Static task
static1
Behavioral task
behavioral1
Sample
3081da95377444ccc8ec8d7f41566925572e11468a4b488a91323c30c430ee57.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3081da95377444ccc8ec8d7f41566925572e11468a4b488a91323c30c430ee57.exe
Resource
win10v2004-20220812-en
General
-
Target
3081da95377444ccc8ec8d7f41566925572e11468a4b488a91323c30c430ee57
-
Size
257KB
-
MD5
071a8394abad250428ba7d30da74a550
-
SHA1
563baf917ff375392272f7bb96b4df5e198ba8f8
-
SHA256
3081da95377444ccc8ec8d7f41566925572e11468a4b488a91323c30c430ee57
-
SHA512
ddb0af0e8f0a60014ab34ec9f9b4a5ae9901dc729e728632f89a1e3b5f7726460eebb1b76a1ab6e9440d409ab06d444c45ab7f86d613e684669b6c6f2f45496c
-
SSDEEP
6144:qfhhi0P8YPOIjAsVLQytBxqllBu6MrmD1uyg:qi0P8YWIj1ztBsllB9MS5q
Malware Config
Signatures
Files
-
3081da95377444ccc8ec8d7f41566925572e11468a4b488a91323c30c430ee57.exe windows x86
bcae76792ad01510374de3146d2ba20a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
SetWindowRgn
GetAltTabInfoA
BringWindowToTop
GetTopWindow
UnregisterClassA
GetWindowThreadProcessId
SetCursor
GetMessageA
TranslateMessage
ValidateRect
PostQuitMessage
GetCursorPos
WindowFromPoint
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
ModifyMenuA
GetMenuState
EnableMenuItem
CheckMenuItem
GetActiveWindow
CreateDialogIndirectParamA
IsWindowEnabled
GetNextDlgTabItem
EndDialog
RegisterWindowMessageA
SendDlgItemMessageA
WinHelpA
GetCapture
SetWindowsHookExA
CallNextHookEx
GetClassLongA
SetPropA
GetPropA
RemovePropA
GetFocus
IsWindow
SetFocus
GetWindowTextLengthA
GetWindowTextA
GetLastActivePopup
SetActiveWindow
DispatchMessageA
GetDlgItem
DestroyWindow
GetMessageTime
GetMessagePos
PeekMessageA
MapWindowPoints
GetKeyState
SetForegroundWindow
IsWindowVisible
UpdateWindow
GetMenu
GetSubMenu
GetMenuItemID
GetMenuItemCount
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
PtInRect
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
GetWindowLongA
SetWindowLongA
SetWindowPos
SystemParametersInfoA
GetWindowPlacement
GetWindow
GetSysColor
EndPaint
GetDC
ClientToScreen
ScreenToClient
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
LoadCursorA
GetSysColorBrush
GetClassNameA
DestroyMenu
UnhookWindowsHookEx
GetSystemMetrics
ExitWindowsEx
LoadIconA
GetDesktopWindow
BeginPaint
IsIconic
DrawIcon
LoadBitmapA
MessageBoxA
GetParent
SendMessageA
OffsetRect
CopyRect
LoadImageA
EnableWindow
InvalidateRect
GetClientRect
GetWindowRect
PostMessageA
GetWindowDC
ReleaseDC
GetForegroundWindow
shell32
ShellExecuteA
advapi32
RegCloseKey
LookupPrivilegeValueA
RegDeleteValueA
RegSetValueExA
RegCreateKeyExA
RegDeleteKeyA
RegQueryValueExA
AdjustTokenPrivileges
RegOpenKeyExA
OpenProcessToken
RegOpenKeyA
RegEnumKeyA
RegQueryValueA
gdi32
GetObjectA
GetDIBits
DeleteObject
GetClipBox
SetMapMode
SetTextColor
SetBkMode
SetBkColor
RestoreDC
CreateCompatibleBitmap
GetDeviceCaps
GetStockObject
CreateFontIndirectA
CreateRectRgn
CombineRgn
SelectObject
StretchBlt
BitBlt
GetBkColor
CreateCompatibleDC
PtVisible
TextOutA
ExtTextOutA
Escape
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
CreateBitmap
DeleteDC
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SaveDC
RectVisible
comctl32
_TrackMouseEvent
version
VerQueryValueA
GetFileVersionInfoSizeA
GetFileVersionInfoA
shlwapi
PathFindExtensionA
PathFindFileNameA
kernel32
GetConsoleMode
SetStdHandle
WriteConsoleA
WriteConsoleW
SetErrorMode
CreateFileA
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
WritePrivateProfileStringA
GetThreadLocale
GetOEMCP
GetCPInfo
GlobalFlags
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
GetCurrentProcessId
CloseHandle
GetCurrentThread
ConvertDefaultLocale
GetConsoleCP
GetLocaleInfoA
lstrcmpA
GlobalAlloc
GlobalFree
FreeResource
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
LoadLibraryA
lstrcmpW
GlobalLock
GlobalUnlock
MulDiv
FreeLibrary
GetModuleFileNameW
SetLastError
GetModuleHandleA
GetProcAddress
lstrlenA
CompareStringA
GetVersion
GetCurrentProcess
CreateProcessA
GetLastError
FormatMessageA
LocalFree
WaitForSingleObject
GetExitCodeProcess
GetSystemDirectoryA
GetStringTypeW
GetStringTypeA
LCMapStringA
GetSystemTimeAsFileTime
GetTickCount
QueryPerformanceCounter
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
Sleep
GetStdHandle
VirtualFree
HeapCreate
HeapDestroy
GetACP
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
HeapSize
ExitProcess
RaiseException
GetStartupInfoA
GetProcessHeap
GetCommandLineA
HeapReAlloc
HeapAlloc
HeapFree
RtlUnwind
InterlockedIncrement
InterlockedDecrement
GetModuleHandleW
IsValidCodePage
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
InitializeCriticalSectionAndSpinCount
GetLocaleInfoW
EnumResourceLanguagesA
GetModuleFileNameA
GetVersionExA
WideCharToMultiByte
FindResourceA
LoadResource
LockResource
SizeofResource
VirtualAlloc
GetConsoleOutputCP
GetVolumeNameForVolumeMountPointA
WriteConsoleOutputCharacterA
GetCurrentDirectoryW
MultiByteToWideChar
LCMapStringW
GetProfileStringA
Sections
.text Size: 161KB - Virtual size: 160KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 54KB - Virtual size: 54KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 34KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ