Static task
static1
Behavioral task
behavioral1
Sample
306240d509ce13eaebc85505d5edbd706b8dc4ce101c639cc15c70837da1778c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
306240d509ce13eaebc85505d5edbd706b8dc4ce101c639cc15c70837da1778c.exe
Resource
win10v2004-20220901-en
General
-
Target
306240d509ce13eaebc85505d5edbd706b8dc4ce101c639cc15c70837da1778c
-
Size
277KB
-
MD5
70644c4fa235b90dda1fa18bdfa43c70
-
SHA1
56bb09470352d6356488ef61daa898fb2f4b4d3a
-
SHA256
306240d509ce13eaebc85505d5edbd706b8dc4ce101c639cc15c70837da1778c
-
SHA512
a8c3b2918c4c340b99b67e79a1e458e7b6cff7fe8d6ce3947e3c1a0e5e25d8cd7e3f029e1e2f9f712ba83e70eae6386a490f83a095de59546829df8f5502a5b6
-
SSDEEP
6144:0Hcsmdaxql8yreZRHME51MxEQNb2YCu2GK199:0OdaxqDeZRHMEsvNe199
Malware Config
Signatures
Files
-
306240d509ce13eaebc85505d5edbd706b8dc4ce101c639cc15c70837da1778c.exe windows x86
7ad0fc6d1db3b2dca2745ab12db82498
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetWindowDC
PostMessageA
SetUserObjectInformationA
GetWindowInfo
ReleaseDC
GrayStringA
IsCharLowerA
UnloadKeyboardLayout
GetKBCodePage
SetWindowRgn
CharToOemW
GetTopWindow
SetWindowsHookW
GetClipboardData
DdeSetUserHandle
DestroyCursor
BringWindowToTop
GetAltTabInfoA
GetClipboardSequenceNumber
CharNextW
GetWindowRect
GetClientRect
InvalidateRect
EnableWindow
LoadImageA
wsprintfA
SetCursor
CallWindowProcW
WinHelpW
SetActiveWindow
ReleaseCapture
SetCapture
SetParent
FindWindowExW
GetClassInfoW
UnregisterClassW
RegisterClassW
GetCursorPos
GetFocus
SetWindowPlacement
SystemParametersInfoW
FindWindowW
SetForegroundWindow
IntersectRect
DialogBoxParamW
CreateDialogIndirectParamW
CreateDialogParamW
LoadCursorW
LoadStringW
LoadMenuIndirectW
LoadMenuW
SetProcessDefaultLayout
LoadImageW
LoadIconW
LoadBitmapW
GetMenuStringW
ModifyMenuW
GetMenuItemInfoW
GetMenuState
DeleteMenu
GetMenuItemCount
GetSubMenu
GetMenuItemID
CreateAcceleratorTableW
LoadAcceleratorsW
GetForegroundWindow
CharNextA
GetWindowTextLengthW
GetDlgItemTextW
IsDlgButtonChecked
GetAsyncKeyState
DestroyWindow
DialogBoxIndirectParamW
ShowWindow
GetSystemMenu
EnableMenuItem
SetDlgItemTextW
CheckDlgButton
CreateWindowExW
GetLastActivePopup
SetWindowsHookExW
MessageBoxW
GetClassNameW
CallNextHookEx
wsprintfW
SetWindowLongW
GetWindowLongW
InflateRect
PtInRect
GetWindowTextW
DrawTextW
DefWindowProcW
GetDlgItem
SetFocus
MapWindowPoints
MoveWindow
SetWindowTextW
SendMessageW
EndDialog
GetMessageW
TranslateMessage
DispatchMessageW
WaitForInputIdle
PostThreadMessageW
GetWindowLongA
SetWindowLongA
SetWindowPos
SystemParametersInfoA
GetWindowPlacement
GetWindow
GetSysColor
EndPaint
GetDC
ClientToScreen
ScreenToClient
DrawTextExA
DrawTextA
TabbedTextOutA
LoadCursorA
GetSysColorBrush
GetClassNameA
DestroyMenu
UnhookWindowsHookEx
GetSystemMetrics
ExitWindowsEx
LoadIconA
GetDesktopWindow
BeginPaint
IsIconic
DrawIcon
LoadBitmapA
MessageBoxA
GetParent
SendMessageA
OffsetRect
CopyRect
urlmon
ReleaseBindInfo
UrlMkSetSessionOption
SetSoftwareUpdateAdvertisementState
IsLoggingEnabledA
shell32
SHGetSpecialFolderPathW
SHGetPathFromIDListW
ShellExecuteA
DragQueryFileA
FindExecutableA
ShellAboutA
ExtractIconW
DragFinish
Shell_NotifyIconW
SHGetFolderPathW
DoEnvironmentSubstW
SHGetFileInfoW
SHBrowseForFolderW
SHGetSpecialFolderLocation
SHGetMalloc
DragQueryPoint
ShellExecuteW
ole32
CreateFileMoniker
CoIsOle1Class
CoRevokeMallocSpy
OleUninitialize
CoCreateInstance
StringFromGUID2
CoInitialize
CoUninitialize
OleGetClipboard
CreateAntiMoniker
OleInitialize
advapi32
GetTokenInformation
RegQueryValueExW
RegGetKeySecurity
RegDeleteKeyA
LookupAccountNameW
DeleteAce
OpenEventLogW
NotifyBootConfigStatus
RegSetKeySecurity
SetSecurityDescriptorSacl
RegCloseKey
RegDeleteValueA
RegSetValueExA
RegCreateKeyExA
RegQueryValueExA
AdjustTokenPrivileges
RegOpenKeyExA
OpenProcessToken
RegOpenKeyA
RegEnumKeyA
RegQueryValueA
LookupPrivilegeValueA
RegOpenKeyExW
RegOpenKeyW
RegQueryValueW
RegSetValueW
RegDeleteKeyW
RegEnumKeyExW
RegQueryInfoKeyW
RegCreateKeyW
RegDeleteValueW
RegCreateKeyExW
RegSetValueExW
gdi32
ExtTextOutA
RectVisible
PtVisible
CreateCompatibleBitmap
GetObjectA
GetDIBits
DeleteObject
GetClipBox
SetMapMode
SetTextColor
SetBkMode
SetBkColor
RestoreDC
SaveDC
GetDeviceCaps
GetStockObject
Escape
CreateRectRgn
CombineRgn
SelectObject
StretchBlt
BitBlt
GetBkColor
CreateColorSpaceA
AddFontResourceW
CopyEnhMetaFileA
CreateBrushIndirect
CancelDC
AddFontResourceExW
CreateCompatibleDC
CreateBitmap
AbortPath
CreateDCW
AddFontResourceExA
CreateBitmapIndirect
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
DeleteDC
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
CreateDIBSection
GetObjectW
CreateFontIndirectW
GetTextExtentPoint32W
GetTextMetricsW
PatBlt
SelectPalette
RealizePalette
StretchDIBits
Rectangle
Polygon
MoveToEx
LineTo
ExtTextOutW
CreateDIBitmap
GetPixel
GetTextFaceW
GetDCOrgEx
GetTextExtentPointA
CreateFontW
CreatePen
CreateSolidBrush
CreatePatternBrush
GetNearestColor
GetTextCharset
CreateFontIndirectA
TextOutA
opengl32
glLightModelfv
glPopMatrix
glColor3i
glEndList
glRasterPos3i
glMatrixMode
glTexGend
glTexCoord1fv
dbghelp
SearchTreeForFile
GetTimestampForLoadedLibrary
SymRegisterFunctionEntryCallback64
EnumerateLoadedModules
SymGetModuleInfo64
SymEnumerateSymbols
SymEnumTypes
comctl32
_TrackMouseEvent
shlwapi
PathFindExtensionA
PathFindFileNameA
kernel32
SetConsoleCtrlHandler
FlushFileBuffers
GetConsoleMode
GetConsoleCP
LCMapStringW
LCMapStringA
VirtualAlloc
FatalAppExitA
VirtualFree
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStdHandle
ExitProcess
lstrcmpW
GetOEMCP
GetCPInfo
GetCurrentThread
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
RtlUnwind
MoveFileW
GetStartupInfoA
GetProcessHeap
GetCommandLineA
lstrlenA
GetCurrentThreadId
CreateThread
GetStringTypeA
WaitForSingleObject
GetExitCodeProcess
CloseHandle
GetVersion
GetFileAttributesW
GetProcAddress
GetModuleFileNameW
GetModuleHandleW
GetModuleHandleA
LoadLibraryW
LoadLibraryA
GetVersionExA
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
SetStdHandle
RaiseException
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetTimeZoneInformation
CreateFileA
CompareStringA
CompareStringW
HeapCreate
SetEnvironmentVariableA
GetStringTypeW
GetTimeFormatA
GetDateFormatA
GetUserDefaultLCID
GlobalLock
GlobalAlloc
GetLastError
SetLastError
GlobalFree
GlobalUnlock
GlobalHandle
MultiByteToWideChar
ReadFile
GetFileSize
CreateFileW
OutputDebugStringA
GetShortPathNameW
FindClose
WritePrivateProfileStringW
GetPrivateProfileStringW
GetPrivateProfileIntW
LoadLibraryExW
GlobalMemoryStatus
Sleep
QueryPerformanceCounter
QueryPerformanceFrequency
GetTickCount
SetEndOfFile
FreeResource
VirtualQuery
GetModuleFileNameA
MulDiv
FileTimeToSystemTime
GetDateFormatW
GetTimeFormatW
GetCurrentDirectoryW
ReleaseSemaphore
CreateSemaphoreW
SetErrorMode
GetSystemInfo
GetVersionExW
GlobalSize
GlobalReAlloc
FindNextFileW
HeapDestroy
HeapAlloc
HeapReAlloc
HeapFree
HeapSize
IsBadReadPtr
GetNumberFormatW
InitializeCriticalSection
EnumResourceLanguagesW
GetSystemDefaultLCID
SetThreadLocale
GetLocaleInfoW
GetUserDefaultUILanguage
DeleteCriticalSection
FreeLibrary
SizeofResource
FindResourceW
FindResourceExW
LoadResource
LockResource
GetVolumeInformationW
GetSystemTimeAsFileTime
SetFileTime
SetFilePointer
GetFileTime
CopyFileW
MoveFileExW
IsBadWritePtr
CreateDirectoryW
GetDiskFreeSpaceW
GetTempPathW
GetLocalTime
GetFileInformationByHandle
FileTimeToLocalFileTime
FileTimeToDosDateTime
EnterCriticalSection
LeaveCriticalSection
GetACP
GetProfileIntW
WideCharToMultiByte
GetProfileStringW
GetCommState
SetCommState
DeviceIoControl
WriteFile
GetFullPathNameW
lstrcmpiW
SetEvent
GetWindowsDirectoryW
CreateEventW
FormatMessageW
LocalFree
RemoveDirectoryW
FindFirstFileW
SetFileAttributesW
DeleteFileW
InterlockedIncrement
InterlockedDecrement
OpenWaitableTimerA
GetProcessVersion
GetSystemDirectoryA
MoveFileA
GetCommandLineW
GetCommModemStatus
FillConsoleOutputCharacterW
GetCurrentProcessId
OpenProcess
VirtualAllocEx
InitializeCriticalSectionAndSpinCount
CreateProcessW
Sections
.text Size: 156KB - Virtual size: 155KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 155KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.cap Size: 61KB - Virtual size: 60KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 53KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ