Static task
static1
Behavioral task
behavioral1
Sample
d0d31f4b02dd0384b5f2108d561261fde2498476c7bd51c14c14c1f3d589d47d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d0d31f4b02dd0384b5f2108d561261fde2498476c7bd51c14c14c1f3d589d47d.exe
Resource
win10v2004-20220812-en
General
-
Target
d0d31f4b02dd0384b5f2108d561261fde2498476c7bd51c14c14c1f3d589d47d
-
Size
3.2MB
-
MD5
7ae74c6c599299dc6faf7377ba497532
-
SHA1
859dfabefc892e2580f38f1da197f77c1ead21c0
-
SHA256
d0d31f4b02dd0384b5f2108d561261fde2498476c7bd51c14c14c1f3d589d47d
-
SHA512
1f1feb1e8a91cf2ec777343171720584808c97252ce559b46148ba086847494a26473ef3fe9bdf1080f26be74cf4fe1671d42b6455431285d6dbdc08ee4cb08c
-
SSDEEP
49152:y51Bsm2YMRCD3i4llFx5O2qlGZRQVJlCCy4j4O4j48Qx:yHxZRQjlC2
Malware Config
Signatures
Files
-
d0d31f4b02dd0384b5f2108d561261fde2498476c7bd51c14c14c1f3d589d47d.exe windows x86
05419f195e5c55ebe5b6d8aecb08f2a5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcatW
GetCurrentDirectoryW
GetModuleHandleW
GlobalFindAtomW
GlobalAddAtomW
LockResource
LoadResource
GetProcessVersion
GetFileTime
LocalFileTimeToFileTime
SetFileTime
SetErrorMode
GetStartupInfoW
RtlUnwind
CreateThread
ExitThread
SetStdHandle
GetFileType
HeapAlloc
HeapFree
GetSystemTime
GetLocalTime
HeapReAlloc
HeapSize
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetEnvironmentStrings
GetCommandLineW
GetCommandLineA
SetHandleCount
GetStartupInfoA
GetModuleFileNameA
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
GetCPInfo
GetOEMCP
LCMapStringA
LCMapStringW
VirtualAlloc
IsBadWritePtr
GlobalFlags
GetStringTypeA
GetStringTypeW
GetCurrentDirectoryA
GetDriveTypeA
CompareStringA
CompareStringW
SetEnvironmentVariableA
TlsGetValue
LocalReAlloc
TlsSetValue
GlobalReAlloc
TlsFree
GlobalHandle
GlobalFree
TlsAlloc
GetVersion
lstrcmpiW
GetFullPathNameW
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
WriteFile
DuplicateHandle
lstrcpyW
lstrcpynW
SuspendThread
SetThreadPriority
ResumeThread
lstrcmpW
GlobalAlloc
SetCurrentDirectoryW
SetEnvironmentVariableW
SetVolumeLabelW
CreateFileMappingW
GetThreadContext
GetExitCodeThread
TerminateThread
GetDiskFreeSpaceW
QueryDosDeviceW
GetComputerNameA
OpenSemaphoreW
OpenMutexW
OpenEventW
DeviceIoControl
CreateFileA
GlobalMemoryStatus
GetComputerNameW
LoadLibraryExW
LoadLibraryExA
EnumResourceLanguagesW
SizeofResource
GetSystemDirectoryW
QueryPerformanceCounter
FindResourceExW
GlobalDeleteAtom
FileTimeToLocalFileTime
GlobalLock
GlobalUnlock
MultiByteToWideChar
WideCharToMultiByte
lstrlenA
GetThreadTimes
FileTimeToSystemTime
GetQueuedCompletionStatus
PostQueuedCompletionStatus
CreateIoCompletionPort
OutputDebugStringW
CreateProcessW
TerminateProcess
WritePrivateProfileStringW
GetPrivateProfileIntW
GetPrivateProfileStringW
SetFileAttributesW
GetLogicalDrives
GetDriveTypeW
GetVolumeInformationW
GetModuleHandleA
LocalFree
GetCurrentProcessId
GetCurrentThread
OpenFileMappingW
MapViewOfFile
UnmapViewOfFile
SetUnhandledExceptionFilter
GetProcessHeap
SetPriorityClass
IsBadReadPtr
GetFileSize
SetFilePointer
MoveFileW
LoadLibraryW
GetProcessHeaps
HeapLock
HeapWalk
HeapUnlock
SetConsoleTextAttribute
AllocConsole
GetStdHandle
SetConsoleScreenBufferSize
SetConsoleWindowInfo
ReadConsoleA
FreeConsole
GetConsoleScreenBufferInfo
FillConsoleOutputAttribute
FillConsoleOutputCharacterW
SetConsoleCursorPosition
OpenProcess
GetVersionExW
SetLastError
GetProfileStringW
WriteProfileStringW
Sleep
RaiseException
ExitProcess
SetThreadAffinityMask
CreateDirectoryW
GetACP
GetDiskFreeSpaceExW
DeleteFileW
GetFileAttributesW
InterlockedExchangeAdd
FindFirstFileW
FindNextFileW
FindClose
GetTimeZoneInformation
InterlockedDecrement
GetTickCount
GetLastError
CreateMutexW
GetSystemInfo
GetCurrentProcess
GetProcessTimes
ResetEvent
ReleaseMutex
GetSystemTimeAsFileTime
SystemTimeToFileTime
LoadLibraryA
GetProcAddress
GetModuleFileNameW
CreateFileW
ReadFile
SetEvent
CloseHandle
FreeLibrary
WaitForSingleObject
LeaveCriticalSection
EnterCriticalSection
ReleaseSemaphore
InterlockedExchange
CreateSemaphoreW
DeleteCriticalSection
InitializeCriticalSection
InterlockedCompareExchange
GetCurrentThreadId
WaitForMultipleObjects
CreateEventW
GetCurrencyFormatW
FormatMessageW
lstrlenW
LocalAlloc
InterlockedIncrement
IsBadCodePtr
user32
SetForegroundWindow
RegisterWindowMessageW
SystemParametersInfoW
IsIconic
GetWindowPlacement
ShowWindow
SetWindowPos
SetWindowLongW
GetForegroundWindow
GetDlgItem
GrayStringW
DrawTextW
TabbedTextOutW
GetMessagePos
GetMessageTime
ReleaseDC
GetDC
CallWindowProcW
GetPropW
SetPropW
CreateWindowExW
DestroyWindow
wsprintfW
PostThreadMessageW
DefWindowProcW
PostQuitMessage
SendMessageW
SetCursor
EnableWindow
MessageBoxW
GetWindowLongW
IsWindowEnabled
GetLastActivePopup
ClientToScreen
SetWindowTextW
SetFocus
GetMenu
RegisterClassW
GetClassInfoW
WinHelpW
GetCapture
GetTopWindow
CopyRect
GetClientRect
AdjustWindowRectEx
GetSysColor
MapWindowPoints
PostMessageW
RemovePropW
GetParent
SetWindowsHookExW
GetCursorPos
PeekMessageW
IsWindowVisible
ValidateRect
CallNextHookEx
GetKeyState
GetActiveWindow
DispatchMessageW
TranslateMessage
GetMessageW
GetNextDlgTabItem
GetWindow
GetFocus
EnableMenuItem
UnregisterClassW
CharToOemBuffA
OemToCharBuffA
MessageBoxA
GetProcessWindowStation
GetUserObjectInformationW
CheckMenuItem
SetMenuItemBitmaps
ModifyMenuW
GetMenuState
LoadBitmapW
GetMenuCheckMarkDimensions
UnhookWindowsHookEx
LoadIconW
LoadCursorW
GetSysColorBrush
DestroyMenu
GetWindowTextW
GetDesktopWindow
CharUpperW
GetSystemMetrics
LoadStringW
GetMenuItemID
GetSubMenu
GetMenuItemCount
GetClassNameW
PtInRect
GetWindowRect
GetDlgCtrlID
gdi32
GetObjectW
ExtTextOutW
TextOutW
RectVisible
PtVisible
GetDeviceCaps
DeleteObject
DeleteDC
SaveDC
RestoreDC
SelectObject
GetStockObject
SetBkColor
Escape
SetTextColor
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
GetClipBox
CreateBitmap
comdlg32
GetFileTitleW
winspool.drv
DocumentPropertiesW
ClosePrinter
OpenPrinterW
advapi32
RegDeleteValueW
RegQueryInfoKeyW
RegEnumKeyW
GetAce
LookupAccountNameW
RegisterEventSourceA
ReportEventA
RegisterServiceCtrlHandlerW
StartServiceCtrlDispatcherW
ControlService
StartServiceW
QueryServiceStatus
DeleteService
LockServiceDatabase
CreateServiceW
RegCreateKeyW
UnlockServiceDatabase
SetServiceStatus
RegDeleteKeyW
GetUserNameW
MapGenericMask
InitializeAcl
AddAccessAllowedAce
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
DuplicateToken
AccessCheck
OpenProcessToken
GetTokenInformation
LookupAccountSidW
GetLengthSid
CopySid
RegisterEventSourceW
ReportEventW
DeregisterEventSource
GetFileSecurityW
SetFileSecurityW
OpenSCManagerW
OpenServiceW
QueryServiceConfigW
ChangeServiceConfigW
CloseServiceHandle
RegSetValueExW
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
RegCreateKeyExW
comctl32
ord17
ole32
CoUninitialize
CoCreateGuid
CoCreateInstance
OleRun
CoInitializeEx
oleaut32
SysFreeString
GetErrorInfo
SysAllocString
VariantChangeType
SafeArrayAccessData
SafeArrayUnaccessData
SysStringByteLen
VariantCopy
SysStringLen
VariantClear
VariantInit
wininet
InternetCloseHandle
InternetReadFile
HttpSendRequestW
HttpAddRequestHeadersW
HttpOpenRequestW
InternetConnectW
InternetOpenW
HttpQueryInfoW
InternetCrackUrlW
InternetCanonicalizeUrlW
rpcrt4
RpcStringFreeA
UuidToStringA
UuidCreate
ws2_32
WSACleanup
WSARecv
ioctlsocket
WSASend
recv
shutdown
inet_addr
ntohl
gethostbyname
htonl
gethostname
setsockopt
accept
WSAStartup
htons
WSAIoctl
socket
connect
closesocket
recvfrom
sendto
send
getsockopt
getsockname
getpeername
ntohs
WSAEnumNetworkEvents
WSAEventSelect
bind
WSAGetLastError
listen
version
GetFileVersionInfoW
GetFileVersionInfoSizeW
VerQueryValueW
Sections
.text Size: 2.3MB - Virtual size: 2.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 356KB - Virtual size: 352KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 532KB - Virtual size: 566KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ