Static task
static1
Behavioral task
behavioral1
Sample
17914b0aad2094b1989b3c6dc2f27e0bf2a6f331caddabf09d1a8ee2023f81b0.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
17914b0aad2094b1989b3c6dc2f27e0bf2a6f331caddabf09d1a8ee2023f81b0.exe
Resource
win10v2004-20220812-en
General
-
Target
17914b0aad2094b1989b3c6dc2f27e0bf2a6f331caddabf09d1a8ee2023f81b0
-
Size
346KB
-
MD5
8010bc18613f664ac2e43b31848196d0
-
SHA1
1adf6b8632f819414d165d83b64430a1d50e0e44
-
SHA256
17914b0aad2094b1989b3c6dc2f27e0bf2a6f331caddabf09d1a8ee2023f81b0
-
SHA512
3bf3279318dc9c958ad802daf0f61146cf3fcc2fcd2c5df013f7207b2a13c3763b42b4e27ee2c02158f6deffd825d6beb56f4e7ab3948b996860b8de8c0e697b
-
SSDEEP
3072:4WmmLxZK46X+iuU0lT1SJd2+hS6o3plbJsuD6/juNbPARC6BKBXDmh6Fq:4WvVs46OiuBlRSnzuaCyVKK6Fq
Malware Config
Signatures
Files
-
17914b0aad2094b1989b3c6dc2f27e0bf2a6f331caddabf09d1a8ee2023f81b0.exe windows x86
f7bc45325e3594ed02c939ba586e299a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
IsWindowUnicode
DefDlgProcA
ExcludeUpdateRgn
ShowCaret
HideCaret
GetWindowPlacement
CallWindowProcA
DdeAbandonTransaction
SetWindowTextA
CascadeWindows
MapDialogRect
GetCursorInfo
InsertMenuW
IsWindowVisible
GetSysColorBrush
EnumPropsW
TabbedTextOutA
IsWindow
BeginDeferWindowPos
EndDialog
EnableMenuItem
GetSystemMenu
SetClassLongA
IsWindowEnabled
CheckDlgButton
GetMessagePos
LoadBitmapA
CloseClipboard
EmptyClipboard
RegisterClassA
TrackPopupMenu
AppendMenuA
CreatePopupMenu
SetDlgItemTextA
GetDlgItemTextA
MessageBoxIndirectA
CharPrevA
CreateDialogParamA
PostQuitMessage
SetForegroundWindow
SendMessageTimeoutA
FindWindowExA
DialogBoxParamA
CharNextA
OpenClipboard
ExitWindowsEx
SetWindowLongA
LoadImageA
DefWindowProcA
BeginPaint
FillRect
DrawTextA
EndPaint
GetClassInfoA
GetMenuItemCount
DrawFocusRect
FrameRect
PtInRect
UnionRect
GetAsyncKeyState
GetCursorPos
ScreenToClient
SystemParametersInfoA
IsIconic
GrayStringA
GetDlgItem
GetWindowTextLengthA
GetWindowTextA
GetDlgCtrlID
GetClassLongA
SetPropA
CopyRect
OffsetRect
CallNextHookEx
SetWindowsHookExA
wsprintfA
UnhookWindowsHookEx
MessageBoxA
IntersectRect
DrawFrameControl
ClientToScreen
UpdateWindow
GetWindowRect
GetDesktopWindow
SetRectEmpty
SetCursor
ReleaseCapture
KillTimer
SetCapture
SetTimer
LoadCursorA
GetDC
ReleaseDC
LoadIconA
EnableWindow
GetWindowRgn
SetWindowRgn
GetMenu
GetSubMenu
GetMenuItemID
BringWindowToTop
PeekMessageA
TranslateMessage
DispatchMessageA
PostMessageA
DestroyWindow
GetWindowThreadProcessId
GetParent
SendMessageA
SetWindowPos
WaitForInputIdle
EnumWindows
GetWindowLongA
SetClipboardData
SetParent
GetSystemMetrics
ShowWindow
InvalidateRect
GetClientRect
GetSysColor
InflateRect
IsDialogMessageA
InvalidateRgn
DrawIcon
CreateWindowExA
GetPropA
CheckRadioButton
comdlg32
GetSaveFileNameA
PrintDlgA
GetFileTitleA
GetOpenFileNameA
CommDlgExtendedError
ChooseColorA
shell32
ShellExecuteA
ShellExecuteExA
SHGetPathFromIDListA
SHBrowseForFolderA
SHGetDesktopFolder
DragQueryFileA
DragAcceptFiles
SHGetSpecialFolderLocation
SHFileOperationA
SHGetFileInfoA
SHGetMalloc
ole32
CLSIDFromString
CoGetClassObject
StgOpenStorageOnILockBytes
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
CoTaskMemFree
CoTaskMemAlloc
CoUninitialize
CoCreateInstance
CoInitialize
OleFlushClipboard
OleIsCurrentClipboard
OleInitialize
OleUninitialize
CoFreeUnusedLibraries
CoRegisterMessageFilter
CoRevokeClassObject
CLSIDFromProgID
advapi32
RegQueryValueA
RegCloseKey
RegDeleteValueA
RegCreateKeyExA
RegOpenKeyExA
RegQueryValueExA
RegDeleteKeyA
RegSetValueExA
gdi32
GetCurrentPositionEx
LineTo
MoveToEx
IntersectClipRect
SelectClipRgn
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
RestoreDC
SaveDC
GetClipBox
SetTextColor
SetBkMode
TextOutA
GetSystemPaletteEntries
RemoveFontResourceA
AddFontResourceA
StartDocA
StartPage
EndPage
EndDoc
AbortDoc
GetPixel
Polygon
Ellipse
GetWindowOrgEx
GdiFlush
CreatePen
GetStockObject
SetRectRgn
GetRegionData
ExtCreateRegion
CreatePolygonRgn
GetEnhMetaFileBits
SetEnhMetaFileBits
PlayEnhMetaFile
DeleteEnhMetaFile
CreateFontA
GetCharWidthA
DPtoLP
SetMapMode
SetBkColor
GetTextMetricsA
CreateBitmap
ExtTextOutA
PatBlt
CreateDIBitmap
CreateCompatibleDC
CreateCompatibleBitmap
GetDIBits
DeleteDC
StretchDIBits
SetDIBitsToDevice
GetTextExtentPoint32A
CreateFontIndirectA
RealizePalette
CreateSolidBrush
GetObjectA
GetDeviceCaps
GetMapMode
SelectObject
SelectPalette
BitBlt
OffsetRgn
CombineRgn
CreateRectRgnIndirect
CreateRectRgn
EqualRgn
CreateBrushIndirect
SetTextAlign
SetWindowOrgEx
GetViewportExtEx
GetWindowExtEx
PtVisible
RectVisible
Escape
GetTextColor
GetBkColor
DeleteMetaFile
DeleteObject
CloseMetaFile
GetTextAlign
CreateDCA
LPtoDP
GetTextExtentPointA
CreatePalette
opengl32
glRasterPos3f
glLogicOp
glTexCoord3f
glMaterialfv
glLineWidth
glTexParameterfv
glLightModelfv
glVertex3d
comctl32
ImageList_Create
ImageList_AddMasked
ImageList_Destroy
kernel32
FindResourceA
GetFileSize
SetThreadPriority
CreateEventA
GetLocaleInfoW
VirtualLock
VirtualProtect
GlobalFindAtomA
GetVersion
SetLastError
lstrcpynA
DuplicateHandle
FlushFileBuffers
LockFile
UnlockFile
SetEndOfFile
FindClose
FindFirstFileA
LoadResource
TlsFree
DeleteCriticalSection
TlsAlloc
InitializeCriticalSection
TlsGetValue
TlsSetValue
GetVolumeInformationA
GetFullPathNameA
GetThreadLocale
ResumeThread
EnterCriticalSection
GetPrivateProfileIntA
GetPrivateProfileStringA
WritePrivateProfileStringA
FileTimeToSystemTime
FileTimeToLocalFileTime
GetCurrentThread
GetFileTime
FindNextFileA
GlobalHandle
LocalReAlloc
GlobalFlags
GetProcessVersion
SizeofResource
SetErrorMode
GetCurrentDirectoryA
RtlUnwind
HeapAlloc
GetFileType
RaiseException
GetTimeZoneInformation
GetSystemTime
GetLocalTime
GetStartupInfoA
GetCommandLineA
ExitProcess
GetSystemTimeAsFileTime
LeaveCriticalSection
lstrcmpA
GlobalDeleteAtom
GetFileAttributesA
CopyFileA
CreateMutexA
GlobalGetAtomNameA
GetCurrentProcess
SetPriorityClass
WaitForMultipleObjects
SetEvent
lstrcmpiA
GetOEMCP
GetCPInfo
GlobalAddAtomA
OpenMutexA
GetWindowsDirectoryA
CreateDirectoryA
GetDriveTypeA
GlobalReAlloc
OutputDebugStringA
CreateToolhelp32Snapshot
Process32First
OpenProcess
Process32Next
GetExitCodeProcess
GetModuleFileNameA
GetVersionExA
GlobalMemoryStatus
LocalLock
LocalUnlock
LocalAlloc
SetFilePointer
ReadFile
GlobalAlloc
GlobalSize
GetCurrentThreadId
DeleteFileA
WriteFile
GetModuleHandleA
FormatMessageA
LocalFree
TerminateThread
CreateThread
MultiByteToWideChar
UnmapViewOfFile
CreateFileMappingA
GetLastError
MapViewOfFile
QueryPerformanceCounter
QueryPerformanceFrequency
MulDiv
CreateFileA
DosDateTimeToFileTime
LocalFileTimeToFileTime
SetFileTime
CloseHandle
SetFileAttributesA
GetSystemDirectoryA
LoadLibraryA
GetProcAddress
FreeLibrary
GlobalUnlock
GlobalFree
WaitForSingleObject
GetTickCount
Sleep
lstrcatA
lstrlenA
lstrcpyA
TerminateProcess
CreateProcessA
WideCharToMultiByte
HeapFree
GetProfileStringA
LoadLibraryExA
ExpandEnvironmentStringsA
GetTempFileNameA
RemoveDirectoryA
GetDiskFreeSpaceA
SetCurrentDirectoryA
MoveFileA
GetShortPathNameA
SearchPathA
CompareFileTime
GetModuleHandleW
InterlockedIncrement
InterlockedDecrement
IsDebuggerPresent
GetCurrentProcessId
InitializeCriticalSectionAndSpinCount
GetConsoleCP
GetConsoleMode
ExitThread
GetACP
HeapSize
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SuspendThread
GlobalLock
GetOverlappedResult
EnumResourceNamesW
CreateSemaphoreW
LCMapStringW
LockResource
PeekNamedPipe
GetTempPathA
HeapReAlloc
IsProcessorFeaturePresent
SetComputerNameExW
MapViewOfFileEx
AddAtomW
IsBadStringPtrW
UnregisterWait
SetEnvironmentVariableA
IsBadCodePtr
IsBadReadPtr
GetStringTypeW
GetStringTypeA
LCMapStringA
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
CompareStringW
CompareStringA
GetUserDefaultLCID
EnumSystemLocalesA
GetLocaleInfoA
IsValidCodePage
IsValidLocale
SetUnhandledExceptionFilter
GetStdHandle
SetHandleCount
Sections
.text Size: 150KB - Virtual size: 149KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 97KB - Virtual size: 96KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 93KB - Virtual size: 92KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ