Static task
static1
Behavioral task
behavioral1
Sample
564d017eff050d8854c5e2c7365b1ea18d932b3d7e80f65b8c08dd0db0f8f144.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
564d017eff050d8854c5e2c7365b1ea18d932b3d7e80f65b8c08dd0db0f8f144.exe
Resource
win10v2004-20220812-en
General
-
Target
564d017eff050d8854c5e2c7365b1ea18d932b3d7e80f65b8c08dd0db0f8f144
-
Size
636KB
-
MD5
09a491aeabd9f0e6abd16c578b5b9490
-
SHA1
ac55ff2c8961a11db3054b3dfdb796ebfae3a574
-
SHA256
564d017eff050d8854c5e2c7365b1ea18d932b3d7e80f65b8c08dd0db0f8f144
-
SHA512
b058a35d8bbfde751e8ab1eb4e2937a48bbf54bb2ca88d3b56339363cf7110d1469d1c925a826e49585a704488e0800255415aa72f932934ba750b9ed5b2791e
-
SSDEEP
12288:RAcJBc+RxLwt4CrTkm+2Cntx0CeDTdm/qb+XOVXciVUc0+s:RlSYSjk5txbelm/W+eVXDOp
Malware Config
Signatures
Files
-
564d017eff050d8854c5e2c7365b1ea18d932b3d7e80f65b8c08dd0db0f8f144.exe windows x86
5185d7c82d507b4332a1596b8ee5eba2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetErrorMode
FileTimeToLocalFileTime
GetFileAttributesW
GetFileTime
HeapFree
HeapAlloc
GetProcessHeap
GetStartupInfoW
RtlUnwind
RaiseException
TerminateProcess
UnhandledExceptionFilter
IsDebuggerPresent
GetSystemTimeAsFileTime
ExitProcess
HeapReAlloc
HeapSize
VirtualAlloc
GetSystemInfo
VirtualQuery
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetCommandLineW
SetHandleCount
GetStartupInfoA
HeapDestroy
HeapCreate
VirtualFree
QueryPerformanceCounter
Sleep
GetCPInfo
GetACP
GetOEMCP
LCMapStringA
LCMapStringW
GetTimeZoneInformation
GetConsoleCP
GetConsoleMode
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
GetStringTypeA
GetStringTypeW
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CreateFileA
SetEnvironmentVariableA
FileTimeToSystemTime
GetFullPathNameW
GetVolumeInformationW
FindFirstFileW
FindClose
DuplicateHandle
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
GetThreadLocale
MoveFileW
lstrlenA
InterlockedIncrement
GetModuleHandleA
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
MulDiv
GlobalFlags
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesW
lstrcmpA
GetLocaleInfoW
CompareStringA
InterlockedExchange
InterlockedDecrement
FreeResource
GlobalFindAtomW
GlobalDeleteAtom
CompareStringW
LoadLibraryA
lstrcmpW
GetVersionExA
GetVersion
lstrlenW
GetModuleHandleW
GlobalGetAtomNameW
GlobalAddAtomW
SetLastError
FindResourceW
LoadResource
LockResource
SizeofResource
ReleaseMutex
CreateMutexW
GlobalLock
GlobalUnlock
SetFileAttributesW
GetFileSize
ReadFile
FormatMessageW
LocalFree
GetTempPathW
DeleteFileW
CopyFileW
MoveFileExW
OpenProcess
GlobalAlloc
GlobalFree
GetLastError
WaitForSingleObject
GetExitCodeProcess
CreateProcessW
GetWindowsDirectoryW
GetTickCount
WideCharToMultiByte
MultiByteToWideChar
WritePrivateProfileStringW
GetVersionExW
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
CreateDirectoryW
GetPrivateProfileStringW
SetUnhandledExceptionFilter
VirtualProtect
WriteProcessMemory
LoadLibraryW
GetProcAddress
GetModuleFileNameW
CreateFileW
GetCurrentThreadId
GetCurrentProcessId
GetCurrentProcess
CloseHandle
GetFileType
FreeLibrary
user32
CopyAcceleratorTableW
SetRect
InvalidateRgn
GetNextDlgGroupItem
GetNextDlgTabItem
MessageBeep
PostThreadMessageW
EndDialog
CreateDialogIndirectParamW
GetMenuItemInfoW
InflateRect
EndPaint
BeginPaint
GetWindowDC
ReleaseDC
GetDC
GrayStringW
DrawTextExW
DrawTextW
TabbedTextOutW
FillRect
ClientToScreen
RegisterClipboardFormatW
SetWindowContextHelpId
MapDialogRect
ShowOwnedPopups
GetMessageW
TranslateMessage
GetCursorPos
ValidateRect
PostQuitMessage
MoveWindow
SetWindowTextW
IsDialogMessageW
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapW
ModifyMenuW
GetMenuState
EnableMenuItem
CheckMenuItem
SendDlgItemMessageW
SendDlgItemMessageA
IsChild
SetWindowsHookExW
CallNextHookEx
GetClassLongW
CharNextW
GetPropW
RemovePropW
GetWindowTextW
GetForegroundWindow
DispatchMessageW
BeginDeferWindowPos
EndDeferWindowPos
GetTopWindow
DestroyWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
MapWindowPoints
TrackPopupMenu
SetForegroundWindow
GetClientRect
MessageBoxW
CreateWindowExW
GetClassInfoExW
RegisterClassW
AdjustWindowRectEx
ScreenToClient
DeferWindowPos
PtInRect
DefWindowProcW
CallWindowProcW
SystemParametersInfoA
GetWindowPlacement
GetSystemMetrics
RegisterWindowMessageW
UnpackDDElParam
ReuseDDElParam
LoadMenuW
DestroyMenu
GetClassNameW
GetSysColor
WinHelpW
SetWindowPos
SetFocus
GetWindowThreadProcessId
GetActiveWindow
IsWindowEnabled
GetFocus
EqualRect
GetDlgItem
SetWindowLongW
GetKeyState
GetDlgCtrlID
GetMenu
LoadIconW
SetCursor
PeekMessageW
GetCapture
ReleaseCapture
CharUpperW
SetCapture
UnregisterClassW
LoadAcceleratorsW
GetParent
IsRectEmpty
LoadCursorW
GetSysColorBrush
SetPropW
SetActiveWindow
IsWindowVisible
InvalidateRect
UpdateWindow
IsIconic
SendMessageW
InsertMenuItemW
GetSubMenu
GetMenuItemID
GetMenuItemCount
CreatePopupMenu
GetClassInfoW
IntersectRect
OffsetRect
SetRectEmpty
CopyRect
GetLastActivePopup
BringWindowToTop
SetMenu
GetWindow
ShowWindow
GetWindowLongW
IsWindow
EnableWindow
TranslateAcceleratorW
GetClipboardData
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
SystemParametersInfoW
GetDesktopWindow
GetWindowRect
FindWindowW
PostMessageW
UnregisterClassA
gdi32
CreatePatternBrush
GetStockObject
CreateSolidBrush
CreateFontIndirectW
GetTextExtentPoint32W
CreateRectRgnIndirect
DeleteDC
GetMapMode
GetBkColor
GetTextColor
GetRgnBox
GetPixel
BitBlt
GetWindowExtEx
GetViewportExtEx
ExtSelectClipRgn
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutW
TextOutW
RectVisible
CreateCompatibleBitmap
SetMapMode
SetBkMode
RestoreDC
SaveDC
GetDeviceCaps
DeleteObject
CreateBitmap
GetObjectW
SetBkColor
SetTextColor
GetClipBox
CreateCompatibleDC
PtVisible
comdlg32
GetFileTitleW
winspool.drv
DocumentPropertiesW
OpenPrinterW
ClosePrinter
advapi32
RegCreateKeyExA
RegCreateKeyExW
RegQueryValueW
RegOpenKeyW
RegEnumKeyW
RegDeleteKeyW
RegCloseKey
OpenProcessToken
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
DuplicateTokenEx
CreateProcessAsUserW
RegSetValueExW
RegOpenKeyExW
RegQueryValueExW
shell32
ShellExecuteW
ShellExecuteExW
DragFinish
DragQueryFileW
SHGetSpecialFolderPathW
comctl32
ord17
shlwapi
PathFindExtensionW
PathFindFileNameW
PathStripToRootW
PathFileExistsW
PathIsUNCW
oledlg
OleUIBusyW
ole32
OleIsCurrentClipboard
CoRevokeClassObject
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoGetClassObject
CoTaskMemAlloc
OleFlushClipboard
CoTaskMemFree
OleInitialize
CoFreeUnusedLibraries
OleUninitialize
CLSIDFromString
CLSIDFromProgID
CoRegisterMessageFilter
oleaut32
VariantCopy
SysAllocString
SafeArrayDestroy
SystemTimeToVariantTime
VariantTimeToSystemTime
OleCreateFontIndirect
SysStringLen
SysFreeString
VariantInit
VariantChangeType
VariantClear
SysAllocStringLen
Sections
.text Size: 440KB - Virtual size: 436KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 88KB - Virtual size: 85KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 104KB - Virtual size: 104KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE