Behavioral task
behavioral1
Sample
935fd4eb71800f0ddbc751482dfc4944013d3d73219044005b969faefc91f5f2.exe
Resource
win7-20220812-en
General
-
Target
935fd4eb71800f0ddbc751482dfc4944013d3d73219044005b969faefc91f5f2
-
Size
324KB
-
MD5
6d57cbb9cb320e59f2cf2c347ae49e08
-
SHA1
c611ec1679ba0f8486e42d2358ae587ed766c9b6
-
SHA256
935fd4eb71800f0ddbc751482dfc4944013d3d73219044005b969faefc91f5f2
-
SHA512
33a741040ac8c8ef038284389d0cc962be4aafe78e7a859191d09e36abab4cf7c8f94e42f8893fc1766f180d956a817e810a640bc5f3da69b3488cc0004a8bb0
-
SSDEEP
6144:sUod9yrEukz4Mq7LRkc/LymBcnBVUaNPCvk/XLffIJ:s5yrEukz4FR1LySkVtCvkXLfwJ
Malware Config
Signatures
Files
-
935fd4eb71800f0ddbc751482dfc4944013d3d73219044005b969faefc91f5f2.exe windows x86
2233973b9ba95fe0b2326b37ef3ba297
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
TlsGetValue
GlobalDeleteAtom
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
LoadResource
GetProcessVersion
GlobalFlags
GetCPInfo
GetOEMCP
lstrcmpA
GetModuleHandleA
RtlUnwind
GetStartupInfoA
GetCommandLineA
ExitProcess
HeapAlloc
HeapFree
GetTimeZoneInformation
GetACP
RaiseException
HeapSize
LocalReAlloc
TlsSetValue
LCMapStringW
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetEnvironmentVariableA
HeapDestroy
HeapCreate
VirtualFree
GetDriveTypeA
GetStringTypeA
GetStringTypeW
VirtualAlloc
IsBadWritePtr
SetUnhandledExceptionFilter
IsBadReadPtr
IsBadCodePtr
GetLocaleInfoA
SetStdHandle
CompareStringA
CompareStringW
SetEnvironmentVariableA
GlobalAlloc
GlobalReAlloc
GlobalHandle
TlsAlloc
LocalAlloc
GetVersion
GetCurrentThreadId
GetThreadLocale
GetFullPathNameA
GetVolumeInformationA
SetEndOfFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
lstrcatA
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
FileTimeToLocalFileTime
FileTimeToSystemTime
GetSystemDirectoryA
GetModuleFileNameA
TerminateProcess
lstrcpynA
_lread
GetFileAttributesA
InterlockedDecrement
LocalFree
lstrlenA
lstrcpyA
InterlockedIncrement
FindNextFileA
FindClose
FindFirstFileA
SetLastError
CreateMutexA
ReleaseMutex
WaitForSingleObject
CreateFileMappingA
GetVersionExA
GetFileSize
GlobalLock
MapViewOfFile
WideCharToMultiByte
GetCurrentProcess
GlobalUnlock
GlobalFree
GetLocalTime
GetLastError
GetProfileIntA
LCMapStringA
HeapReAlloc
_llseek
OpenFile
_lclose
FindResourceExA
SetThreadLocale
GetWindowsDirectoryA
CreateDirectoryA
SetCurrentDirectoryA
GetCurrentDirectoryA
MultiByteToWideChar
OutputDebugStringA
RemoveDirectoryA
DeleteFileA
CloseHandle
CreateFileA
CreateProcessA
FreeLibrary
GetProcAddress
LoadLibraryA
lstrcmpiA
GetExitCodeProcess
Sleep
user32
SetWindowTextA
LoadCursorA
GetSysColorBrush
ReleaseDC
GetDC
GetClassNameA
PtInRect
ClientToScreen
PostQuitMessage
DestroyMenu
TabbedTextOutA
DrawTextA
GrayStringA
GetTopWindow
GetCapture
WinHelpA
GetClassInfoA
RegisterClassA
GetMenu
GetMenuItemCount
GetSubMenu
GetMenuItemID
GetDlgItem
GetWindowTextA
GetDlgCtrlID
DefWindowProcA
DestroyWindow
CreateWindowExA
MapWindowPoints
RemovePropA
GetMessageTime
GetMessagePos
GetForegroundWindow
SetForegroundWindow
LoadStringA
wsprintfA
RegisterWindowMessageA
SystemParametersInfoA
IsIconic
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
GetFocus
GetNextDlgTabItem
DispatchMessageA
GetKeyState
CallNextHookEx
PeekMessageA
SetWindowsHookExA
UnhookWindowsHookEx
GetSystemMetrics
CharUpperA
GetParent
GetLastActivePopup
IsWindowEnabled
GetWindowLongA
SendMessageA
EnableWindow
ScreenToClient
GetWindowRect
RegisterClipboardFormatA
ExitWindowsEx
SetRect
LoadIconA
PostMessageA
GetPropA
CallWindowProcA
GetSysColor
SetFocus
AdjustWindowRectEx
GetClientRect
CopyRect
GetClassLongA
SetPropA
SetWindowPos
MessageBoxA
CharNextA
LoadImageA
SetWindowLongA
GetWindow
EnableMenuItem
GetWindowPlacement
advapi32
OpenProcessToken
RegEnumKeyA
LookupPrivilegeValueA
RegOpenKeyA
RegSetValueExA
RegCreateKeyExA
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
RegDeleteKeyA
RegQueryInfoKeyA
RegDeleteValueA
RegEnumValueA
InitiateSystemShutdownA
AdjustTokenPrivileges
ole32
CLSIDFromString
StringFromCLSID
CoCreateInstance
CoInitialize
CoUninitialize
pmxapi
VLGetSystemDeviceScheme
comctl32
ImageList_SetBkColor
ord17
ImageList_AddMasked
ImageList_GetIconSize
ImageList_Draw
ImageList_Destroy
ImageList_Create
gdi32
CreateCompatibleDC
GetSystemPaletteEntries
CreatePalette
GetPaletteEntries
CreateBitmap
StretchBlt
RealizePalette
SetTextColor
SetBkColor
GetClipBox
GetDeviceCaps
DeleteObject
GetObjectA
SaveDC
DeleteDC
SelectObject
GetStockObject
RestoreDC
SelectPalette
SetStretchBltMode
SetMapMode
OffsetViewportOrgEx
SetViewportExtEx
SetViewportOrgEx
ScaleViewportExtEx
ScaleWindowExtEx
SetWindowExtEx
GetDIBColorTable
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
CreateDIBitmap
CreateCompatibleBitmap
CreateBitmapIndirect
winspool.drv
DocumentPropertiesA
OpenPrinterA
ClosePrinter
shell32
ExtractIconA
SHGetFileInfoA
Sections
.text Size: 128KB - Virtual size: 124KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 28KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 32KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.UPX0 Size: 108KB - Virtual size: 260KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE