Static task
static1
Behavioral task
behavioral1
Sample
d7df73ed35913f65ce930815012f6ac12bf45676692741137f4e0994878f6606.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d7df73ed35913f65ce930815012f6ac12bf45676692741137f4e0994878f6606.exe
Resource
win10v2004-20220901-en
General
-
Target
d7df73ed35913f65ce930815012f6ac12bf45676692741137f4e0994878f6606
-
Size
1.9MB
-
MD5
038db6acebb16d07926c1fe291d284c0
-
SHA1
5caf1313dc29088390b6a795a3b5804bb678c520
-
SHA256
d7df73ed35913f65ce930815012f6ac12bf45676692741137f4e0994878f6606
-
SHA512
af496d3d015f719ef2ee58c4f9f65b6ac29bb4ff017841bc6130a88acfb7d30d2a23ed81fc5db1d376c47622e889965f9d3c0a6bafdc0069c66cf123fd92526b
-
SSDEEP
24576:v6p4Z3MyM/tDUxZV7GhFPhOxunpBPtj0I2+Mim2opSWgeTualyIT9HlRz0VeAvf2:v7OHVqV6hFJS4pLj4gopSWrTRsVeI74
Malware Config
Signatures
Files
-
d7df73ed35913f65ce930815012f6ac12bf45676692741137f4e0994878f6606.exe windows x86
ab4ef6e87e62a5cdf5427c1782534f85
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
version
VerQueryValueW
wininet
InternetSetOptionW
HttpOpenRequestW
InternetCloseHandle
kernel32
GetFileSize
GetFileSizeEx
WriteFile
ReadFile
FlushFileBuffers
SetEndOfFile
SetFilePointer
FindClose
GetSystemTimeAsFileTime
CreateDirectoryW
GetFileAttributesW
FindFirstFileW
WaitForSingleObject
CreateMutexW
OpenMutexW
LocalFree
GetCurrentProcess
InitializeCriticalSection
DeleteCriticalSection
LoadLibraryA
FreeLibrary
TerminateProcess
GetVersion
LockFile
UnlockFile
LockFileEx
GetSystemTime
TlsAlloc
TlsGetValue
TlsSetValue
GetTempPathA
GetFullPathNameA
GetFullPathNameW
CreateFileA
GetFileAttributesA
DeleteFileA
DeleteFileW
AreFileApisANSI
InterlockedIncrement
InterlockedDecrement
GlobalAlloc
GlobalLock
GlobalUnlock
FlushInstructionCache
RaiseException
GetCurrentThreadId
GetExitCodeThread
MulDiv
lstrcmpW
FileTimeToSystemTime
DosDateTimeToFileTime
WritePrivateProfileStringW
OpenThread
WritePrivateProfileSectionW
CopyFileW
GlobalHandle
GlobalFree
lstrcmpiW
LoadLibraryExW
GetSystemDirectoryW
LeaveCriticalSection
GetComputerNameW
GetStdHandle
QueryPerformanceCounter
GlobalMemoryStatus
GetVersionExA
FlushConsoleInputBuffer
UnhandledExceptionFilter
SetConsoleMode
ReadConsoleInputA
GetConsoleMode
SetConsoleCtrlHandler
GetCommandLineW
ExitThread
CreateThread
GetModuleHandleExW
ExitProcess
IsDebuggerPresent
GetCPInfo
RtlUnwind
EncodePointer
GetStringTypeW
DecodePointer
VirtualFree
VirtualAlloc
IsProcessorFeaturePresent
InterlockedPushEntrySList
InterlockedPopEntrySList
InitializeSListHead
InterlockedCompareExchange
HeapSize
CompareStringW
HeapReAlloc
HeapDestroy
EnterCriticalSection
Process32NextW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
IsValidCodePage
GetACP
GetOEMCP
GetConsoleCP
SetFilePointerEx
GetEnvironmentStringsW
FreeEnvironmentStringsW
ReadConsoleW
SetStdHandle
OutputDebugStringW
WideCharToMultiByte
MultiByteToWideChar
GetDiskFreeSpaceW
GetTempPathW
FindResourceExW
FindResourceW
GetModuleHandleW
GetModuleFileNameW
LoadLibraryW
GetMailslotInfo
PeekNamedPipe
GetTickCount
GetTimeZoneInformation
CloseHandle
GetFileType
Process32FirstW
CreateToolhelp32Snapshot
GetVersionExW
GetModuleHandleA
SetLastError
GetCurrentProcessId
GetProcessHeap
HeapFree
HeapAlloc
FindNextFileW
GetVolumeInformationW
CreateFileW
SizeofResource
LoadResource
Sleep
GetLastError
OpenProcess
GetProcAddress
LockResource
InitializeCriticalSectionAndSpinCount
WriteConsoleW
SetEnvironmentVariableA
SetUnhandledExceptionFilter
TlsFree
GetStartupInfoW
GetPrivateProfileSectionW
user32
RedrawWindow
InvalidateRgn
InvalidateRect
EndPaint
BeginPaint
ReleaseDC
GetDC
DestroyAcceleratorTable
CreateAcceleratorTableW
SetTimer
ScreenToClient
SetWindowTextW
GetWindowTextLengthW
GetSysColor
FillRect
GetWindowLongW
SetWindowLongW
GetClassNameW
GetWindow
LoadCursorW
MapDialogRect
DialogBoxIndirectParamW
ReleaseCapture
SetCapture
GetClientRect
SetWindowContextHelpId
ClientToScreen
GetFocus
CharNextW
GetDlgItem
EndDialog
SetWindowPos
MoveWindow
DestroyWindow
IsChild
IsWindow
CreateWindowExW
GetClassInfoExW
RegisterClassExW
CallWindowProcW
DefWindowProcW
RegisterWindowMessageW
EnumWindows
GetWindowThreadProcessId
GetParent
GetDesktopWindow
GetWindowTextW
SetFocus
PostMessageW
SendMessageW
UnregisterClassW
GetActiveWindow
GetUserObjectInformationW
GetProcessWindowStation
MessageBoxA
SendDlgItemMessageW
gdi32
GetObjectW
SelectObject
GetStockObject
GetDeviceCaps
DeleteDC
CreateSolidBrush
CreateCompatibleDC
CreateCompatibleBitmap
BitBlt
DeleteObject
advapi32
RegDeleteValueW
AdjustTokenPrivileges
RegSetValueW
LookupAccountSidW
GetTokenInformation
RegSetValueExW
RegQueryValueExW
RegOpenKeyExW
RegEnumValueW
RegEnumKeyExW
RegDeleteKeyW
RegCreateKeyExW
RegCloseKey
RegQueryInfoKeyW
CryptAcquireContextW
CryptReleaseContext
CryptDestroyKey
CryptImportKey
LookupAccountNameW
ConvertSidToStringSidW
CryptGetHashParam
CryptCreateHash
CryptHashData
CryptDestroyHash
DeregisterEventSource
ReportEventA
RegisterEventSourceA
LookupPrivilegeValueW
ole32
StringFromGUID2
CLSIDFromProgID
CLSIDFromString
CoGetClassObject
CoTaskMemAlloc
CoCreateInstance
CoUninitialize
CoInitialize
OleInitialize
OleUninitialize
OleLockRunning
CoTaskMemRealloc
CreateStreamOnHGlobal
CoTaskMemFree
oleaut32
VarUI4FromStr
OleCreateFontIndirect
LoadRegTypeLi
LoadTypeLi
VariantClear
VariantInit
SysStringLen
SysAllocStringLen
SysAllocString
SysFreeString
comctl32
InitCommonControlsEx
psapi
GetProcessImageFileNameW
EnumProcesses
Sections
.text Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 305KB - Virtual size: 305KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 27KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 381KB - Virtual size: 381KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.text Size: 102KB - Virtual size: 104KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE