Static task
static1
Behavioral task
behavioral1
Sample
c010037ff9aae726da36c406a1599fc2d60da388eb77424f003d9ec89f536f1f.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
c010037ff9aae726da36c406a1599fc2d60da388eb77424f003d9ec89f536f1f.exe
Resource
win10v2004-20220812-en
General
-
Target
c010037ff9aae726da36c406a1599fc2d60da388eb77424f003d9ec89f536f1f
-
Size
368KB
-
MD5
81538c420b31390e0a27875e852677f0
-
SHA1
27a466171d935a17d311f599749c4f3eb545416b
-
SHA256
c010037ff9aae726da36c406a1599fc2d60da388eb77424f003d9ec89f536f1f
-
SHA512
5eff59f724abcdc727c5b73d113f9d5a3ada4e577b7c12a1eb352e837c6587e735c010e102082f22007567c31f54fea77d8dddcd3dca4ec4b32233cb700ce780
-
SSDEEP
6144:L2EmjBwLyZybZVrWGByh2SWw3fwPK5dp4xD+uKUO8e27VojkKggRLc5:LniyvrWVUAoPK7p41+u7Wc5
Malware Config
Signatures
Files
-
c010037ff9aae726da36c406a1599fc2d60da388eb77424f003d9ec89f536f1f.exe windows x86
09803d805b3588257cb62eff3b015b85
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetWindow
SetWindowLongW
IsWindow
EnumDisplayDevicesA
GetMenuStringW
DdePostAdvise
PostMessageA
CallMsgFilterW
DragObject
MessageBoxA
CharToOemBuffA
PostQuitMessage
SetScrollInfo
ClientToScreen
CreateDesktopA
DispatchMessageW
GetWindowLongW
GetKeyboardType
UnhookWindowsHookEx
SystemParametersInfoA
SetWindowRgn
SetWindowsHookExA
SetWindowTextA
SetWindowLongA
SendMessageTimeoutA
SendMessageA
RegisterClassExA
RegisterClassA
RedrawWindow
PeekMessageA
OffsetRect
MoveWindow
LoadStringA
LoadImageA
LoadIconA
GetLastActivePopup
ExitWindowsEx
EnumWindows
EndPaint
DispatchMessageA
DefWindowProcA
CreateWindowExA
CreateDialogParamA
CallNextHookEx
BeginPaint
CharUpperBuffA
EnableWindow
GetDlgItem
MessageBoxW
ShowWindow
FindWindowExW
GetParent
MapWindowPoints
CreateWindowExW
UpdateWindow
LoadCursorW
RegisterClassExW
DefWindowProcW
DestroyWindow
CopyRect
CharUpperW
CharToOemA
OemToCharA
OemToCharBuffA
LoadIconW
LoadBitmapW
PostMessageW
SetForegroundWindow
WaitForInputIdle
IsWindowVisible
DialogBoxParamW
DestroyIcon
SetFocus
GetClassNameW
SendDlgItemMessageW
EndDialog
GetDlgItemTextW
SetDlgItemTextW
wvsprintfW
SendMessageW
GetDC
ReleaseDC
PeekMessageW
GetMessageW
TranslateMessage
LoadStringW
GetWindowRect
GetClientRect
SetWindowPos
GetWindowTextW
SetWindowTextW
GetSystemMetrics
GetSysColor
shell32
Shell_NotifyIconW
SHGetPathFromIDListA
FindExecutableW
DuplicateIcon
ExtractIconExA
ShellExecuteExA
ShellExecuteExW
SHGetSpecialFolderLocation
SHGetPathFromIDListW
SHGetFileInfoW
SHFileOperationW
SHChangeNotify
SHGetMalloc
SHBrowseForFolderW
ShellExecuteA
ole32
CoSwitchCallContext
CoIsOle1Class
CreateStreamOnHGlobal
OleCreate
CoCreateInstance
CoInitialize
CoUninitialize
OleInitialize
CLSIDFromString
CoSetProxyBlanket
OleUninitialize
CoCopyProxy
advapi32
GetSecurityDescriptorGroup
RegQueryValueExA
DeregisterEventSource
InitializeSecurityDescriptor
GetServiceDisplayNameW
LookupPrivilegeNameW
RegisterServiceCtrlHandlerA
QueryServiceConfigW
GetServiceKeyNameW
RegSetValueExW
RegCreateKeyExW
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegCreateKeyA
RegCreateKeyExA
RegDeleteKeyA
RegDeleteValueA
RegEnumKeyExA
RegOpenKeyExA
RegQueryInfoKeyA
RegSetValueExA
gdi32
CreateBrushIndirect
AddFontResourceExW
CloseEnhMetaFile
CheckColorsInGamut
CreateDIBitmap
CreateColorSpaceA
CloseFigure
CreateBitmap
AddFontResourceA
DeleteObject
DeleteDC
StretchBlt
SelectObject
CreateCompatibleBitmap
GetObjectW
CreateCompatibleDC
GetDeviceCaps
BitBlt
ExtCreateRegion
GetObjectA
RemoveFontResourceA
TranslateCharsetInfo
AddFontMemResourceEx
AddFontResourceW
comctl32
ord17
InitCommonControlsEx
version
VerQueryValueA
GetFileVersionInfoSizeA
GetFileVersionInfoA
shlwapi
SHAutoComplete
kernel32
MultiByteToWideChar
CompareStringW
IsDBCSLeadByte
GetCPInfo
GlobalAlloc
SetCurrentDirectoryW
WriteConsoleW
SetStdHandle
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
LoadLibraryA
GetConsoleMode
GetConsoleCP
InitializeCriticalSectionAndSpinCount
QueryPerformanceCounter
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
HeapSize
LCMapStringW
LCMapStringA
IsValidCodePage
GetOEMCP
GetACP
GetModuleFileNameA
ExitProcess
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
WideCharToMultiByte
TlsSetValue
TlsAlloc
TlsGetValue
VirtualAlloc
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
VirtualFree
HeapCreate
GetStartupInfoA
GetCommandLineA
SetFileTime
ReadFile
GetFileType
SetEndOfFile
SetFilePointer
GetStdHandle
FlushFileBuffers
WriteFile
CloseHandle
CreateFileW
LocalFileTimeToFileTime
DosDateTimeToFileTime
SetLastError
GetLastError
GetCurrentDirectoryW
CreateFileA
WriteConsoleA
GetSystemTimeAsFileTime
HeapAlloc
HeapReAlloc
RaiseException
RtlUnwind
HeapFree
OpenFileMappingW
SetEnvironmentVariableW
GetTickCount
CreateFileMappingW
GetCommandLineW
MapViewOfFile
UnmapViewOfFile
Sleep
MoveFileExW
GetTempPathW
GetExitCodeProcess
FileTimeToLocalFileTime
FileTimeToSystemTime
GetTimeFormatW
GetDateFormatW
WaitForSingleObject
ExpandEnvironmentStringsW
GetNumberFormatW
GetLocaleInfoW
LoadLibraryW
GetProcAddress
FreeLibrary
GetModuleHandleW
FindResourceW
GetModuleFileNameW
GetFullPathNameW
FindFirstFileW
FindNextFileW
FindClose
CreateDirectoryW
DeleteFileW
MoveFileW
SetFileAttributesW
GetFileAttributesW
GetVersionExA
GetModuleHandleA
LocalAlloc
GetTimeFormatA
GetDateFormatA
InterlockedIncrement
InterlockedDecrement
GetTimeZoneInformation
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
CompareStringA
SetEnvironmentVariableA
TlsFree
GetFileSize
lstrlenA
GetConsoleOutputCP
VerifyVersionInfoA
GetExitCodeThread
GetCurrentThreadId
VirtualAllocEx
OpenProcess
GetCurrentProcessId
Sections
.compot Size: 50KB - Virtual size: 50KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tettra Size: 97KB - Virtual size: 327KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 219KB - Virtual size: 219KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ