ord5208
ord296
ord1131
ord2362
ord6919
ord1569
ord5706
ord940
ord1735
ord4272
ord922
ord6451
ord1771
ord4050
ord6024
ord5605
ord5679
ord6654
ord942
ord2606
ord489
ord1165
ord4197
ord2756
ord823
ord4253
ord768
ord4829
ord5283
ord4848
ord4371
ord4942
ord4970
ord825
ord4736
ord4899
ord5154
ord5156
ord5155
ord1899
ord3172
ord4124
ord3092
ord6279
ord2776
ord535
ord6921
ord2757
ord5618
ord2755
ord927
ord925
ord858
ord2810
ord6563
ord3087
ord355
ord2507
ord3494
ord540
ord5949
ord538
ord4155
ord861
ord800
ord542
ord802
ord2293
ord641
ord4229
ord324
ord3592
ord4419
ord4621
ord4075
ord3074
ord3820
ord3826
ord3825
ord2971
ord3076
ord2980
ord3257
ord3131
ord4459
ord3254
ord3142
ord2977
ord5273
ord2116
ord2438
ord5257
ord1720
ord5059
ord3744
ord6372
ord2047
ord2640
ord4435
ord4831
ord3793
ord5276
ord4347
ord6370
ord5157
ord2377
ord5237
ord4401
ord1767
ord4073
ord6048
ord2506
ord4704
ord4992
ord4847
ord4370
ord5261
ord2859
msvcrt
_CxxThrowException
wcscmp
_wcsicmp
wcscpy
_wmakepath
wcsncmp
wcslen
wcsncpy
_wtoi
_wtol
ceil
_ftol
malloc
free
realloc
iswdigit
_c_exit
wcscoll
_XcptFilter
_cexit
exit
_wcmdln
__wgetmainargs
_initterm
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
__CxxFrameHandler
_itow
_except_handler3
?terminate@@YAXXZ
??1type_info@@UAE@XZ
__dllonexit
_onexit
_controlfp
_purecall
wcscat
_exit
__setusermatherr
advapi32
RegOpenKeyExA
RegCloseKey
RegQueryValueExW
RegSetValueExW
RegOpenKeyExW
QueryServiceConfigW
RegDeleteValueW
CloseServiceHandle
ChangeServiceConfigW
OpenServiceW
OpenSCManagerW
EnumServicesStatusW
RegDeleteKeyW
RegCreateKeyExW
RegEnumKeyExW
RegEnumValueW
RegQueryInfoKeyW
AdjustTokenPrivileges
LookupPrivilegeValueW
OpenProcessToken
RegQueryValueExA
kernel32
LeaveCriticalSection
GetCurrentProcess
FlushInstructionCache
WideCharToMultiByte
MultiByteToWideChar
ExpandEnvironmentStringsW
CopyFileW
DeleteFileW
FindFirstFileW
FindNextFileW
FindClose
CreateThread
WaitForSingleObject
MoveFileExW
GetLastError
GetDriveTypeW
GetSystemDirectoryW
lstrlenW
GlobalMemoryStatus
GetSystemInfo
SetLastError
GlobalUnlock
GlobalLock
FreeResource
GlobalFree
GlobalHandle
LockResource
LoadResource
FindResourceW
CreateSemaphoreW
CreateDirectoryW
EnterCriticalSection
lstrcmpiW
lstrcpynW
InitializeCriticalSection
HeapDestroy
DeleteCriticalSection
lstrcatW
FreeLibrary
GetProcAddress
LoadLibraryW
GetModuleHandleW
SizeofResource
LoadLibraryExW
GetShortPathNameW
GetCommandLineW
OpenProcess
GetCurrentProcessId
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetModuleHandleA
GetStartupInfoW
HeapFree
GetProcessHeap
HeapAlloc
LoadLibraryA
VirtualFree
VirtualAlloc
GetCurrentThreadId
GlobalAlloc
lstrlenA
CloseHandle
ReadFile
GetFileSize
CreateFileW
SetEndOfFile
WriteFile
SetFilePointer
SetFileAttributesW
GetFileAttributesW
lstrcpyW
lstrcmpW
GetModuleFileNameW
gdi32
CreateSolidBrush
DeleteObject
CreateCompatibleBitmap
CreateCompatibleDC
BitBlt
DeleteDC
GetStockObject
GetObjectW
GetDeviceCaps
SelectObject
GetTextMetricsW
GetTextExtentPoint32W
user32
SetWindowPos
ExitWindowsEx
SetForegroundWindow
GetLastActivePopup
FindWindowW
IsIconic
CharNextW
LoadIconW
GetActiveWindow
DialogBoxIndirectParamW
RegisterWindowMessageW
GetWindowTextLengthW
GetWindowTextW
SetWindowTextW
CreateWindowExW
GetClassInfoExW
LoadCursorW
RegisterClassExW
CreateAcceleratorTableW
CheckDlgButton
wsprintfW
EnableWindow
SendMessageW
GetClientRect
GetFocus
MessageBoxW
IsWindowEnabled
ShowWindow
PostMessageW
SetFocus
GetParent
CallWindowProcW
SetWindowLongW
GetWindowLongW
ScreenToClient
GetMessagePos
GetProcessDefaultLayout
ReleaseDC
GetDC
GetAsyncKeyState
DefWindowProcW
GetSysColor
GetDesktopWindow
ReleaseCapture
SetCapture
InvalidateRect
InvalidateRgn
GetWindow
IsChild
EndPaint
FillRect
BeginPaint
GetDlgItem
SetDlgItemTextW
IsWindow
RedrawWindow
GetClassNameW
DestroyWindow
EndDialog
GetDlgItemTextW
IsDlgButtonChecked
oleaut32
RegisterTypeLi
SysAllocString
SysAllocStringLen
SysStringLen
VariantClear
LoadRegTypeLi
VarUI4FromStr
SysFreeString
LoadTypeLi
ole32
CoRegisterClassObject
CoTaskMemRealloc
CoInitializeEx
OleUninitialize
OleInitialize
CreateStreamOnHGlobal
CLSIDFromString
CLSIDFromProgID
OleLockRunning
CoTaskMemAlloc
StringFromCLSID
CoTaskMemFree
CoInitialize
CoCreateInstance
CoUninitialize
CoRevokeClassObject
version
VerQueryValueW
GetFileVersionInfoSizeW
GetFileVersionInfoW
shell32
SHGetSpecialFolderPathW
ShellExecuteW
SHGetMalloc
SHBrowseForFolderW
SHGetPathFromIDListW
Sections
.text Size: 122KB - Virtual size: 121KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 27KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
XOR Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE