Static task
static1
Behavioral task
behavioral1
Sample
79de251a575f7a23df2f798d3addf67d1600ca515f0b2b3764f884f16a1c76b9.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
79de251a575f7a23df2f798d3addf67d1600ca515f0b2b3764f884f16a1c76b9.exe
Resource
win10v2004-20220812-en
General
-
Target
79de251a575f7a23df2f798d3addf67d1600ca515f0b2b3764f884f16a1c76b9
-
Size
804KB
-
MD5
6be39c4612e5b1faadbc3566f7e1fab2
-
SHA1
2cf0940e9d629a467007eda2c410621a128273ae
-
SHA256
79de251a575f7a23df2f798d3addf67d1600ca515f0b2b3764f884f16a1c76b9
-
SHA512
591eed060f6b696f99f24f92ee6a36b76c33214711953b2583821563385144ebc0b5bf3b22c6c67911352e78cf5cc1580f6cc6dc4068f5f86c8b82323cc36e91
-
SSDEEP
24576:8CQDCQFAaBn8/0+HQnkrHY4Nd+kmbN+LL:4caRF6Qn6H1dU
Malware Config
Signatures
Files
-
79de251a575f7a23df2f798d3addf67d1600ca515f0b2b3764f884f16a1c76b9.exe windows x86
08581b40430265cdb8e929f2c4016500
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
ImageList_SetFlags
ImageList_DragEnter
DrawInsert
ImageList_EndDrag
ImageList_SetDragCursorImage
ImageList_SetImageCount
ImageList_SetOverlayImage
ImageList_DragShowNolock
InitCommonControlsEx
ImageList_GetImageInfo
ImageList_SetFilter
CreateStatusWindowA
CreateUpDownControl
ImageList_ReplaceIcon
ImageList_Remove
ImageList_GetFlags
DestroyPropertySheetPage
ImageList_Write
ImageList_DragMove
CreatePropertySheetPageA
ImageList_GetBkColor
user32
ModifyMenuW
DrawTextW
ChildWindowFromPoint
EndDeferWindowPos
EnumWindowStationsW
LoadMenuW
IsCharLowerA
CheckRadioButton
TrackPopupMenu
RegisterWindowMessageA
CheckDlgButton
CreateWindowStationW
CreateWindowStationA
GetWindowTextA
CharNextExA
UnregisterDeviceNotification
InsertMenuItemA
InvalidateRect
AttachThreadInput
GetClassInfoExA
GetMessageExtraInfo
LoadStringW
OpenDesktopW
GetMenuContextHelpId
ReplyMessage
UnhookWindowsHookEx
SetWindowTextW
SendMessageA
GetMenuItemID
ScrollWindowEx
PostThreadMessageW
DefDlgProcA
GetDlgCtrlID
OemToCharBuffW
SendIMEMessageExA
SetActiveWindow
GetClassWord
wsprintfA
GetUpdateRgn
RegisterClassExA
CreateDialogIndirectParamA
GetClipboardViewer
GetMenuState
DrawCaption
IsCharLowerW
CloseWindowStation
SendNotifyMessageW
EndMenu
GetCursorInfo
GetMonitorInfoW
GetComboBoxInfo
ExitWindowsEx
DefMDIChildProcW
LoadCursorFromFileW
GetMenuItemInfoA
GetTabbedTextExtentW
SetCursorPos
EqualRect
GetMenuStringA
DlgDirSelectComboBoxExW
GrayStringW
DdeAbandonTransaction
MonitorFromPoint
CharNextW
SetMenuItemInfoW
CallNextHookEx
BeginDeferWindowPos
DdeImpersonateClient
SetWindowContextHelpId
ChangeClipboardChain
RegisterClassA
MenuItemFromPoint
CheckMenuItem
VkKeyScanExW
InflateRect
GetSystemMenu
CopyIcon
IsCharAlphaA
AppendMenuW
SetMenuContextHelpId
GetWindowWord
GetDCEx
GetSystemMetrics
UnpackDDElParam
PostMessageW
MoveWindow
IsWindowVisible
DefFrameProcA
OpenIcon
TranslateAccelerator
CharLowerW
DefWindowProcW
RegisterWindowMessageW
AdjustWindowRectEx
GetIconInfo
WINNLSGetEnableStatus
EnableScrollBar
ImpersonateDdeClientWindow
EndTask
GetDlgItemTextA
kernel32
GetModuleFileNameA
GetTempPathW
ContinueDebugEvent
GetProcessHeaps
HeapFree
MoveFileA
IsBadWritePtr
GetCurrentProcessId
CreateFileMappingA
GetVersion
GetStringTypeExW
TerminateProcess
GlobalFindAtomW
IsBadReadPtr
SetThreadContext
GetProcessHeap
lstrcat
LCMapStringA
GetTimeFormatA
HeapAlloc
GetTimeZoneInformation
SetConsoleCtrlHandler
GetStartupInfoA
HeapValidate
SetLocalTime
GetThreadLocale
MultiByteToWideChar
FoldStringW
GetExitCodeThread
GetEnvironmentStrings
GetSystemTimeAdjustment
GetTickCount
OutputDebugStringA
GetUserDefaultLCID
EnterCriticalSection
ResetEvent
RtlZeroMemory
SetFileAttributesW
TlsFree
TlsAlloc
SetStdHandle
CreateProcessA
LeaveCriticalSection
CompareStringA
GetNamedPipeInfo
CreateToolhelp32Snapshot
FreeEnvironmentStringsA
GetSystemTime
lstrcatA
WriteProfileSectionA
QueryPerformanceCounter
GlobalFlags
LockFileEx
FlushFileBuffers
SetHandleCount
CreateProcessW
VirtualAlloc
DeleteCriticalSection
SetEnvironmentVariableW
SetEnvironmentVariableA
GetCurrentThread
InterlockedIncrement
CreateMailslotA
VirtualQuery
ReadFile
GetLogicalDriveStringsW
FindResourceA
GetVersionExA
DeleteFileA
CreateFileW
WriteFile
GetFileType
GetACP
lstrcpyA
WideCharToMultiByte
ExitProcess
GetLastError
GetProcAddress
TlsGetValue
InitializeCriticalSection
OpenMutexA
OutputDebugStringW
LoadLibraryA
SetComputerNameA
RemoveDirectoryW
GetPrivateProfileIntW
GetCompressedFileSizeW
GetStringTypeA
lstrcpynA
GetCurrentProcess
GetCPInfo
OpenSemaphoreA
GetFileAttributesW
GetEnvironmentStringsW
CopyFileA
HeapReAlloc
VirtualFree
GetSystemTimeAsFileTime
HeapDestroy
TryEnterCriticalSection
InterlockedDecrement
ExpandEnvironmentStringsW
CreateMutexA
GetConsoleCursorInfo
GetDriveTypeW
RtlUnwind
DebugBreak
GetFileAttributesA
CompareFileTime
UnhandledExceptionFilter
SetLastError
SetTimeZoneInformation
GetCurrentThreadId
CreateDirectoryW
CloseHandle
GetWindowsDirectoryW
LCMapStringW
GetLocaleInfoA
GetOEMCP
GetEnvironmentVariableW
AddAtomW
FreeEnvironmentStringsW
ReadConsoleInputW
GetStringTypeW
GetLocalTime
TlsSetValue
GetModuleHandleA
SetFilePointer
MoveFileW
GetStdHandle
OpenWaitableTimerW
HeapCreate
InterlockedExchange
GetCommandLineA
FindNextFileW
Sleep
lstrcpy
CompareStringW
GlobalUnfix
Sections
.text Size: 232KB - Virtual size: 228KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 408KB - Virtual size: 407KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 136KB - Virtual size: 135KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ