Static task
static1
Behavioral task
behavioral1
Sample
d67248ccb8081f454c0d4000973a4655e58b2ef3566b00ac73826c3e47c39681.exe
Resource
win7-20220901-en
General
-
Target
d67248ccb8081f454c0d4000973a4655e58b2ef3566b00ac73826c3e47c39681
-
Size
501KB
-
MD5
64958707a5b09268255fd74c798ec590
-
SHA1
78949efdd9f775c13c946cf302a3a8ab997ba0f3
-
SHA256
d67248ccb8081f454c0d4000973a4655e58b2ef3566b00ac73826c3e47c39681
-
SHA512
6943d9312144f6620f96b0d326896491b05ca9d4913e4110d4d2165095bcfa3e5bbef1a9a68f2580c1bddf2faa1b39005a032096a8384520bbc58d08927c918b
-
SSDEEP
6144:dCH9L5d5ezLqIFQSDdAMbSbIrx1L1l3ERNdk0GdQBQaSW:dCH9Eq+0MbSox1QwDdQBvN
Malware Config
Signatures
Files
-
d67248ccb8081f454c0d4000973a4655e58b2ef3566b00ac73826c3e47c39681.exe windows x86
f8b98d9d35ffb85d9b79cd153b6f4ba2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
msi
ord118
ord160
ord32
ord159
ord92
ord19
ord195
ord8
ord205
kernel32
TlsFree
lstrlenA
GetModuleHandleA
GlobalFlags
WritePrivateProfileStringW
GetFileAttributesW
GetFileTime
SetErrorMode
HeapFree
HeapAlloc
GetProcessHeap
GetStartupInfoW
GetSystemTimeAsFileTime
RtlUnwind
RaiseException
HeapReAlloc
ExitThread
CreateThread
ExitProcess
SetStdHandle
GetFileType
HeapSize
SetUnhandledExceptionFilter
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
DeleteCriticalSection
GetEnvironmentStringsW
GetCommandLineA
GetCommandLineW
SetHandleCount
GetStartupInfoA
HeapDestroy
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
TerminateProcess
UnhandledExceptionFilter
IsDebuggerPresent
Sleep
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
LCMapStringA
LCMapStringW
VirtualAlloc
GetConsoleCP
GetConsoleMode
GetTimeZoneInformation
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetCurrentDirectoryA
GetDriveTypeA
CreateFileA
SetEnvironmentVariableA
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
InterlockedDecrement
InterlockedIncrement
CreateFileW
GetFullPathNameW
GetVolumeInformationW
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
GetThreadLocale
FindFirstFileW
FileTimeToLocalFileTime
FileTimeToSystemTime
FindNextFileW
FindClose
GetCurrentProcessId
GetCurrentThread
ConvertDefaultLocale
GetModuleFileNameW
GetVersion
EnumResourceLanguagesW
lstrcmpA
GetLocaleInfoW
CompareStringA
InterlockedExchange
CreateEventW
SuspendThread
SetEvent
ResumeThread
SetThreadPriority
GetCurrentThreadId
GlobalAddAtomW
GlobalFindAtomW
GlobalDeleteAtom
LoadLibraryW
FreeLibrary
CompareStringW
LoadLibraryA
lstrcmpW
GetVersionExA
WideCharToMultiByte
MultiByteToWideChar
SetLastError
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
lstrlenW
MulDiv
GetCurrentDirectoryW
SetCurrentDirectoryW
GetVersionExW
DeleteFileW
GetTempFileNameW
FreeResource
ExpandEnvironmentStringsW
GetPrivateProfileStringW
GetModuleHandleW
GetProcAddress
GetCurrentProcess
GetSystemInfo
GetTempPathW
CreateProcessW
GetLastError
WaitForSingleObject
GetExitCodeProcess
CloseHandle
GetUserDefaultLangID
FormatMessageW
LocalFree
FindResourceW
LoadResource
LockResource
SizeofResource
FreeEnvironmentStringsW
user32
UnregisterClassW
ClientToScreen
GrayStringW
DrawTextExW
DrawTextW
TabbedTextOutW
LoadCursorW
GetDC
ReleaseDC
GetSysColorBrush
CharUpperW
SetCursor
GetWindowThreadProcessId
PostQuitMessage
GetMessageW
TranslateMessage
GetCursorPos
ValidateRect
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapW
ModifyMenuW
EnableMenuItem
CheckMenuItem
RegisterWindowMessageW
LoadIconW
SendDlgItemMessageA
WinHelpW
GetCapture
SetWindowsHookExW
CallNextHookEx
GetClassLongW
GetClassNameW
SetPropW
GetPropW
RemovePropW
GetForegroundWindow
GetLastActivePopup
DispatchMessageW
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
UnregisterClassA
MapWindowPoints
GetKeyState
SetForegroundWindow
IsWindowVisible
UpdateWindow
GetClientRect
GetMenu
MessageBoxW
CreateWindowExW
GetClassInfoExW
GetClassInfoW
GetSysColor
AdjustWindowRectEx
CopyRect
PtInRect
DefWindowProcW
CallWindowProcW
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowRect
GetDesktopWindow
GetActiveWindow
SetActiveWindow
GetSystemMetrics
CreateDialogIndirectParamW
DestroyWindow
GetNextDlgTabItem
EndDialog
GetWindowTextW
GetFocus
GetParent
SetWindowPos
SetFocus
IsWindowEnabled
ShowWindow
SetWindowLongW
GetDlgCtrlID
IsWindow
SetWindowTextW
GetWindowLongW
IsDialogMessageW
DestroyMenu
EndPaint
GetTopWindow
BeginPaint
SendDlgItemMessageW
GetDlgItem
GetWindow
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
PostMessageW
EnableWindow
KillTimer
SetTimer
SendMessageW
RegisterClassW
PeekMessageW
gdi32
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
DeleteDC
GetStockObject
SelectObject
Escape
ExtTextOutW
TextOutW
RectVisible
PtVisible
SaveDC
CreateBitmap
GetObjectW
SetBkColor
SetTextColor
GetClipBox
GetDeviceCaps
DeleteObject
SetMapMode
RestoreDC
comdlg32
GetFileTitleW
winspool.drv
DocumentPropertiesW
ClosePrinter
OpenPrinterW
advapi32
RegSetValueExW
RegCreateKeyExW
RegQueryValueW
RegEnumKeyW
RegDeleteKeyW
RegOpenKeyW
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
OpenProcessToken
AdjustTokenPrivileges
LookupPrivilegeValueW
InitiateSystemShutdownW
shell32
SHGetSpecialFolderPathW
shlwapi
PathFindExtensionW
PathFindFileNameW
PathStripToRootW
StrFormatByteSizeW
PathIsUNCW
ole32
CoCreateInstance
CoUninitialize
CoInitialize
oleaut32
VariantInit
VariantChangeType
VariantClear
urlmon
URLDownloadToFileW
Sections
.text Size: 180KB - Virtual size: 176KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 48KB - Virtual size: 46KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 12KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 84KB - Virtual size: 83KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.prdata Size: 68KB - Virtual size: 68KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE