Static task
static1
Behavioral task
behavioral1
Sample
33c13980865df1c2a2b4a2e84b6faacbd039248074b948d66f85433a34fef2f3.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
33c13980865df1c2a2b4a2e84b6faacbd039248074b948d66f85433a34fef2f3.exe
Resource
win10v2004-20220812-en
General
-
Target
33c13980865df1c2a2b4a2e84b6faacbd039248074b948d66f85433a34fef2f3
-
Size
372KB
-
MD5
805e717b57bcb8248370a770126d23b0
-
SHA1
ff84ce87e4eeeff97f8f9b53aaa4804ea2d8c778
-
SHA256
33c13980865df1c2a2b4a2e84b6faacbd039248074b948d66f85433a34fef2f3
-
SHA512
55402df9466e12f887df570224760ef45123889656b2e4e33451c932e534ca40906928c066368fafa1e2dc3d4361ed8e65b2e91ec0115e2ebaee0705d464763e
-
SSDEEP
6144:rpZrAkuduPQQRYWX1zlaGaQKFd1RLyFHuN2nKhBgcaEPNyApIw4H3:rpZrbVlavFd1RuFHu0nKUEPNyM/4H
Malware Config
Signatures
Files
-
33c13980865df1c2a2b4a2e84b6faacbd039248074b948d66f85433a34fef2f3.exe windows x86
81c2c4255ad5bf3cc45f0835d65b3cc5
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetStartupInfoW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapFree
HeapAlloc
VirtualAlloc
GetSystemTimeAsFileTime
RtlUnwind
RaiseException
ExitProcess
HeapReAlloc
HeapSize
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
HeapCreate
VirtualFree
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetTimeFormatA
GetDateFormatA
GetTimeZoneInformation
LCMapStringA
LCMapStringW
InitializeCriticalSectionAndSpinCount
GetConsoleCP
GetConsoleMode
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CreateFileA
SetEnvironmentVariableA
SetErrorMode
FlushFileBuffers
SetFilePointer
WriteFile
WritePrivateProfileStringW
InterlockedIncrement
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
GlobalHandle
GlobalReAlloc
TlsGetValue
LocalAlloc
GlobalFlags
lstrlenA
FormatMessageW
LocalFree
InterlockedDecrement
ConvertDefaultLocale
EnumResourceLanguagesW
lstrcmpA
GetLocaleInfoW
CompareStringA
InterlockedExchange
MulDiv
GetModuleHandleA
lstrlenW
GetCurrentThreadId
GlobalAddAtomW
GlobalFindAtomW
GlobalDeleteAtom
GetVersionExW
CompareStringW
SetLastError
lstrcmpW
GetModuleHandleW
GetVersionExA
FreeResource
GlobalFree
GlobalAlloc
GlobalSize
GetCurrentThread
SetThreadPriority
GetTickCount
GlobalUnlock
GlobalLock
WideCharToMultiByte
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
LoadLibraryA
LockResource
LoadLibraryW
FreeLibrary
MultiByteToWideChar
SizeofResource
LoadResource
FindResourceW
GetProcAddress
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
DeleteFileW
GetModuleFileNameW
CloseHandle
TerminateProcess
OpenProcess
GetCurrentProcessId
GetCurrentProcess
GetLastError
QueryPerformanceCounter
Sleep
user32
DestroyMenu
GetSysColorBrush
LoadCursorW
UnregisterClassW
ModifyMenuW
GetMenuState
EnableMenuItem
CheckMenuItem
EndPaint
BeginPaint
ClientToScreen
GrayStringW
DrawTextExW
DrawTextW
TabbedTextOutW
ShowWindow
SetWindowTextW
IsDialogMessageW
SendDlgItemMessageW
SendDlgItemMessageA
WinHelpW
GetCapture
SetWindowsHookExW
CallNextHookEx
GetClassLongW
SetPropW
GetPropW
RemovePropW
GetLastActivePopup
DispatchMessageW
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
PeekMessageW
MapWindowPoints
GetKeyState
SetMenu
PostMessageW
GetSubMenu
GetMenuItemID
GetMenuItemCount
MessageBoxW
CreateWindowExW
GetClassInfoExW
GetClassInfoW
RegisterClassW
GetSysColor
AdjustWindowRectEx
CopyRect
PtInRect
GetDlgCtrlID
DefWindowProcW
CallWindowProcW
GetMenu
SystemParametersInfoA
GetWindowPlacement
GetWindow
GetActiveWindow
SetActiveWindow
CreateDialogIndirectParamW
DestroyWindow
GetDlgItem
GetNextDlgTabItem
EndDialog
DeregisterShellHookWindow
RegisterShellHookWindow
SetWindowLongW
ReleaseDC
GetDC
RegisterWindowMessageW
GetAncestor
IsWindowEnabled
SetClipboardData
EmptyClipboard
EnumClipboardFormats
GetDesktopWindow
GetParent
SendMessageTimeoutW
GetCursorPos
WindowFromPoint
GetAsyncKeyState
MapVirtualKeyW
CloseClipboard
SetCursor
GetMessageW
TranslateMessage
ValidateRect
PostQuitMessage
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
GetTopWindow
LoadBitmapW
GetClipboardData
OpenClipboard
IsClipboardFormatAvailable
UpdateWindow
InvalidateRect
MoveWindow
SetParent
SetFocus
GetWindowLongW
GetClassNameW
GetWindowThreadProcessId
DrawIcon
GetClientRect
GetSystemMetrics
IsIconic
SetClipboardViewer
FindWindowExW
LoadIconW
GetWindowTextW
EnableWindow
GetFocus
SetTimer
SendMessageW
FindWindowA
mouse_event
SetCursorPos
GetWindowRect
KillTimer
SendMessageA
GetForegroundWindow
IsWindowVisible
IsWindow
keybd_event
SetForegroundWindow
SetWindowPos
gdi32
CreateBitmap
GetStockObject
DeleteDC
TextOutW
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
RectVisible
PtVisible
SetMapMode
RestoreDC
SaveDC
SetBkColor
SetTextColor
GetClipBox
GetDeviceCaps
GetObjectW
DeleteObject
ExtTextOutW
winspool.drv
DocumentPropertiesW
ClosePrinter
OpenPrinterW
advapi32
RegSetValueExW
RegCreateKeyExW
RegQueryValueW
RegOpenKeyW
RegEnumKeyW
RegDeleteKeyW
RegOpenKeyExW
RegQueryValueExW
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
OpenProcessToken
AdjustTokenPrivileges
LookupPrivilegeValueW
shlwapi
PathFindExtensionW
PathFindFileNameW
PathRemoveFileSpecW
ole32
CoUninitialize
CoInitialize
oleaut32
SysFreeString
VarUdateFromDate
VariantTimeToSystemTime
SystemTimeToVariantTime
VarDateFromStr
VariantClear
VariantChangeType
VariantInit
psapi
GetModuleBaseNameA
EnumProcessModules
EnumProcesses
gdiplus
GdiplusShutdown
Sections
.text Size: 226KB - Virtual size: 225KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 44KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 34KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 58KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE