Static task
static1
Behavioral task
behavioral1
Sample
d6899cd351aa61d32d90a80858efa5407895ef4495b80df74d72475503403ce2.exe
Resource
win7-20220901-en
General
-
Target
d6899cd351aa61d32d90a80858efa5407895ef4495b80df74d72475503403ce2
-
Size
263KB
-
MD5
3149fcc99c7da4e8f54d47a9008324a0
-
SHA1
0fdebc9d1a0926a6a3b589fd073557e56df49c73
-
SHA256
d6899cd351aa61d32d90a80858efa5407895ef4495b80df74d72475503403ce2
-
SHA512
0faafde34752d60455098be6c1ee89e78bb75481836ba939714536dc18b5b0d935ac3fcb9eb4908ea799fb689787e4aed0b72def5c917635188128c324c8dd0b
-
SSDEEP
6144:v5Fhs6vf8CF/SqULzk63o/47BJswuO37iTROPQ/f:v/nlSqId3Y475GTROPQ3
Malware Config
Signatures
Files
-
d6899cd351aa61d32d90a80858efa5407895ef4495b80df74d72475503403ce2.exe windows x86
db95b0081a54bcac6303f46e65e837ab
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapFree
HeapAlloc
HeapReAlloc
GetCommandLineA
GetProcessHeap
GetStartupInfoA
RtlUnwind
RaiseException
HeapSize
ExitProcess
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
LCMapStringA
LCMapStringW
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
IsDebuggerPresent
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
GetConsoleCP
GetConsoleMode
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CreateFileA
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
FlushFileBuffers
SetFilePointer
WriteFile
InterlockedExchange
GlobalAddAtomW
GlobalFindAtomW
GlobalDeleteAtom
GetVersionExA
GetModuleHandleA
GetCurrentThreadId
GlobalFlags
lstrcmpW
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
GetThreadLocale
GetVersion
InterlockedDecrement
InterlockedIncrement
SetLastError
WideCharToMultiByte
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageW
DeleteCriticalSection
MultiByteToWideChar
InitializeCriticalSection
lstrcpyA
ReadFile
GetPrivateProfileStringW
lstrlenA
LoadResource
FindResourceW
SizeofResource
LockResource
LocalFree
CreateToolhelp32Snapshot
Process32NextW
LocalAlloc
Process32FirstW
LoadLibraryW
Sleep
MoveFileExW
lstrlenW
OpenProcess
LoadLibraryA
FindFirstFileW
CreateProcessW
FreeLibrary
FindClose
GetCurrentProcessId
GetLastError
DeleteFileW
FindNextFileW
CreateFileW
WaitForSingleObject
GetModuleFileNameW
CopyFileW
CloseHandle
RemoveDirectoryW
ExpandEnvironmentStringsW
MoveFileW
SetFileAttributesW
lstrcmpiW
GetSystemDirectoryW
GetProcAddress
GetModuleHandleW
GetVersionExW
GetEnvironmentStrings
GetCurrentProcess
user32
RegisterWindowMessageW
LoadIconW
WinHelpW
GetCapture
GetClassLongW
SetPropW
GetPropW
RemovePropW
GetForegroundWindow
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetForegroundWindow
GetClientRect
GetMenu
PostMessageW
CreateWindowExW
GetClassInfoExW
GetClassInfoW
RegisterClassW
AdjustWindowRectEx
CopyRect
DefWindowProcW
CheckMenuItem
SystemParametersInfoA
GetWindowPlacement
GrayStringW
DrawTextExW
DrawTextW
TabbedTextOutW
SetWindowsHookExW
CallNextHookEx
DispatchMessageW
GetKeyState
PeekMessageW
ValidateRect
SetWindowPos
SetWindowLongW
IsWindow
GetDlgItem
EnableMenuItem
ModifyMenuW
LoadBitmapW
GetMenuCheckMarkDimensions
SetMenuItemBitmaps
DestroyMenu
PostQuitMessage
CallWindowProcW
GetFocus
ClientToScreen
GetWindow
GetDlgCtrlID
GetWindowRect
GetClassNameW
PtInRect
SetWindowTextW
GetWindowThreadProcessId
SendMessageW
GetParent
GetWindowLongW
GetLastActivePopup
IsWindowEnabled
EnableWindow
MessageBoxW
GetWindowTextW
UnhookWindowsHookEx
LoadCursorW
GetSystemMetrics
GetDC
ReleaseDC
GetSysColor
GetSysColorBrush
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
wsprintfA
wsprintfW
IsIconic
UnregisterClassA
gdi32
ExtTextOutW
TextOutW
RectVisible
PtVisible
GetStockObject
CreateBitmap
DeleteDC
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
Escape
GetDeviceCaps
DeleteObject
SaveDC
RestoreDC
SetBkColor
SetTextColor
SetMapMode
GetClipBox
SelectObject
winspool.drv
DocumentPropertiesW
OpenPrinterW
ClosePrinter
advapi32
FreeSid
AllocateAndInitializeSid
DuplicateTokenEx
SetTokenInformation
EqualSid
GetTokenInformation
CreateProcessAsUserW
RegQueryValueExW
RegSetValueExW
RegOpenKeyExW
RegCreateKeyExW
ControlService
QueryServiceStatus
StartServiceW
OpenServiceW
OpenSCManagerW
DeleteService
CloseServiceHandle
CreateServiceW
OpenProcessToken
ImpersonateLoggedOnUser
RevertToSelf
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
RegOpenKeyW
shell32
SHGetFolderPathW
SHCreateDirectoryExW
oleaut32
VariantInit
VariantClear
VariantChangeType
psapi
GetModuleFileNameExW
EnumProcesses
GetProcessImageFileNameW
shlwapi
PathFileExistsW
SHDeleteKeyW
PathFindFileNameW
PathAppendW
PathIsUNCW
StrStrIA
PathRemoveFileSpecW
wtsapi32
WTSFreeMemory
WTSEnumerateSessionsW
version
GetFileVersionInfoW
VerQueryValueA
GetFileVersionInfoSizeW
oleacc
LresultFromObject
CreateStdAccessibleObject
Sections
.text Size: 132KB - Virtual size: 129KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 8KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 80KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE