Static task
static1
Behavioral task
behavioral1
Sample
cf22a085a9156f7fe1483c691702f8af048635cf3ce25436c3c7415e051ac478.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
cf22a085a9156f7fe1483c691702f8af048635cf3ce25436c3c7415e051ac478.exe
Resource
win10v2004-20220812-en
General
-
Target
cf22a085a9156f7fe1483c691702f8af048635cf3ce25436c3c7415e051ac478
-
Size
1.1MB
-
MD5
60c0f9bf35ef4521c198b8cce89a39d4
-
SHA1
52497cbd8830c4fcec97337ace3bb9838bed8a23
-
SHA256
cf22a085a9156f7fe1483c691702f8af048635cf3ce25436c3c7415e051ac478
-
SHA512
b3249e8dafbb96c9372822b5ac174db179398600a761c3933cb438e7d7c71cc441ff4722ea6e8b41ffb463360135ef82a81418f68f34a867030fe6d89b1afa8c
-
SSDEEP
12288:K5KgjMNvmhLyHX3amQfeDr1doLNDHs3vYXyxWpSOzVbtPDUH/MW/Wm7MDgTuaZx8:ClAvRTiNDcYXOWEOphIJt7kgqSM
Malware Config
Signatures
Files
-
cf22a085a9156f7fe1483c691702f8af048635cf3ce25436c3c7415e051ac478.exe windows x86
34515381b7217fa1c2cf5170a9a6e02b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
winmm
timeGetTime
kernel32
VirtualAlloc
GetCommandLineA
GetProcessHeap
GetStartupInfoA
RaiseException
ExitProcess
HeapSize
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetACP
VirtualFree
HeapDestroy
HeapCreate
GetStdHandle
GetConsoleCP
GetConsoleMode
SetHandleCount
GetFileType
FreeEnvironmentStringsA
HeapReAlloc
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetTickCount
GetSystemTimeAsFileTime
SetStdHandle
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
HeapFree
HeapAlloc
RtlUnwind
SetErrorMode
SetEndOfFile
FlushFileBuffers
WritePrivateProfileStringA
GetThreadLocale
GetOEMCP
GetCPInfo
GlobalFlags
TlsFree
GetSystemDirectoryA
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
InterlockedIncrement
GetCurrentProcessId
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
lstrcmpA
FreeResource
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
lstrcmpW
InterlockedDecrement
GetModuleFileNameW
SetLastError
GlobalLock
GlobalUnlock
FormatMessageA
LocalFree
MulDiv
QueryPerformanceCounter
QueryPerformanceFrequency
GetSystemInfo
GetProcessAffinityMask
SetFilePointer
ReadFile
DeleteFileA
GetComputerNameA
DeviceIoControl
ReleaseMutex
CreateMutexA
GetCurrentProcess
GetModuleHandleA
GetModuleFileNameA
GetProcAddress
GlobalMemoryStatus
CreateFileA
WriteFile
CreateThread
SetThreadPriority
Sleep
ExitThread
WaitForSingleObject
CloseHandle
GlobalAlloc
GlobalReAlloc
GlobalFree
GlobalSize
lstrcmpiA
CompareStringA
GetVersion
GetLastError
MultiByteToWideChar
InterlockedExchange
GetWindowsDirectoryA
LoadLibraryA
FreeLibrary
lstrcatA
lstrlenA
WinExec
lstrcpyA
GetVersionExA
GetTempPathA
GetCurrentDirectoryA
SetCurrentDirectoryA
WideCharToMultiByte
FindResourceA
LoadResource
LockResource
SizeofResource
GetEnvironmentStrings
user32
DestroyMenu
UnregisterClassA
GetSysColorBrush
WindowFromPoint
GetWindowThreadProcessId
PostQuitMessage
GetMessageA
TranslateMessage
GetCursorPos
ValidateRect
GetDesktopWindow
CreateDialogIndirectParamA
GetNextDlgTabItem
EndDialog
GetActiveWindow
IsWindowEnabled
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
SetDlgItemTextA
SetDlgItemInt
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
ModifyMenuA
EnableMenuItem
CheckMenuItem
RegisterWindowMessageA
SendDlgItemMessageA
WinHelpA
GetCapture
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassNameA
SetPropA
GetFocus
SetFocus
GetWindowTextLengthA
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
SetActiveWindow
DispatchMessageA
GetDlgItem
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
PeekMessageA
GetKeyState
SetForegroundWindow
IsWindowVisible
UpdateWindow
GetMenu
PostMessageA
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
CopyRect
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
GetWindowLongA
SetWindowPos
SystemParametersInfoA
GetWindowPlacement
GetWindow
EndPaint
BeginPaint
ClientToScreen
ScreenToClient
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
GetPropA
UnhookWindowsHookEx
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
EmptyClipboard
SetClipboardData
CloseClipboard
SetWindowLongA
LoadCursorA
CopyIcon
MessageBeep
IsWindow
ReleaseCapture
GetParent
SetCapture
RedrawWindow
InvalidateRect
ReleaseDC
GetDC
InflateRect
PtInRect
SetCursor
GetSysColor
LoadIconA
KillTimer
SetTimer
IsIconic
DrawIcon
OffsetRect
MessageBoxA
GetSystemMetrics
GetWindowDC
EnableWindow
OpenClipboard
GetClientRect
GetWindowRect
SendMessageA
LoadBitmapA
MapWindowPoints
RemovePropA
gdi32
DeleteDC
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
DeleteObject
CreateBitmap
GetObjectA
GetClipBox
SetMapMode
SetTextColor
SetBkMode
SetBkColor
RestoreDC
SaveDC
GetSystemPaletteEntries
SelectPalette
RealizePalette
GetDIBits
GetDeviceCaps
CreatePalette
CreateFontIndirectA
GetStockObject
CreateFontA
GetTextExtentPoint32A
GetPixel
BitBlt
CreateCompatibleDC
CreateCompatibleBitmap
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
advapi32
RevertToSelf
AccessCheck
IsValidSecurityDescriptor
SetSecurityDescriptorOwner
SetSecurityDescriptorGroup
SetSecurityDescriptorDacl
AddAccessAllowedAce
InitializeAcl
GetLengthSid
RegSetValueExA
RegCreateKeyExA
RegEnumKeyA
RegDeleteKeyA
RegQueryValueExA
RegOpenKeyA
OpenSCManagerA
ControlService
StartServiceA
OpenServiceA
DeleteService
CreateServiceA
CloseServiceHandle
RegOpenKeyExA
RegQueryValueA
RegCloseKey
InitializeSecurityDescriptor
FreeSid
AllocateAndInitializeSid
OpenProcessToken
OpenThreadToken
ImpersonateSelf
shell32
ShellExecuteA
shlwapi
PathFindFileNameA
PathFindExtensionA
ole32
CoCreateInstance
CoUninitialize
CoInitialize
CoInitializeEx
oleaut32
VariantClear
VariantChangeType
VariantInit
SysStringLen
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
Sections
.text Size: 452KB - Virtual size: 450KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 104KB - Virtual size: 101KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 324KB - Virtual size: 320KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
�(Z Size: 236KB - Virtual size: 236KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE