Static task
static1
Behavioral task
behavioral1
Sample
8c1c6ef94743fc4b744ffa9229d9c0527cb4dbf2cb7cc8c6a418e74ce14bc1ae.exe
Resource
win7-20220812-en
General
-
Target
8c1c6ef94743fc4b744ffa9229d9c0527cb4dbf2cb7cc8c6a418e74ce14bc1ae
-
Size
517KB
-
MD5
688f5bbd6fdb7fac6d3676352d384fc0
-
SHA1
fa088643985b7f2ca2cb5187bcab18586016434b
-
SHA256
8c1c6ef94743fc4b744ffa9229d9c0527cb4dbf2cb7cc8c6a418e74ce14bc1ae
-
SHA512
e3fc854373c428e54790b04150b79b4df16cda1960ad89fc6b6ecbfe96129b8c5a29b3de253f2748ca90628068d439261dbe4787e1df17e72257b8a3a897ed7f
-
SSDEEP
6144:kwvwABljKtc6EF3rOqWOUPYU9e+TC/Aptejw3R+CYVRiA1DymiYXt4XTRX8RAAQR:vBlIEF3rNWv39G4psjUkDymiYWVlq1Y1
Malware Config
Signatures
Files
-
8c1c6ef94743fc4b744ffa9229d9c0527cb4dbf2cb7cc8c6a418e74ce14bc1ae.exe windows x86
223b4b70ffed7eccfae33d172e9c07d7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
MultiByteToWideChar
GetStringTypeA
GetStringTypeW
SetStdHandle
FlushFileBuffers
GetCPInfo
GetACP
GetOEMCP
LoadLibraryA
LCMapStringA
LCMapStringW
GetLocaleInfoA
CompareStringA
CompareStringW
SetEnvironmentVariableA
VirtualAlloc
RtlUnwind
VirtualFree
HeapCreate
HeapDestroy
GetVersionExA
GetEnvironmentVariableA
GetEnvironmentStringsW
GetEnvironmentStrings
WideCharToMultiByte
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetModuleFileNameA
UnhandledExceptionFilter
WriteFile
HeapSize
HeapAlloc
HeapReAlloc
SetFilePointer
GetFileType
GetStdHandle
SetHandleCount
ReadFile
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
TlsGetValue
SetLastError
TlsAlloc
TlsSetValue
GetCurrentThreadId
HeapFree
GetVersion
GetCommandLineA
GetStartupInfoA
GetCurrentProcess
ExitProcess
QueryPerformanceCounter
FreeLibrary
lstrcmpW
CreateMutexA
GetLastError
Sleep
GetModuleHandleA
GetProcAddress
GetCurrentProcessId
TerminateProcess
OpenProcess
GetExitCodeProcess
WaitForSingleObject
OpenMutexA
CloseHandle
GetPrivateProfileStringA
InterlockedExchange
TerminateThread
SetThreadPriority
CreateEventA
FindClose
GetLongPathNameA
GetLongPathNameW
GetShortPathNameW
GetDriveTypeA
CreateFileW
SearchPathA
OutputDebugStringA
LoadLibraryExA
LocalFree
FormatMessageA
GetModuleFileNameW
GetFileAttributesW
GetFileAttributesA
DeleteFileW
DeleteFileA
FindFirstFileW
FindFirstFileA
FindFirstFileExW
FindFirstFileExA
FindNextFileW
FindNextFileA
CopyFileW
MoveFileW
MoveFileExW
CopyFileA
MoveFileA
MoveFileExA
CopyFileExW
MoveFileWithProgressW
CopyFileExA
MoveFileWithProgressA
SetFileAttributesW
GetFileAttributesExW
CreateDirectoryW
CreateDirectoryExW
GetDateFormatW
GetTimeFormatW
RemoveDirectoryW
CreateProcessW
FindFirstChangeNotificationW
FindFirstChangeNotificationA
LoadLibraryW
LoadLibraryExW
SetFileAttributesA
GetFileAttributesExA
GetShortPathNameA
CreateFileA
CreateDirectoryA
CreateDirectoryExA
GetDateFormatA
GetTimeFormatA
RemoveDirectoryA
CreateProcessA
FileTimeToSystemTime
FileTimeToLocalFileTime
lstrcpynA
GetFileSize
SetEndOfFile
UnmapViewOfFile
QueryPerformanceFrequency
GetSystemInfo
CreateThread
ExitThread
RaiseException
InterlockedDecrement
InterlockedIncrement
user32
SetActiveWindow
IsIconic
IsWindowVisible
EnumThreadWindows
GetWindow
SetWindowsHookExA
FlashWindowEx
SetForegroundWindow
ShowWindow
LoadStringA
CreateWindowExW
SetWindowLongW
GetWindowLongW
CallWindowProcW
RegisterClassW
UnregisterClassW
GetClassInfoA
SetClassLongW
SetWindowTextW
DialogBoxParamW
SendMessageW
SetDlgItemTextW
DefWindowProcW
CreateDialogParamW
SetMenuItemInfoW
GetMenuItemInfoW
InsertMenuItemW
AppendMenuW
MessageBoxW
SetWindowLongA
CallWindowProcA
IsDialogMessageA
UnregisterClassA
SetClassLongA
SetWindowTextA
DispatchMessageA
SetDlgItemTextA
DefWindowProcA
CreateDialogParamA
SetMenuItemInfoA
GetMenuItemInfoA
InsertMenuItemA
AppendMenuA
MessageBoxA
CreateWindowExA
DestroyWindow
GetClientRect
MoveWindow
PostQuitMessage
EndPaint
BeginPaint
MessageBeep
GetActiveWindow
IsWindow
SetFocus
TranslateAcceleratorA
RegisterClassA
TranslateMessage
MsgWaitForMultipleObjects
PeekMessageA
PostMessageA
LoadCursorA
SetCursor
GetAsyncKeyState
GetKeyState
GetSystemMetrics
SystemParametersInfoA
GetWindowRect
UnhookWindowsHookEx
CallNextHookEx
GetDC
ReleaseDC
GetParent
LoadIconA
GetDlgItem
SendMessageA
LoadImageA
SetWindowPos
EndDialog
EnumWindows
GetWindowTextW
GetWindowTextA
DialogBoxParamA
AdjustWindowRect
GetClassNameA
GetWindowLongA
FindWindowA
advapi32
RegEnumKeyExA
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
RegCreateKeyExA
RegEnumValueW
RegEnumKeyExW
RegSetValueExW
RegQueryValueExW
CryptGenRandom
CryptAcquireContextA
RegOpenKeyExW
RegCreateKeyExW
RegCloseKey
RegEnumValueA
shell32
SHBrowseForFolderW
DragQueryFileW
SHFileOperationW
SHGetFileInfoW
SHGetSpecialFolderPathW
SHGetPathFromIDListW
ShellExecuteExW
DragQueryFileA
SHFileOperationA
SHGetFileInfoA
SHGetSpecialFolderPathA
ShellExecuteExA
SHBrowseForFolderA
SHGetPathFromIDListA
ShellExecuteW
ShellExecuteA
oleaut32
SysFreeString
SystemTimeToVariantTime
SysAllocString
wintrust
WinVerifyTrust
comdlg32
GetOpenFileNameW
GetOpenFileNameA
GetSaveFileNameA
GetSaveFileNameW
wininet
InternetOpenA
InternetCrackUrlA
InternetGetConnectedState
DeleteUrlCacheEntry
InternetCloseHandle
HttpSendRequestA
HttpOpenRequestA
InternetConnectA
urlmon
URLDownloadToFileA
URLDownloadToFileW
shlwapi
SHDeleteValueA
comctl32
CreatePropertySheetPageA
PropertySheetA
CreatePropertySheetPageW
PropertySheetW
InitCommonControlsEx
gdi32
CreateDIBSection
StretchBlt
SetStretchBltMode
BitBlt
DeleteDC
CreatePen
SetBkMode
GetKerningPairsA
GetGlyphOutlineA
TextOutA
GetTextExtentPoint32W
ExtTextOutW
TextOutW
CreateFontIndirectA
CreateCompatibleDC
DeleteObject
GetStockObject
GetGlyphOutlineW
GetTextExtentPoint32A
SelectObject
Rectangle
ExtTextOutA
Sections
.text Size: 300KB - Virtual size: 298KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 24KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 36KB - Virtual size: 63KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 148KB - Virtual size: 148KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE