Static task
static1
Behavioral task
behavioral1
Sample
f6150387ae98b45bc2f0de5f964ab71f8335e0e6bd8b9acd14df20f0da94234f.exe
Resource
win7-20220812-en
General
-
Target
f6150387ae98b45bc2f0de5f964ab71f8335e0e6bd8b9acd14df20f0da94234f
-
Size
304KB
-
MD5
000431e4465f59ae125610bbe30735a0
-
SHA1
0dacd3329a32616f41404a1afc7fb6d5a3f6c61c
-
SHA256
f6150387ae98b45bc2f0de5f964ab71f8335e0e6bd8b9acd14df20f0da94234f
-
SHA512
5cf2dfd6e8c0c40a396da5a01b20b707a377c90ec3b697d31d947a045858ea42f5889e80634e9690197d88401ff1db5f66ad609f9a86d48a9a28896f2e74754f
-
SSDEEP
6144:WAOkd0xS+23aWBpQC7JQ8l2qvnMBTioJIR9yokG:WuY723aWBpQCa87vYTisqb
Malware Config
Signatures
Files
-
f6150387ae98b45bc2f0de5f964ab71f8335e0e6bd8b9acd14df20f0da94234f.exe windows x86
22de0a9f4d0b56ff0d3acb30fdda9c4f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
SetCursorPos
GetDlgItemInt
GetSystemMenu
CreateWindowExA
FindWindowA
SetUserObjectInformationA
OpenInputDesktop
CopyAcceleratorTableW
AttachThreadInput
VkKeyScanA
LoadCursorFromFileA
GetClientRect
GetDesktopWindow
AdjustWindowRectEx
AllowSetForegroundWindow
RegisterClassExW
GetSystemMetrics
EndDialog
ScreenToClient
GetWindowRect
EnableMenuItem
SetClassLongA
IsWindowEnabled
SetWindowPos
GetSysColor
GetWindowLongA
SetCursor
LoadCursorA
CheckDlgButton
GetMessagePos
LoadBitmapA
CallWindowProcA
IsWindowVisible
CloseClipboard
SetClipboardData
EmptyClipboard
RegisterClassA
TrackPopupMenu
AppendMenuA
CreatePopupMenu
AnimateWindow
SetDlgItemTextA
GetDlgItemTextA
MessageBoxIndirectA
CharPrevA
DispatchMessageA
PeekMessageA
DestroyWindow
CreateDialogParamA
SetTimer
SetWindowTextA
PostQuitMessage
SetForegroundWindow
wsprintfA
SendMessageTimeoutA
FindWindowExA
SystemParametersInfoA
GetClassInfoA
DialogBoxParamA
CharNextA
OpenClipboard
ExitWindowsEx
IsWindow
GetDlgItem
SetWindowLongA
LoadImageA
GetDC
EnableWindow
InvalidateRect
SendMessageA
DefWindowProcA
BeginPaint
FillRect
DrawTextA
EndPaint
ShowWindow
shell32
DragQueryFileW
DragFinish
ExtractIconA
DragQueryPoint
SHGetSpecialFolderLocation
SHFileOperationA
ShellExecuteA
SHGetFileInfoA
SHBrowseForFolderA
SHGetPathFromIDListA
Shell_NotifyIconA
ole32
CoGetStandardMarshal
GetClassFile
CreateILockBytesOnHGlobal
CoInitializeSecurity
CoGetCurrentProcess
OleUninitialize
OleInitialize
CoTaskMemFree
CoReleaseMarshalData
OleDoAutoConvert
CoCreateInstance
OleCreateLinkToFile
advapi32
RegCloseKey
RegSetValueA
ReportEventW
RegQueryValueExA
RegSetValueExA
RegEnumKeyA
RegEnumValueA
RegOpenKeyExA
RegDeleteKeyA
RegDeleteValueA
RegQueryValueW
RegCreateKeyExA
NotifyBootConfigStatus
ObjectDeleteAuditAlarmW
GetSidSubAuthority
BackupEventLogA
ObjectPrivilegeAuditAlarmA
StartServiceCtrlDispatcherW
gdi32
GetDeviceCaps
DeleteObject
CreateBrushIndirect
CreateFontIndirectA
SetBkMode
SetTextColor
SelectObject
AddFontResourceExA
CreateDIBSection
CreateBitmapIndirect
CopyEnhMetaFileA
AddFontResourceW
BeginPath
CreateCompatibleBitmap
Arc
CreateDIBPatternBrushPt
SetBkColor
opengl32
glColor4ui
glViewport
glRasterPos4iv
glTexCoord1fv
glEvalCoord1f
glTexGeni
glGetFloatv
glRasterPos4dv
comctl32
ImageList_Destroy
ImageList_Create
ImageList_AddMasked
version
GetFileVersionInfoA
VerQueryValueA
GetFileVersionInfoSizeA
kernel32
GetUserDefaultLCID
IsValidCodePage
GetOEMCP
GetACP
GetCurrentThreadId
SetLastError
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetModuleHandleW
DeleteCriticalSection
HeapFree
GetCPInfo
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
LeaveCriticalSection
EnterCriticalSection
GetStartupInfoA
GetSystemTimeAsFileTime
InterlockedDecrement
InterlockedIncrement
CompareFileTime
SearchPathA
GetShortPathNameA
GetFullPathNameA
MoveFileA
SetCurrentDirectoryA
GetCurrentProcessId
GetLastError
CreateDirectoryA
SetFileAttributesA
Sleep
GetLocaleInfoA
CreateFileA
GetFileSize
GetModuleFileNameA
GetCurrentProcess
CopyFileA
ExitProcess
SetFileTime
GetTempPathA
GetCommandLineA
SetErrorMode
LoadLibraryA
lstrcpynA
GetDiskFreeSpaceA
GlobalUnlock
GlobalLock
CreateThread
CreateProcessA
RemoveDirectoryA
GetTempFileNameA
lstrlenA
lstrcatA
RtlUnwind
LCMapStringA
LCMapStringW
HeapAlloc
HeapReAlloc
InitializeCriticalSectionAndSpinCount
GetConsoleCP
GetConsoleMode
FlushFileBuffers
GetLocaleInfoW
HeapSize
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetStdHandle
EnumSystemLocalesA
IsValidLocale
GetStringTypeA
GetStringTypeW
RaiseException
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapCreate
VirtualFree
GetTickCount
QueryPerformanceCounter
ExpandEnvironmentStringsA
GlobalFree
GlobalAlloc
WaitForSingleObject
GetExitCodeProcess
LoadLibraryExA
GetProcAddress
FreeLibrary
MultiByteToWideChar
GetFileAttributesA
GetSystemDirectoryA
GetVersion
CloseHandle
lstrcmpiA
VirtualAlloc
ReadConsoleOutputCharacterW
GetModuleHandleA
FindFirstChangeNotificationW
EnumDateFormatsW
GetDiskFreeSpaceW
WriteConsoleInputA
DeleteVolumeMountPointA
GetWindowsDirectoryA
DeleteFileA
FindFirstFileA
FindNextFileA
FindClose
SetFilePointer
MulDiv
ReadFile
WriteFile
GetPrivateProfileStringA
WritePrivateProfileStringA
lstrcmpA
Sections
.rdata Size: 37KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.wonderf Size: 169KB - Virtual size: 26.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 97KB - Virtual size: 100KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE