Static task
static1
Behavioral task
behavioral1
Sample
a98dbbd996d340fb588460454dd8a7bc5f5e57f7c50ea683f358e7c4c9734071.exe
Resource
win7-20220812-en
General
-
Target
a98dbbd996d340fb588460454dd8a7bc5f5e57f7c50ea683f358e7c4c9734071
-
Size
521KB
-
MD5
6559723079bec6a8111d419217c8be48
-
SHA1
39bcedfc284accb2eb19ffdc6a78619621fbc171
-
SHA256
a98dbbd996d340fb588460454dd8a7bc5f5e57f7c50ea683f358e7c4c9734071
-
SHA512
e4924197fd6140fa0fd83b1ec1f6e363aeb4c215c7a309d586fd829cae1825ad812e36c94e4b70a20af23bb53f95d21c1224910d2da52ce64f67410a9d6af714
-
SSDEEP
12288:LF0133h1eGtgCyRdFLYR86kTsDqIE7I3Xco8:233lULY2TIqdE81
Malware Config
Signatures
Files
-
a98dbbd996d340fb588460454dd8a7bc5f5e57f7c50ea683f358e7c4c9734071.exe windows x86
2e201d9ff51da86056f0d9731cc32d6f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetUnhandledExceptionFilter
FileTimeToSystemTime
WaitForSingleObject
CreateProcessA
RaiseException
FlushInstructionCache
WideCharToMultiByte
GetVersion
SetLastError
InitializeCriticalSection
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
lstrlenW
InterlockedIncrement
InterlockedDecrement
lstrcmpiA
IsDBCSLeadByte
FindResourceA
LoadLibraryExA
ReadFile
HeapAlloc
GetProcessHeap
HeapFree
lstrcpyA
GetFileType
GetFileInformationByHandle
FileTimeToDosDateTime
DuplicateHandle
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
SystemTimeToFileTime
GetSystemPowerStatus
LocalAlloc
LocalFree
GlobalLock
GlobalAlloc
GetFileAttributesA
FlushFileBuffers
lstrcatA
InterlockedPopEntrySList
VirtualAlloc
VirtualFree
InterlockedPushEntrySList
HeapSize
HeapReAlloc
HeapDestroy
GetSystemTimeAsFileTime
GetTickCount
QueryPerformanceCounter
IsProcessorFeaturePresent
IsDebuggerPresent
UnhandledExceptionFilter
TerminateProcess
GetStartupInfoW
HeapSetInformation
InterlockedCompareExchange
DecodePointer
EncodePointer
lstrlenA
GetCurrentThreadId
GetCurrentProcess
GetCurrentProcessId
Sleep
WriteFile
lstrcpynA
LoadLibraryA
GetProcAddress
FreeLibrary
EnterCriticalSection
LeaveCriticalSection
FindResourceExW
FindResourceW
LoadResource
LockResource
SizeofResource
GetLastError
MultiByteToWideChar
InterlockedExchange
GetEnvironmentVariableA
GetModuleHandleA
GetModuleFileNameA
ResumeThread
CreateDirectoryA
GetLocalTime
CopyFileA
DeleteFileA
FindFirstFileA
FindNextFileA
FindClose
GetCurrentDirectoryA
GetTempPathA
GetTempFileNameA
GetShortPathNameA
CreateFileA
GetFileSize
SetFilePointer
CloseHandle
user32
GetClientRect
GetForegroundWindow
GetWindow
GetWindowLongA
SendMessageA
GetWindowTextA
InvalidateRect
SetTimer
KillTimer
SetFocus
IsWindow
SetWindowPos
GetDesktopWindow
GetDC
ReleaseDC
wsprintfA
LoadStringA
CopyImage
LoadImageA
GetActiveWindow
CharNextA
PeekMessageA
GetMessageA
TranslateMessage
DispatchMessageA
SetWindowLongA
EndPaint
BeginPaint
SetCapture
GetKeyState
SetWindowRgn
IsWindowEnabled
ClientToScreen
MoveWindow
OffsetRect
DrawIconEx
DrawFrameControl
GetDlgCtrlID
IsWindowVisible
EqualRect
ShowWindow
GetDlgItem
CopyRect
DrawTextA
SetCursor
InflateRect
SetRect
PtInRect
CallWindowProcA
CreateWindowExA
RegisterClassExA
DefWindowProcA
DestroyWindow
PostQuitMessage
LoadIconA
LoadCursorA
GetClassInfoExA
GetParent
GetWindowRect
MonitorFromWindow
GetMonitorInfoA
MapWindowPoints
UnregisterClassA
ReleaseCapture
gdi32
CreateSolidBrush
SetBkMode
SetTextColor
ExtTextOutA
RectInRegion
SelectClipRgn
RoundRect
CreatePen
CreateRectRgn
GetClipRgn
MoveToEx
SetBkColor
SaveDC
RestoreDC
TextOutA
GetTextExtentPoint32A
GetPixel
SetRectRgn
OffsetRgn
StretchBlt
CreateBitmap
Rectangle
GetStockObject
CreateFontIndirectA
CombineRgn
CreateRectRgnIndirect
CreateCompatibleBitmap
BitBlt
CreateDIBSection
DeleteObject
GetObjectA
SelectObject
DeleteDC
LineTo
CreateCompatibleDC
advapi32
RegOpenKeyExA
RegOpenKeyA
RegQueryInfoKeyA
RegQueryValueExA
RegEnumKeyExA
RegQueryInfoKeyW
RegSetValueExA
RegDeleteValueA
RegDeleteKeyA
RegCreateKeyExA
RegCloseKey
shell32
SHBrowseForFolderA
SHGetPathFromIDListA
ShellExecuteA
SHGetSpecialFolderPathA
ole32
CreateStreamOnHGlobal
CoInitializeEx
CoInitializeSecurity
CoTaskMemFree
CoCreateInstance
CoTaskMemRealloc
CoTaskMemAlloc
CoUninitialize
oleaut32
VarUI4FromStr
OleLoadPicture
SafeArrayGetUBound
SafeArrayGetElement
VariantChangeType
VariantInit
SafeArrayDestroy
SysFreeString
SysAllocString
SafeArrayGetLBound
VariantClear
VariantCopy
shlwapi
PathAppendA
PathFileExistsA
PathFindFileNameA
PathAddBackslashA
PathRemoveFileSpecA
SHGetValueA
StrToIntA
msvcp100
??0?$basic_ios@DU?$char_traits@D@std@@@std@@IAE@XZ
?_Pninc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IAEPADXZ
?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAEHD@Z
?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV12@XZ
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV01@H@Z
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV01@P6AAAVios_base@1@AAV21@@Z@Z
??1?$basic_ostream@DU?$char_traits@D@std@@@std@@UAE@XZ
?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QAEXH_N@Z
??1?$basic_ios@DU?$char_traits@D@std@@@std@@UAE@XZ
?imbue@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MAEXABVlocale@2@@Z
?sync@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MAEHXZ
?setbuf@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MAEPAV12@PAD_J@Z
?xsputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MAE_JPBD_J@Z
?xsgetn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MAE_JPAD_J@Z
?uflow@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MAEHXZ
?showmanyc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MAE_JXZ
?_Unlock@?$basic_streambuf@DU?$char_traits@D@std@@@std@@UAEXXZ
?_Lock@?$basic_streambuf@DU?$char_traits@D@std@@@std@@UAEXXZ
??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UAE@XZ
??1_Container_base12@std@@QAE@XZ
??0?$basic_ostream@DU?$char_traits@D@std@@@std@@QAE@PAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z
??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IAE@XZ
?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEXXZ
?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAE_JPBD_J@Z
?uncaught_exception@std@@YA_NXZ
?_BADOFF@std@@3_JB
?setw@std@@YA?AU?$_Smanip@_J@1@_J@Z
??_7?$basic_ostream@DU?$char_traits@D@std@@@std@@6B@
?_Xout_of_range@std@@YAXPBD@Z
?_Xlength_error@std@@YAXPBD@Z
wininet
HttpEndRequestA
InternetWriteFile
HttpSendRequestExA
HttpSendRequestA
InternetSetCookieA
InternetReadFile
HttpOpenRequestA
InternetCloseHandle
InternetAttemptConnect
InternetConnectA
InternetOpenA
HttpAddRequestHeadersA
msvcr100
_resetstkoflw
_recalloc
calloc
memmove_s
memcpy_s
free
malloc
_beginthreadex
fgets
_snprintf
fopen
fseek
ftell
fread
fclose
fprintf
sprintf_s
_purecall
??_V@YAXPAX@Z
_mbsnbcpy
_mbscmp
_mbsstr
_mbschr
_vscprintf
vsprintf_s
strnlen
_mbsrchr
_mbsnbcpy_s
strpbrk
atol
_mktime64
_stricmp
_tzset
_vsnprintf_s
toupper
atof
ferror
fwrite
isspace
isalnum
tolower
isalpha
_unlock
__dllonexit
_lock
_onexit
_except_handler4_common
?terminate@@YAXXZ
_amsg_exit
__getmainargs
_cexit
_exit
_XcptFilter
_ismbblead
exit
_acmdln
_initterm
_initterm_e
_configthreadlocale
__setusermatherr
_commode
_fmode
__set_app_type
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_crt_debugger_hook
_invoke_watson
_controlfp_s
sscanf
strncmp
sprintf
atoi
strncpy
__CxxFrameHandler3
??0exception@std@@QAE@ABV01@@Z
_CxxThrowException
??2@YAPAXI@Z
memset
memmove
memchr
memcpy
??3@YAXPAX@Z
??1exception@std@@UAE@XZ
?what@exception@std@@UBEPBDXZ
strchr
??0exception@std@@QAE@ABQBD@Z
gdiplus
GdipLoadImageFromStream
GdipDrawImageRectRectI
GdipDrawImageRectI
GdipCreateFromHDC
GdipSetImageAttributesColorKeys
GdipDisposeImageAttributes
GdipCreateImageAttributes
GdipCloneImage
GdipDeleteGraphics
GdipAlloc
GdipFree
GdiplusShutdown
GdipGetImageWidth
GdipGetImageHeight
GdipDisposeImage
GdiplusStartup
version
GetFileVersionInfoSizeA
VerQueryValueA
GetFileVersionInfoA
comctl32
_TrackMouseEvent
Sections
.text Size: 311KB - Virtual size: 310KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 64KB - Virtual size: 64KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 137KB - Virtual size: 140KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE