Static task
static1
Behavioral task
behavioral1
Sample
a76aaee2761aa9f1ecaa75665f03347fc5184af2b836a8b4cb39186f464578fc.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a76aaee2761aa9f1ecaa75665f03347fc5184af2b836a8b4cb39186f464578fc.exe
Resource
win10v2004-20220812-en
General
-
Target
a76aaee2761aa9f1ecaa75665f03347fc5184af2b836a8b4cb39186f464578fc
-
Size
476KB
-
MD5
80402058ab1e81fa58b06efa85e01760
-
SHA1
189bcbd20b0baf0f6044c569768186fcaeabb95f
-
SHA256
a76aaee2761aa9f1ecaa75665f03347fc5184af2b836a8b4cb39186f464578fc
-
SHA512
74909c8b3c2755c85478e7cc24a1e895d8c0913a28e11522a64a8be3d580f306d78b86d74e725cb74209807fecea2afebed9e1f9c62c7846686c90486d127c68
-
SSDEEP
6144:sQe8bChUMKXET+A/mhWtu+LtK3KZEayaL3x/6q8y/M6zgVQy:bpbChUMzT+zE8+LpEayaL3h/98
Malware Config
Signatures
Files
-
a76aaee2761aa9f1ecaa75665f03347fc5184af2b836a8b4cb39186f464578fc.exe windows x86
d5befff3fb5d9424e6340023d46e15d2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
sierrapt
SP_SetVisitHostDlgHelpCallback
SP_SetProxyDlgHelpCallback
SP_SetSelectDlgHelpCallback
SP_SetDownloadDlgHelpCallback
SP_SetPatchDescriptionExe
SP_SetCustomResourceDll
SP_SetOptionalPatchDlgHelpCallback
SP_SetPatchDescriptionTimeout
SP_SetPatchTimeout
SP_SetLanguageDll
SP_SetExtraConfig
SP_AddDirectoryServer
SP_ClearDirectoryServers
SP_SetCurrentVersion
SP_SetPatchTypes
SP_SetPatchFolder
SP_SetDisplayName
SP_SetProductName
SP_SetParentWindow
SP_SetDebug
SP_GetPatchFile
SP_DownloadPatch
SP_CheckForPatch
SP_SelectOptionalPatch
SP_CheckMessageOfTheDay
SP_ConfigureProxy
SP_SetVersionTimeout
SP_SetMotdTimeout
SP_MessageBox
kernel32
GlobalFindAtomA
GlobalAddAtomA
GlobalDeleteAtom
lstrcpyA
lstrcmpiA
lstrcatA
GetVersion
SetLastError
MulDiv
GlobalGetAtomNameA
lstrlenA
GlobalAlloc
GlobalLock
GetProcAddress
GlobalFlags
LocalAlloc
TlsAlloc
GlobalHandle
TlsFree
GetCurrentThread
lstrcpynA
LocalReAlloc
TlsGetValue
GetProcessVersion
GetCPInfo
GetOEMCP
SetErrorMode
GetCurrentProcess
GlobalReAlloc
FlushFileBuffers
SetEndOfFile
GetFullPathNameA
LocalFileTimeToFileTime
SystemTimeToFileTime
TlsSetValue
WinExec
FileTimeToLocalFileTime
RtlUnwind
GetFileType
GetStartupInfoA
ExitProcess
GetTimeZoneInformation
GetSystemTime
GetLocalTime
IsBadReadPtr
RaiseException
HeapAlloc
HeapFree
TerminateProcess
HeapReAlloc
HeapSize
GetACP
LCMapStringA
LCMapStringW
SetStdHandle
SetHandleCount
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
SetUnhandledExceptionFilter
VirtualAlloc
IsBadWritePtr
GetStringTypeA
GetStringTypeW
IsBadCodePtr
CompareStringA
CompareStringW
SetEnvironmentVariableA
GlobalUnlock
GlobalFree
GetModuleHandleA
GetDiskFreeSpaceA
GetSystemTimeAsFileTime
SetEvent
EnterCriticalSection
GetCurrentThreadId
MultiByteToWideChar
LeaveCriticalSection
WideCharToMultiByte
Sleep
lstrcmpA
GetExitCodeProcess
CreateProcessA
GetModuleFileNameA
GetCurrentDirectoryA
LocalFree
GetLastError
FormatMessageA
WriteFile
SizeofResource
LockResource
GetCommandLineA
LoadLibraryA
SetCurrentDirectoryA
SetFileTime
GetDriveTypeA
FindFirstFileA
FindClose
CreateFileA
CloseHandle
GetVersionExA
DeleteFileA
DeleteCriticalSection
GetTickCount
LoadResource
FindResourceA
InterlockedIncrement
GetTempPathA
GetPrivateProfileStringA
WritePrivateProfileStringA
FreeLibrary
InterlockedDecrement
InitializeCriticalSection
FileTimeToSystemTime
ReadFile
SetFilePointer
GetProfileStringA
user32
AdjustWindowRectEx
SetFocus
MapWindowPoints
SendDlgItemMessageA
UpdateWindow
SetDlgItemTextA
IsDialogMessageA
SetWindowTextA
EnableMenuItem
CheckMenuItem
SetMenuItemBitmaps
ModifyMenuA
GetMenuState
GetMenuCheckMarkDimensions
ClientToScreen
GetDC
BeginPaint
GrayStringA
PostQuitMessage
SetCursor
GetCursorPos
ValidateRect
GetMessageA
DestroyMenu
GetClassNameA
GetSysColorBrush
CopyRect
TabbedTextOutA
EndPaint
OffsetRect
SetWindowsHookExA
SystemParametersInfoA
GetWindowPlacement
GetNextDlgTabItem
EndDialog
GetActiveWindow
SetActiveWindow
CreateDialogIndirectParamA
IsWindowEnabled
DestroyWindow
CreateWindowExA
GetKeyState
WaitForInputIdle
DrawIcon
GetSystemMenu
AppendMenuA
GetDlgItem
DestroyIcon
FindWindowA
GetLastActivePopup
IsIconic
SetForegroundWindow
IsWindowVisible
PeekMessageA
TranslateMessage
DispatchMessageA
DrawTextA
GetWindowLongA
SetWindowLongA
GetSysColor
ScreenToClient
KillTimer
ReleaseCapture
SetTimer
SetCapture
PtInRect
PostMessageA
GetFocus
GetWindowRect
ShowWindow
IsWindow
GetSystemMetrics
InvalidateRect
GetClientRect
GetWindowDC
GetParent
ReleaseDC
LoadStringA
LoadIconA
LoadCursorA
LoadBitmapA
wsprintfA
EnableWindow
SendMessageA
GetTopWindow
MessageBoxA
GetCapture
WinHelpA
RegisterClassA
GetMenu
CallNextHookEx
GetMenuItemID
GetClassLongA
SetPropA
UnhookWindowsHookEx
GetPropA
CallWindowProcA
GetMenuItemCount
GetSubMenu
GetWindowTextLengthA
DefWindowProcA
GetWindowTextA
GetDlgCtrlID
RegisterWindowMessageA
IntersectRect
RemovePropA
GetMessageTime
GetMessagePos
GetForegroundWindow
GetWindow
GetClassInfoA
SetWindowPos
ExcludeUpdateRgn
UnregisterClassA
HideCaret
ShowCaret
IsWindowUnicode
DrawFocusRect
DefDlgProcA
InflateRect
CharNextA
gdi32
CreateDIBitmap
BitBlt
CreateCompatibleDC
GetTextMetricsA
PatBlt
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetDeviceCaps
SetPixel
Rectangle
CreateSolidBrush
DeleteObject
CreatePatternBrush
LineTo
MoveToEx
SelectObject
SetTextColor
SetBkMode
GetClipBox
SetBkColor
GetObjectA
CreateBitmap
DeleteDC
SaveDC
RestoreDC
GetStockObject
SetMapMode
OffsetViewportOrgEx
SetViewportExtEx
SetViewportOrgEx
ScaleViewportExtEx
ScaleWindowExtEx
SetWindowExtEx
IntersectClipRect
GetTextExtentPointA
CreatePen
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
advapi32
RegCloseKey
RegOpenKeyExA
RegCreateKeyExA
RegSetValueExA
comctl32
ord17
wsock32
closesocket
shutdown
send
recv
getsockopt
WSAGetLastError
select
__WSAFDIsSet
ioctlsocket
connect
htons
socket
inet_ntoa
setsockopt
gethostbyname
Sections
.text Size: 256KB - Virtual size: 254KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 44KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 136KB - Virtual size: 132KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
(��uW Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE