Static task
static1
Behavioral task
behavioral1
Sample
94eed317c3e652c0f234e83a124cceae436c66534452c719a84d3e470980cf70.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
94eed317c3e652c0f234e83a124cceae436c66534452c719a84d3e470980cf70.exe
Resource
win10v2004-20220812-en
General
-
Target
94eed317c3e652c0f234e83a124cceae436c66534452c719a84d3e470980cf70
-
Size
1008KB
-
MD5
7b99d6a7a31553cba5b2d41e2e66a180
-
SHA1
8b88927eb171be40e078b71d8b3ec0ce8c0fedf9
-
SHA256
94eed317c3e652c0f234e83a124cceae436c66534452c719a84d3e470980cf70
-
SHA512
5a7b1f7d1d26b982ae54a9d4113a0e813fe94d254ad9fcf686745c00864b732c4e36fa044c6eb6505f150b7dc500e20750f4cfd5dd630f24ddd744e2fd3bce1b
-
SSDEEP
24576:gjmqIdiK3JoSNdM1OMDl9smjyWJw525RGdfzzh1N6j4H5C:gmqPMM17h9F9q25RwPNQy5
Malware Config
Signatures
Files
-
94eed317c3e652c0f234e83a124cceae436c66534452c719a84d3e470980cf70.exe windows x86
443d64a3ea4f74b9ce0ef1988a38cc73
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ole32
OleInitialize
OleUninitialize
CoInitialize
CoCreateInstance
CoUninitialize
CoCreateGuid
shlwapi
SHDeleteKeyA
PathFileExistsA
wininet
InternetCanonicalizeUrlA
InternetReadFile
InternetGetLastResponseInfoA
InternetCrackUrlA
HttpOpenRequestA
HttpSendRequestA
HttpQueryInfoA
InternetTimeToSystemTime
InternetSetOptionA
InternetGetConnectedState
InternetConnectA
InternetOpenUrlA
InternetCloseHandle
InternetOpenA
user32
GetAsyncKeyState
SendDlgItemMessageA
GetClientRect
FillRect
GetDlgItemTextA
GetClassInfoExA
LoadCursorA
RegisterClassExA
GetSystemMetrics
CreateWindowExA
SetWindowLongA
UpdateWindow
CharUpperA
CharLowerA
CharNextA
GetClassNameA
SetTimer
RedrawWindow
GetMessageA
TranslateMessage
DispatchMessageA
DialogBoxParamA
SetWindowRgn
DestroyWindow
CharPrevA
GetWindowTextA
EnableWindow
GetWindowLongA
ClientToScreen
GetFocus
DefWindowProcA
GetForegroundWindow
GetCursorPos
PtInRect
InvalidateRect
BeginPaint
EndPaint
SetWindowTextA
LoadIconA
SendMessageA
GetSystemMenu
EnableMenuItem
SetDlgItemTextA
GetDlgItem
SetForegroundWindow
SetActiveWindow
SetFocus
ShowWindow
GetWindowRect
ScreenToClient
SetWindowPos
EndDialog
LoadStringA
GetDC
ReleaseDC
DrawTextW
MessageBoxA
EnumWindows
oleaut32
SysFreeString
VariantInit
VariantClear
SysAllocStringLen
SysAllocString
SysStringLen
gdi32
CreatePatternBrush
GetDeviceCaps
CreateBitmap
GetObjectA
BitBlt
StretchBlt
SetBkMode
CombineRgn
CreateCompatibleDC
SelectObject
DeleteDC
GetTextExtentPointW
CreateFontW
DeleteObject
GetPixel
CreateRectRgn
TextOutW
GetTextExtentPoint32A
SetPixel
GetStockObject
SetTextColor
advapi32
ConvertSidToStringSidA
IsValidSid
GetLengthSid
InitializeAcl
AddAccessDeniedAce
AddAccessAllowedAce
RegOpenKeyA
InitializeSecurityDescriptor
RegSetValueA
RegQueryValueExA
OpenProcessToken
GetTokenInformation
EqualSid
RegQueryValueA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
RegOpenKeyExA
RegDeleteValueA
FreeSid
GetUserNameA
SetSecurityDescriptorOwner
SetSecurityDescriptorDacl
LookupAccountNameA
AllocateAndInitializeSid
shell32
SHGetSpecialFolderPathA
SHGetFolderPathW
ShellExecuteExA
version
GetFileVersionInfoSizeA
VerQueryValueA
GetFileVersionInfoA
msimg32
TransparentBlt
kernel32
RtlUnwind
TerminateProcess
DeleteCriticalSection
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
GetProcessHeap
HeapSize
HeapReAlloc
HeapFree
HeapAlloc
UnhandledExceptionFilter
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
GetCurrentDirectoryA
GetSystemInfo
GetFileAttributesA
GetDriveTypeA
GetTempPathA
GetTempFileNameA
InterlockedDecrement
InterlockedIncrement
SetUnhandledExceptionFilter
IsDebuggerPresent
GetConsoleCP
GetConsoleMode
FileTimeToLocalFileTime
GetModuleHandleW
ExitProcess
GetCommandLineA
GetStartupInfoA
GetFileType
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
SetEnvironmentVariableA
GetFullPathNameA
SetEndOfFile
GetTimeZoneInformation
VirtualFree
HeapCreate
VirtualAlloc
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
SetHandleCount
GetStdHandle
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEnvironmentVariableW
InitializeCriticalSectionAndSpinCount
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetCurrentProcessId
GetStringTypeA
GetStringTypeW
FlushFileBuffers
LCMapStringA
LCMapStringW
CompareStringA
HeapDestroy
CreateMutexA
FreeResource
CopyFileA
GetLocaleInfoA
GetSystemTime
GetSystemTimeAsFileTime
GetFileSizeEx
RaiseException
GetLastError
lstrcpyA
lstrlenA
CloseHandle
CompareStringW
OpenMutexA
ReadFile
PeekNamedPipe
WriteFile
ConnectNamedPipe
CreateNamedPipeA
Process32Next
OpenProcess
Process32First
CreateToolhelp32Snapshot
GetVersionExA
FreeLibrary
GetProcAddress
LoadLibraryA
WideCharToMultiByte
RemoveDirectoryA
FindClose
DeleteFileA
FindNextFileA
FindFirstFileA
GetModuleFileNameA
GetDiskFreeSpaceA
GetDiskFreeSpaceExA
GetCurrentProcess
GetModuleHandleA
ExpandEnvironmentStringsA
MultiByteToWideChar
GetFileSize
CreateFileA
Sleep
CreateDirectoryA
GetPrivateProfileStringA
WritePrivateProfileStringA
LocalFree
CompareFileTime
SystemTimeToFileTime
GetFileTime
GetTickCount
SizeofResource
LockResource
LoadResource
FindResourceA
FindResourceExA
SetFileAttributesA
SetFilePointer
FileTimeToSystemTime
GetFileInformationByHandle
rpcrt4
UuidToStringA
RpcStringFreeA
crypt32
CertFreeCertificateContext
CertFindCertificateInStore
CryptMsgGetParam
CryptQueryObject
CryptMsgClose
CertCloseStore
CertGetNameStringW
Sections
.text Size: 355KB - Virtual size: 355KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 49KB - Virtual size: 49KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 102KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 592KB - Virtual size: 2.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE