Static task
static1
Behavioral task
behavioral1
Sample
d2be65d223d5e9c999a8c614c8a8c410598e9f0b94116e530212ceda63066f55.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d2be65d223d5e9c999a8c614c8a8c410598e9f0b94116e530212ceda63066f55.exe
Resource
win10v2004-20220812-en
General
-
Target
d2be65d223d5e9c999a8c614c8a8c410598e9f0b94116e530212ceda63066f55
-
Size
677KB
-
MD5
125f4959a2a1a959c676d7eeee70ef50
-
SHA1
51b1bebe59ddfbcdd2177e593846897085e8a7eb
-
SHA256
d2be65d223d5e9c999a8c614c8a8c410598e9f0b94116e530212ceda63066f55
-
SHA512
5e2fac6a9d63d67027c4c3c61393b126398c65771d89d1b05094410f9c4bbc1207a1344b4d3931d236196af1519ca728f06478379f875493b04e53da721f4f18
-
SSDEEP
12288:/tDUUmLvu7KSh3MgAivk2fIYGdjvA4MGqMFkG3HlfMiK7df5Zpg0GTH7:FL+9FvPkUqZp4
Malware Config
Signatures
Files
-
d2be65d223d5e9c999a8c614c8a8c410598e9f0b94116e530212ceda63066f55.exe windows x86
70c57d706472ed01ba20731cb687db56
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegDeleteKeyW
RegCloseKey
RegQueryInfoKeyW
RegEnumKeyExW
RegOpenKeyExW
RegSetValueExW
RegCreateKeyExW
RegDeleteValueW
UnregisterTraceGuids
TraceEvent
GetTraceLoggerHandle
GetTraceEnableLevel
GetTraceEnableFlags
RegQueryValueExA
RegOpenKeyExA
RegisterTraceGuidsW
kernel32
LockResource
FindResourceExW
InterlockedDecrement
InterlockedIncrement
GetProcessHeap
HeapAlloc
LocalFree
SetLastError
GetModuleHandleA
GetVersion
GetFileAttributesW
LoadLibraryW
OutputDebugStringA
GetCurrentThreadId
GetCurrentProcess
GetModuleFileNameW
GlobalUnlock
GlobalLock
GlobalAlloc
lstrcmpW
HeapSetInformation
DecodePointer
SetEvent
EnterCriticalSection
CloseHandle
WaitForSingleObject
Sleep
CreateEventW
CreateThread
LoadLibraryExW
FindResourceW
LeaveCriticalSection
LoadResource
SizeofResource
MultiByteToWideChar
RaiseException
lstrcmpiW
GetModuleHandleW
GetProcAddress
FreeLibrary
FlushInstructionCache
GetLastError
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
GetShortPathNameW
WideCharToMultiByte
LoadLibraryA
GetSystemDirectoryA
GetCurrentProcessId
CreateMutexA
ReleaseMutex
GetModuleFileNameA
GlobalFree
GetTickCount64
GetSystemTimeAsFileTime
QueryPerformanceCounter
IsDebuggerPresent
EncodePointer
VirtualFree
VirtualAlloc
IsProcessorFeaturePresent
InterlockedPushEntrySList
InterlockedPopEntrySList
InitializeSListHead
InterlockedCompareExchange
HeapFree
MulDiv
GetACP
GetCommandLineW
gdi32
DeleteDC
CreateCompatibleBitmap
BitBlt
GetStockObject
GetObjectW
GetDeviceCaps
SelectObject
CreateDIBSection
CreateCompatibleDC
CreateSolidBrush
DeleteObject
user32
FillRect
DefWindowProcW
SetWindowLongW
GetWindowLongW
wsprintfA
UnregisterClassW
CallWindowProcW
CharNextW
GetDC
GetClientRect
BeginPaint
EndPaint
IsWindow
DestroyWindow
MoveWindow
ShowWindow
CreateWindowExW
RegisterClassExW
GetClassInfoExW
GetDlgItem
GetWindow
SetFocus
GetFocus
IsChild
SetWindowTextW
GetWindowTextW
GetWindowTextLengthW
RegisterWindowMessageW
PostThreadMessageW
CharUpperW
GetMessageW
TranslateMessage
DispatchMessageW
ReleaseDC
LoadCursorW
DestroyAcceleratorTable
GetDesktopWindow
InvalidateRect
InvalidateRgn
ReleaseCapture
SetCapture
ScreenToClient
GetParent
ClientToScreen
CreateAcceleratorTableW
RedrawWindow
SendMessageW
GetClassNameW
GetSysColor
SetWindowPos
msvcr110
_access
strncpy
__CxxFrameHandler3
_vscwprintf
vswprintf_s
_except_handler4_common
_controlfp_s
_invoke_watson
__crtSetUnhandledExceptionFilter
__crtTerminateProcess
__crtUnhandledException
_crt_debugger_hook
_onexit
__dllonexit
_calloc_crt
_unlock
_lock
??1type_info@@UAE@XZ
?terminate@@YAXXZ
wcsnlen
memcpy_s
wcsncpy_s
malloc
free
wcsstr
_recalloc
memmove_s
wmemcpy_s
_purecall
swprintf_s
wcscpy_s
wcscat_s
memset
_XcptFilter
__crtGetShowWindowMode
_amsg_exit
__wgetmainargs
__set_app_type
exit
_exit
_cexit
_configthreadlocale
__setusermatherr
_initterm_e
_initterm
_wcmdln
_fmode
_commode
memcmp
ole32
CoRevokeClassObject
CoRegisterClassObject
CoResumeClassObjects
CoInitialize
CoReleaseServerProcess
CoAddRefServerProcess
OleInitialize
CLSIDFromString
CLSIDFromProgID
CoGetClassObject
CoCreateInstance
CreateStreamOnHGlobal
OleLockRunning
StringFromGUID2
OleUninitialize
CoTaskMemAlloc
CoTaskMemRealloc
CoTaskMemFree
CoUninitialize
oleaut32
VarUI4FromStr
UnRegisterTypeLi
RegisterTypeLi
SysAllocStringLen
VariantInit
LoadTypeLi
LoadRegTypeLi
SysStringLen
OleCreateFontIndirect
SysAllocString
VariantClear
SysFreeString
shlwapi
PathFileExistsW
wlxphotobase
?New@BasePrivate@@YAPAXI_N@Z
?Delete@BasePrivate@@YAXPAX@Z
?ThrowLastError@Base@@YGXXZ
?Throw@Base@@YGXJ@Z
??1Exception@Base@@UAE@XZ
?GetBaseStringManager@String@Base@@SGAAVCAtlStringMgr@ATL@@XZ
?BaseAtlThrow@ATL@@YGXJ@Z
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
Sections
.text Size: 87KB - Virtual size: 87KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 580KB - Virtual size: 2.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE