Static task
static1
Behavioral task
behavioral1
Sample
c9845b1ce70b327b410628355d13e584b67ba3e8b85e249ab27e54a6d064c573.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
c9845b1ce70b327b410628355d13e584b67ba3e8b85e249ab27e54a6d064c573.exe
Resource
win10v2004-20220901-en
General
-
Target
c9845b1ce70b327b410628355d13e584b67ba3e8b85e249ab27e54a6d064c573
-
Size
313KB
-
MD5
67b70ceaa43afbf51753e300ca930f90
-
SHA1
648c4d9c9b5b97b924119cd28c8d95353bde2cbb
-
SHA256
c9845b1ce70b327b410628355d13e584b67ba3e8b85e249ab27e54a6d064c573
-
SHA512
1777771c59d9c885cf6e562aa9f35b9bc93452e8e9d0d0b909edd17349fda757eea31b01230c914001548d23992b239478866d90c398b37c5caaffc1ccdf3043
-
SSDEEP
6144:WwcnlVVP3wDyLnFpnTZMM+GzfjTrb14D10FJFNz9JLa4:WZn9PwDyJpnljTrB4D1CF1
Malware Config
Signatures
Files
-
c9845b1ce70b327b410628355d13e584b67ba3e8b85e249ab27e54a6d064c573.exe windows x86
bc9c04fcb67157e3d648efb9a7022508
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetTickCount
GetStdHandle
WideCharToMultiByte
InterlockedDecrement
GetFileAttributesExW
SetLastError
CreateDirectoryW
GetFileAttributesW
Sleep
CopyFileW
GetCommandLineW
ReadFile
CreateFileW
RaiseException
FlushInstructionCache
InterlockedIncrement
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
OpenFileMappingW
OpenEventW
GetCurrentThreadId
lstrcpyW
GetFileTime
HeapDestroy
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
GetProcessHeap
InterlockedCompareExchange
LoadLibraryA
IsProcessorFeaturePresent
VirtualFree
VirtualAlloc
CreateProcessW
GetLastError
CreateEventW
CreateThread
CreateFileA
FileTimeToSystemTime
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetFilePointer
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
FlushFileBuffers
SetStdHandle
InitializeCriticalSectionAndSpinCount
GetConsoleMode
GetConsoleCP
GetModuleHandleA
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
IsDebuggerPresent
UnhandledExceptionFilter
TerminateProcess
GetSystemTimeAsFileTime
QueryPerformanceCounter
HeapCreate
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetStartupInfoA
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetModuleFileNameW
GetModuleFileNameA
WriteFile
SetUnhandledExceptionFilter
ExitProcess
RtlUnwind
GetStartupInfoW
WaitForMultipleObjects
SystemTimeToTzSpecificLocalTime
CreateFileMappingW
MapViewOfFile
CreateMutexW
UnmapViewOfFile
GetCurrentProcessId
GetModuleHandleW
FormatMessageW
lstrlenW
LoadLibraryW
GetProcAddress
FreeLibrary
GetCurrentProcess
LocalAlloc
LocalFree
SetEndOfFile
GetVersionExW
SetEvent
CloseHandle
WaitForSingleObject
TerminateThread
DeleteCriticalSection
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
MultiByteToWideChar
FindResourceExW
FindResourceW
LoadResource
LockResource
SizeofResource
user32
SetClassLongW
DestroyIcon
KillTimer
EnableWindow
GetUpdateRect
IsCharAlphaNumericW
MoveWindow
BeginDeferWindowPos
DeferWindowPos
EndDeferWindowPos
GetMenuItemID
IsClipboardFormatAvailable
SetLayeredWindowAttributes
GetWindowTextLengthW
ShowWindow
BeginPaint
EndPaint
FillRect
GetClientRect
DefWindowProcW
SetWindowLongW
GetWindowLongW
DispatchMessageW
TranslateMessage
PeekMessageW
CreateDialogParamW
EnableMenuItem
GetWindowTextW
GetWindowInfo
ReleaseDC
GetDC
IsWindow
LoadImageW
MsgWaitForMultipleObjects
GetCursorPos
mouse_event
GetForegroundWindow
SetCursor
SetCursorPos
GetCursor
PostMessageW
GetSystemMetrics
SetWindowPos
MapWindowPoints
GetMonitorInfoW
MonitorFromWindow
GetWindowRect
GetWindow
GetParent
GetClassInfoExW
LoadCursorW
AdjustWindowRectEx
CreateWindowExW
SetWindowRgn
ScreenToClient
UpdateWindow
InvalidateRect
TrackMouseEvent
IsWindowVisible
CallWindowProcW
TrackPopupMenu
InsertMenuW
RegisterClassExW
GetDlgItem
SetWindowTextW
UnregisterClassA
DestroyWindow
CreatePopupMenu
GetMenuItemCount
GetMenuItemInfoW
FindWindowExW
GetWindowThreadProcessId
SetForegroundWindow
WaitForInputIdle
SendMessageW
GetClassNameW
advapi32
RegCloseKey
ConvertStringSecurityDescriptorToSecurityDescriptorW
DuplicateTokenEx
AllocateAndInitializeSid
GetLengthSid
SetTokenInformation
CreateProcessAsUserW
FreeSid
OpenProcessToken
GetTokenInformation
GetSidSubAuthority
RegCreateKeyExW
RegQueryValueExW
RegOpenKeyExW
RegDeleteKeyW
RegSetValueExW
RegDeleteValueW
ole32
CoTaskMemFree
CoTaskMemAlloc
CoCreateInstance
OleInitialize
CoUninitialize
OleUninitialize
CreateStreamOnHGlobal
OleRun
CoInitialize
shell32
SHGetFolderPathW
SHGetDesktopFolder
ShellExecuteW
SHGetSpecialFolderLocation
oleaut32
GetErrorInfo
BSTR_UserSize
BSTR_UserMarshal
BSTR_UserUnmarshal
BSTR_UserFree
SysAllocString
SysAllocStringLen
VariantClear
VariantInit
SysStringByteLen
SysAllocStringByteLen
SysFreeString
shlwapi
SHAutoComplete
gdi32
BitBlt
SelectObject
CreateCompatibleBitmap
CreateCompatibleDC
DeleteDC
CreateRoundRectRgn
GetCurrentObject
GetBkColor
GetDIBits
DeleteObject
CreateSolidBrush
wininet
InternetCloseHandle
HttpQueryInfoW
HttpSendRequestW
HttpOpenRequestW
InternetConnectW
InternetCrackUrlW
InternetOpenW
InternetSetCookieW
InternetGetCookieW
InternetReadFile
psapi
GetModuleFileNameExW
msimg32
AlphaBlend
winmm
timeEndPeriod
timeSetEvent
timeBeginPeriod
timeGetDevCaps
timeKillEvent
gdiplus
GdipCreateBitmapFromStream
GdipDeletePath
GdipCreatePath
GdipDeletePen
GdipCreatePen1
GdipCreateSolidFill
GdiplusShutdown
GdiplusStartup
GdipCreateBitmapFromStreamICM
GdipDeleteBrush
GdipCloneImage
GdipDrawImageRectI
GdipCreateFromHDC
GdipCreateBitmapFromFileICM
GdipCreateBitmapFromFile
GdipGetImageHeight
GdipGetImageWidth
GdipDisposeImage
GdipDeleteGraphics
GdipAlloc
GdipFree
GdipCreateBitmapFromHBITMAP
GdipSetPenWidth
GdipAddPathLineI
GdipAddPathArcI
GdipDrawLineI
GdipDrawPath
GdipDrawImageRectRect
GdipFillRectangleI
GdipCloneBrush
rpcrt4
NdrOleAllocate
NdrOleFree
IUnknown_QueryInterface_Proxy
IUnknown_AddRef_Proxy
IUnknown_Release_Proxy
NdrCStdStubBuffer2_Release
NdrStubCall2
NdrStubForwardingFunction
Sections
.text Size: 147KB - Virtual size: 147KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.orpc Size: 512B - Virtual size: 45B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 34KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 7KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 39KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.rorpc Size: 68KB - Virtual size: 68KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE