Static task
static1
Behavioral task
behavioral1
Sample
102548415448af6bf62f35bfd614ba3a0a0070fcf3dce2d19f086966c4b0567e.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
102548415448af6bf62f35bfd614ba3a0a0070fcf3dce2d19f086966c4b0567e.exe
Resource
win10v2004-20220901-en
General
-
Target
102548415448af6bf62f35bfd614ba3a0a0070fcf3dce2d19f086966c4b0567e
-
Size
160KB
-
MD5
0876b6787807c9ae35d8802136bbd4e0
-
SHA1
ad63cbff2ad81c8f1f1f18117fb19b1724f5fc34
-
SHA256
102548415448af6bf62f35bfd614ba3a0a0070fcf3dce2d19f086966c4b0567e
-
SHA512
28ef016ac909f508ec47cc2b9de7eedf9bca0fe66bebd925dc7d43253eb4414d23e1efe20e6d25671d61356db8a6bf0d306b13c13ebc5daf9c8d779c1cf5a072
-
SSDEEP
3072:0r58Mpd5R+nSVrzMqpJEi/l/C/LPvaBNpmbM34:SpoUYqEOpKPwN
Malware Config
Signatures
Files
-
102548415448af6bf62f35bfd614ba3a0a0070fcf3dce2d19f086966c4b0567e.exe windows x86
d5233e9c236c1859f9f84993ec227e97
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
hccutils
LoadIMAGE
LoadBITMAP
LoadSTRINGW
LoadICON
FindResources
kernel32
CreateEventA
InterlockedDecrement
MultiByteToWideChar
WideCharToMultiByte
lstrlenW
RaiseException
InitializeCriticalSection
DeleteCriticalSection
InterlockedIncrement
lstrlenA
lstrcmpiA
GetModuleFileNameA
GetModuleHandleW
IsDBCSLeadByte
SizeofResource
LoadResource
FindResourceA
LoadLibraryExA
CreateMutexA
GetCurrentThreadId
GetCommandLineA
Sleep
GetConsoleCP
SetStdHandle
SetFilePointer
InitializeCriticalSectionAndSpinCount
GetLastError
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
HeapSize
GetStdHandle
WriteFile
HeapCreate
HeapReAlloc
VirtualFree
LCMapStringA
ExitProcess
LCMapStringW
SetLastError
TlsFree
TlsSetValue
TlsAlloc
CloseHandle
LoadLibraryA
FreeLibrary
GetModuleHandleA
GetProcAddress
FlushFileBuffers
GetConsoleMode
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CreateFileA
EnterCriticalSection
LeaveCriticalSection
HeapFree
GetProcessHeap
TerminateProcess
UnhandledExceptionFilter
TlsGetValue
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
GetStartupInfoA
VirtualQuery
GetSystemInfo
VirtualAlloc
VirtualProtect
HeapAlloc
RtlUnwind
IsDebuggerPresent
SetUnhandledExceptionFilter
GetCurrentProcess
user32
DestroyMenu
GetWindowLongW
FindWindowA
CharNextA
CharNextW
SetWindowLongW
GetCursorPos
DestroyWindow
SendMessageW
RegisterWindowMessageA
IsWindow
CreateDialogParamW
ShowWindow
GetDC
GetSystemMetrics
ReleaseDC
PostQuitMessage
SetTimer
KillTimer
CreatePopupMenu
AppendMenuA
SetForegroundWindow
TrackPopupMenu
DestroyIcon
DefWindowProcA
GetDlgItem
SendMessageA
GetDesktopWindow
GetWindowRect
SetWindowTextW
wsprintfW
RegisterClassA
CreateWindowExA
PostMessageA
GetMessageA
DispatchMessageA
PostThreadMessageA
gdi32
GetDIBits
CreateCompatibleDC
CreateCompatibleBitmap
SelectObject
SetBkColor
BitBlt
SetTextColor
DeleteDC
DeleteObject
advapi32
RegEnumKeyExA
RegQueryInfoKeyA
RegSetValueExA
RegCreateKeyExA
RegDeleteValueA
RegDeleteKeyA
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
shell32
Shell_NotifyIconW
ole32
CoCreateInstance
CoSuspendClassObjects
CoTaskMemAlloc
CoTaskMemFree
CoRegisterClassObject
CoRevokeClassObject
CoTaskMemRealloc
StringFromGUID2
CoUninitialize
CoInitialize
CLSIDFromProgID
oleaut32
SysAllocStringByteLen
SysStringByteLen
SysFreeString
SysStringLen
SysAllocString
LoadTypeLi
UnRegisterTypeLi
RegisterTypeLi
VarUI4FromStr
SafeArrayGetVartype
SafeArrayGetLBound
SafeArrayGetUBound
SafeArrayLock
SafeArrayUnlock
SafeArrayDestroy
VariantClear
Sections
.text Size: 96KB - Virtual size: 96KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 15KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 29KB - Virtual size: 31KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE