Static task
static1
Behavioral task
behavioral1
Sample
4b80fd7b89304d0852c947ce58c0f2b7526d61ab2b3ccbd741ba821720bfb7d8.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4b80fd7b89304d0852c947ce58c0f2b7526d61ab2b3ccbd741ba821720bfb7d8.exe
Resource
win10v2004-20220812-en
General
-
Target
4b80fd7b89304d0852c947ce58c0f2b7526d61ab2b3ccbd741ba821720bfb7d8
-
Size
640KB
-
MD5
688d513aa723cecbead6832420ad2280
-
SHA1
b52637626f2cccb192fdea4edf153a1c057cee84
-
SHA256
4b80fd7b89304d0852c947ce58c0f2b7526d61ab2b3ccbd741ba821720bfb7d8
-
SHA512
26468600e6c8f9e92b9d07a2bcd277e6af1d0085dd34be77ccb310fe7499d7e1b50489025596fe7026d5dcc20be5875d972451d10180d600ae22ac2aa1deb1f4
-
SSDEEP
12288:eT9WqAAnXQCzPQ84tgAJOyctWeAWWmXLXqs76ve7I+L:eTUygv6AJOyctXAW3R76v9
Malware Config
Signatures
Files
-
4b80fd7b89304d0852c947ce58c0f2b7526d61ab2b3ccbd741ba821720bfb7d8.exe windows x86
3151b0bb25a619bdd962cd4e37229157
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
powrprof
SetActivePwrScheme
CanUserWritePwrScheme
GetActivePwrScheme
ReadPwrScheme
kernel32
LCMapStringA
LCMapStringW
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
IsBadCodePtr
SetStdHandle
CompareStringA
CompareStringW
SetEnvironmentVariableA
GetTimeZoneInformation
InterlockedExchange
GetACP
MulDiv
FreeLibrary
GetProcAddress
LoadLibraryA
HeapAlloc
GetProcessHeap
HeapFree
GetModuleHandleA
GetVersionExA
GetVolumeInformationA
GetTickCount
DeviceIoControl
GetLastError
SetFilePointer
ReadFile
CloseHandle
OutputDebugStringA
QueryPerformanceCounter
QueryPerformanceFrequency
GetModuleFileNameA
CreateFileA
GetDriveTypeA
GetLogicalDrives
GetDiskFreeSpaceA
GlobalFree
GlobalReAlloc
GlobalAlloc
GlobalUnlock
GlobalLock
GetShortPathNameA
lstrcpyA
GlobalDeleteAtom
GlobalFindAtomA
GlobalAddAtomA
lstrcmpiA
HeapSize
HeapReAlloc
TerminateProcess
ExitThread
CreateThread
RaiseException
ExitProcess
GetCommandLineA
GetStartupInfoA
IsBadReadPtr
RtlUnwind
SetErrorMode
GetFileTime
GetFileSize
GetFileAttributesA
GetCurrentDirectoryA
WritePrivateProfileStringA
FileTimeToLocalFileTime
FileTimeToSystemTime
SizeofResource
GetOEMCP
GetCPInfo
GetProcessVersion
GlobalFlags
TlsGetValue
LocalReAlloc
TlsSetValue
EnterCriticalSection
LeaveCriticalSection
TlsFree
GlobalHandle
DeleteCriticalSection
TlsAlloc
InitializeCriticalSection
LocalAlloc
GetThreadLocale
GetFullPathNameA
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
WriteFile
GetCurrentProcess
DuplicateHandle
lstrcmpA
GetCurrentThread
FormatMessageA
LocalFree
FindNextFileA
FindFirstFileA
FindClose
lstrcpynA
CreateEventA
SuspendThread
SetThreadPriority
ResumeThread
SetEvent
WaitForSingleObject
MultiByteToWideChar
WideCharToMultiByte
lstrlenA
InterlockedDecrement
InterlockedIncrement
VirtualProtect
SetLastError
FindResourceA
LoadResource
LockResource
GetVersion
lstrcatA
GetCurrentThreadId
GlobalGetAtomNameA
GetProfileStringA
user32
RegisterClipboardFormatA
PostThreadMessageA
GetDesktopWindow
GetClassNameA
CharUpperA
DestroyMenu
SetWindowContextHelpId
PostQuitMessage
LoadStringA
GetMessageA
ValidateRect
wvsprintfA
EndDialog
CreateDialogIndirectParamA
MapDialogRect
GetAsyncKeyState
GrayStringA
DrawTextA
TabbedTextOutA
EndPaint
BeginPaint
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetNextDlgTabItem
IsWindowEnabled
MoveWindow
SetWindowTextA
IsDialogMessageA
CheckRadioButton
PostMessageA
SendDlgItemMessageA
MapWindowPoints
GetFocus
SetActiveWindow
SetFocus
AdjustWindowRectEx
GetTopWindow
MessageBoxA
IsChild
WinHelpA
wsprintfA
GetClassInfoA
RegisterClassA
GetMenu
GetMenuItemCount
GetMenuItemID
GetDlgItem
GetWindowTextLengthA
GetWindowTextA
GetDlgCtrlID
DefWindowProcA
DestroyWindow
CreateWindowExA
SetWindowsHookExA
CallNextHookEx
GetClassLongA
UnhookWindowsHookEx
RemovePropA
GetMessageTime
GetMessagePos
GetLastActivePopup
GetForegroundWindow
GetSysColor
UnregisterClassA
HideCaret
ShowCaret
ExcludeUpdateRgn
DefDlgProcA
IsWindowUnicode
GetClientRect
EnableWindow
RegisterWindowMessageA
IntersectRect
SystemParametersInfoA
GetWindowPlacement
IsWindowVisible
ShowWindow
GetWindow
GetSysColorBrush
IsWindow
GetKeyState
UpdateWindow
LoadMenuA
GetSubMenu
MessageBeep
GetNextDlgGroupItem
SetRect
CopyAcceleratorTableA
CharNextA
ScreenToClient
SetMenuDefaultItem
GetCursorPos
TrackPopupMenu
BringWindowToTop
SetForegroundWindow
CreateIconIndirect
IsIconic
DrawIcon
GetSystemMenu
AppendMenuA
LoadIconA
LoadCursorA
IsRectEmpty
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
GetDC
MsgWaitForMultipleObjects
DispatchMessageA
PeekMessageA
SendMessageA
SetTimer
KillTimer
InvalidateRect
DestroyCursor
DestroyIcon
RedrawWindow
GetIconInfo
LoadImageA
ReleaseCapture
WindowFromPoint
ClientToScreen
SetCapture
GetCapture
GetParent
GetActiveWindow
DrawFocusRect
DrawStateA
OffsetRect
FillRect
InflateRect
FrameRect
CopyRect
GetWindowLongA
SetCursor
GetWindowRect
ReleaseDC
DrawIconEx
DrawFrameControl
GetWindowDC
CallWindowProcA
GetSystemMetrics
SetWindowLongA
SetPropA
GetPropA
TranslateMessage
SetWindowPos
PtInRect
gdi32
SaveDC
RestoreDC
SelectPalette
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
IntersectClipRect
GetViewportExtEx
GetWindowExtEx
CreatePen
CreateHatchBrush
PtVisible
RectVisible
ExtTextOutA
Escape
GetMapMode
PatBlt
DPtoLP
GetTextColor
GetBkColor
LPtoDP
DeleteDC
SetTextColor
GetClipBox
GetPixel
GetCurrentObject
CreateSolidBrush
CreateDIBSection
CreateBitmap
SetPixel
GetSystemPaletteEntries
CreatePalette
RealizePalette
GetDIBits
GetObjectA
CreateRectRgnIndirect
CombineRgn
BitBlt
CreateCompatibleDC
CreateCompatibleBitmap
DeleteObject
GetDeviceCaps
SetBkMode
CreateFontIndirectA
SelectObject
GetTextExtentPoint32A
SetBkColor
Rectangle
GetStockObject
SetTextAlign
TextOutA
MoveToEx
CreateDIBitmap
LineTo
GetTextExtentPointA
comdlg32
GetFileTitleA
GetOpenFileNameA
GetSaveFileNameA
ChooseColorA
winspool.drv
OpenPrinterA
ClosePrinter
DocumentPropertiesA
advapi32
RegCloseKey
RegOpenKeyExA
RegSetValueExA
RegCreateKeyExA
RegDeleteValueA
RegQueryValueExA
shell32
Shell_NotifyIconA
ShellExecuteA
SHGetFileInfoA
comctl32
ImageList_Remove
ImageList_GetIcon
ImageList_GetImageCount
PropertySheetA
ImageList_Draw
ImageList_ReplaceIcon
ord17
DestroyPropertySheetPage
CreatePropertySheetPageA
ImageList_Destroy
ImageList_Create
ImageList_LoadImageA
ImageList_GetImageInfo
oledlg
ord8
ole32
CoFreeUnusedLibraries
OleUninitialize
CoTaskMemAlloc
CoTaskMemFree
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoGetClassObject
CLSIDFromString
CLSIDFromProgID
CoRegisterMessageFilter
CoRevokeClassObject
OleFlushClipboard
OleIsCurrentClipboard
OleInitialize
olepro32
ord253
oleaut32
SysFreeString
SysAllocStringLen
VariantClear
VariantTimeToSystemTime
VariantCopy
VariantChangeType
SysAllocString
SysAllocStringByteLen
SysStringLen
Sections
.text Size: 264KB - Virtual size: 261KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 64KB - Virtual size: 60KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 44KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tc Size: 248KB - Virtual size: 248KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE