Static task
static1
Behavioral task
behavioral1
Sample
609513e6e4e189a77509907dc21aa35103ad7583526fe7fb9c4887b665f45faa.exe
Resource
win7-20220812-en
General
-
Target
609513e6e4e189a77509907dc21aa35103ad7583526fe7fb9c4887b665f45faa
-
Size
800KB
-
MD5
124b29525b331aa5aa072e64ce3a50f0
-
SHA1
1b5bdaa1121cf9379787b778a91f1c7a42ce8a42
-
SHA256
609513e6e4e189a77509907dc21aa35103ad7583526fe7fb9c4887b665f45faa
-
SHA512
264dbd56535a6f752f3859dc1e17f03f6644cfc9cf69cb6efa8f8e5639beac710e9b6473665f106e2c027d50b249459c7252a4bbffd9c942f5cae51ed4b513f9
-
SSDEEP
12288:GcKWFKdhQRFIECfgQFju7ExGd1yWc4yPlGs1u4oZo9TxPOBugxG/DPce:GxyNFIFVGryp9GUdoK9THgUIe
Malware Config
Signatures
Files
-
609513e6e4e189a77509907dc21aa35103ad7583526fe7fb9c4887b665f45faa.exe windows x86
a1e81810173eab11c233386ef0e54120
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SizeofResource
LockResource
LoadResource
FindResourceExW
InitializeCriticalSection
InterlockedIncrement
InterlockedDecrement
lstrlenW
MultiByteToWideChar
LoadLibraryExW
lstrcmpiW
CreateDirectoryW
WriteFile
DeleteFileW
ReadFile
SetFilePointer
GetFileSize
SetFileAttributesW
RemoveDirectoryW
GetSystemDirectoryW
GetSystemWindowsDirectoryW
GetLongPathNameW
GetVersionExW
GetCurrentThread
WaitForSingleObject
SetUnhandledExceptionFilter
TerminateProcess
CreateThread
GetPrivateProfileStringW
WideCharToMultiByte
FileTimeToSystemTime
SystemTimeToFileTime
GetLocalTime
GetExitCodeProcess
WritePrivateProfileStringW
GetShortPathNameW
FileTimeToLocalFileTime
ExpandEnvironmentStringsW
GetWindowsDirectoryW
GetTempPathW
MulDiv
lstrcpyW
GetLastError
FlushFileBuffers
FindResourceW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
GetConsoleMode
GetConsoleCP
GetLocaleInfoA
SetCurrentDirectoryW
GetStringTypeW
GetStringTypeA
LCMapStringA
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
GetTickCount
QueryPerformanceCounter
GetStartupInfoA
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetModuleHandleA
LCMapStringW
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
GetModuleFileNameA
GetStdHandle
ExitProcess
HeapCreate
GetStartupInfoW
ExitThread
RtlUnwind
IsDebuggerPresent
UnhandledExceptionFilter
TlsFree
DeleteAtom
FindAtomW
TlsAlloc
ReleaseMutex
AddAtomW
OpenThread
GetAtomNameW
TlsSetValue
InterlockedCompareExchange
Sleep
GetCurrentProcess
FlushInstructionCache
DeleteCriticalSection
RaiseException
GetCurrentThreadId
SetLastError
WriteConsoleW
EnterCriticalSection
GetCommandLineW
CreateProcessW
GetModuleFileNameW
CreateFileW
DeviceIoControl
CloseHandle
GetCurrentProcessId
GetProcAddress
LoadLibraryW
FreeLibrary
GlobalAlloc
GlobalFree
TlsGetValue
GetSystemTime
LocalFree
FormatMessageW
OutputDebugStringW
GetFileSizeEx
SetFilePointerEx
LocalFileTimeToFileTime
GetSystemTimeAsFileTime
CreateFileA
lstrlenA
HeapSize
HeapReAlloc
HeapDestroy
VirtualAlloc
VirtualFree
IsProcessorFeaturePresent
LoadLibraryA
HeapAlloc
GetProcessHeap
HeapFree
CreateMutexW
GetModuleHandleW
user32
OffsetRect
DefWindowProcW
UnregisterClassA
MessageBoxW
SetForegroundWindow
ShowWindow
FindWindowW
CreateWindowExW
DispatchMessageW
TranslateMessage
GetMessageW
EndPaint
BeginPaint
DrawTextW
EqualRect
PtInRect
GetCursor
SetCursor
PeekMessageW
InvalidateRect
GetTopWindow
EnableWindow
GetWindowTextLengthW
GetWindowTextW
CallWindowProcW
KillTimer
SetWindowTextW
SendMessageW
GetActiveWindow
IsWindowVisible
ScreenToClient
PostMessageW
GetCursorPos
PostQuitMessage
GetSystemMetrics
LoadImageW
DisableProcessWindowsGhosting
IsWindow
DialogBoxParamW
CopyRect
GetParent
GetWindow
GetWindowRect
MonitorFromWindow
GetMonitorInfoW
GetClientRect
MapWindowPoints
SetWindowPos
SetTimer
GetWindowLongW
EndDialog
WaitForInputIdle
GetDC
ReleaseDC
CharNextW
RegisterClassExW
LoadCursorW
GetClassInfoExW
SetWindowLongW
DestroyWindow
gdi32
GetDeviceCaps
CreateFontIndirectW
SetBkColor
SetTextColor
SetBkMode
DeleteDC
GetTextExtentPoint32W
SelectObject
TextOutW
advapi32
RegSetValueExW
RegCloseKey
OpenProcessToken
GetTokenInformation
RegQueryInfoKeyW
RegEnumKeyExW
RegCreateKeyExW
RegDeleteValueW
RegDeleteKeyW
RegOpenKeyExW
RegQueryValueExW
RegQueryValueExA
shell32
SHBrowseForFolderW
SHGetPathFromIDListW
SHGetMalloc
SHGetFolderPathW
ShellExecuteExW
SHGetSpecialFolderPathW
ShellExecuteW
ole32
CoUninitialize
CreateStreamOnHGlobal
CoInitialize
CoTaskMemFree
CoTaskMemRealloc
CoTaskMemAlloc
CoCreateInstance
oleaut32
VarUI4FromStr
DispCallFunc
VariantInit
VariantClear
SysAllocString
SysFreeString
SysStringLen
SysAllocStringByteLen
SysStringByteLen
shlwapi
PathFileExistsW
StrStrIW
SHDeleteKeyW
SHSetValueW
PathFindFileNameW
StrCmpNIW
PathIsDirectoryW
PathIsRelativeW
SHGetValueW
PathCombineW
PathRemoveFileSpecW
PathAppendW
StrRChrW
StrCmpIW
StrChrW
StrStrW
comctl32
InitCommonControlsEx
version
GetFileVersionInfoW
GetFileVersionInfoSizeW
VerQueryValueW
wintrust
WTHelperProvDataFromStateData
WinVerifyTrust
crypt32
CertGetNameStringW
Sections
.text Size: 450KB - Virtual size: 450KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 77KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 11KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 159KB - Virtual size: 159KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 95KB - Virtual size: 96KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE