Static task
static1
Behavioral task
behavioral1
Sample
81fd99437d28de6b364f74c501267da66e2551a68df74bdfc42791641e62652d.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
81fd99437d28de6b364f74c501267da66e2551a68df74bdfc42791641e62652d.exe
Resource
win10v2004-20220812-en
General
-
Target
81fd99437d28de6b364f74c501267da66e2551a68df74bdfc42791641e62652d
-
Size
1.0MB
-
MD5
1ecb2392fb80007e2239baaf46d69028
-
SHA1
e0a8a408652f1c99f8bdc671e29e372202b45512
-
SHA256
81fd99437d28de6b364f74c501267da66e2551a68df74bdfc42791641e62652d
-
SHA512
b982f145e990f488043c69f4ae6232d5fcfeaf3b479269b762aa0d439599c745b39c0fa21e8a5cee4666f8259307be4680ed71db90a7a2cad2e286231be213c6
-
SSDEEP
24576:YYzXAt897UEVvcpk6wq//8YRnvsG/NSoj:YYzwt8GE2KjtMj
Malware Config
Signatures
Files
-
81fd99437d28de6b364f74c501267da66e2551a68df74bdfc42791641e62652d.exe windows x86
e24c818b92ff7f6c7555599971f91414
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
version
VerQueryValueA
GetFileVersionInfoA
GetFileVersionInfoSizeA
kernel32
GetOEMCP
RtlUnwind
IsBadReadPtr
GetCommandLineA
GetCPInfo
GetProcessVersion
ExitProcess
GetSystemTime
GetLocalTime
RaiseException
TerminateProcess
HeapFree
GetTimeZoneInformation
GetACP
HeapReAlloc
HeapSize
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetEnvironmentVariableA
HeapAlloc
TlsGetValue
lstrcmpiA
GetFileType
VirtualAlloc
IsBadWritePtr
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
IsBadCodePtr
SetStdHandle
CompareStringA
CompareStringW
SetEnvironmentVariableA
MoveFileExA
CopyFileA
LocalReAlloc
GetTempPathA
GetModuleFileNameA
LoadLibraryA
GetProcAddress
TlsSetValue
EnterCriticalSection
GlobalReAlloc
LeaveCriticalSection
TlsFree
GlobalHandle
DeleteCriticalSection
TlsAlloc
InitializeCriticalSection
LocalAlloc
SizeofResource
GlobalFlags
GetFileTime
GetFileSize
GetFullPathNameA
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
WriteFile
DuplicateHandle
LocalFree
FileTimeToLocalFileTime
FileTimeToSystemTime
MulDiv
GetVersion
lstrcatA
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
lstrcpyA
InterlockedDecrement
InterlockedIncrement
GlobalDeleteAtom
lstrcmpA
GetCurrentThread
HeapDestroy
GetCurrentThreadId
FreeLibrary
GetCurrentDirectoryA
LockResource
FindResourceA
LoadResource
SetErrorMode
LoadLibraryExA
GetDriveTypeA
WideCharToMultiByte
WritePrivateProfileStringA
CreateDirectoryA
HeapCreate
GlobalFree
CreateFileA
GlobalAlloc
GetModuleHandleA
GlobalLock
GlobalUnlock
GetVersionExA
GetWindowsDirectoryA
lstrlenA
GetCurrentProcess
WinExec
MultiByteToWideChar
CreateProcessA
WaitForSingleObject
GetStartupInfoA
GetVolumeInformationA
GetSystemDirectoryA
CreateSemaphoreA
SetFilePointer
SetCurrentDirectoryA
SetLastError
VirtualFree
ReadFile
SetUnhandledExceptionFilter
GetStdHandle
CloseHandle
DeleteFileA
GetProfileStringA
GetShortPathNameA
RemoveDirectoryA
GetLastError
lstrcpynA
GetFileAttributesA
SetFileAttributesA
FindNextFileA
FindFirstFileA
FindClose
user32
IsDialogMessageA
SetWindowTextA
GetAsyncKeyState
SetDlgItemTextA
DestroyMenu
GetWindowDC
BeginPaint
EndPaint
TabbedTextOutA
DrawTextA
GrayStringA
GetClassNameA
LoadCursorA
GetSysColorBrush
InflateRect
PtInRect
WinHelpA
GetClassInfoA
RegisterClassA
GetMenu
GetMenuItemCount
GetMenuItemID
TrackPopupMenu
GetWindowTextLengthA
GetWindowTextA
GetDlgCtrlID
DefWindowProcA
CreateWindowExA
GetClassLongA
SetPropA
UnhookWindowsHookEx
GetPropA
CallWindowProcA
RemovePropA
GetMessageTime
GetMessagePos
GetForegroundWindow
GetWindow
SetWindowLongA
SetWindowPos
RegisterWindowMessageA
OffsetRect
IntersectRect
InvalidateRect
GetWindowPlacement
GetCapture
GetMenuCheckMarkDimensions
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
GetKeyState
CallNextHookEx
ValidateRect
GetCursorPos
SetWindowsHookExA
GetLastActivePopup
SetCursor
PostQuitMessage
GetNextDlgTabItem
EndDialog
GetActiveWindow
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
GetWindowLongA
GetDlgItem
IsWindowEnabled
DdeCreateDataHandle
DdeInitializeA
DdeCreateStringHandleA
DdeConnect
DdeFreeStringHandle
DdeClientTransaction
DdeGetData
DdeDisconnect
DdeUninitialize
wsprintfA
GetDesktopWindow
IsWindowVisible
GetDC
ReleaseDC
GetSystemMetrics
ExitWindowsEx
CharUpperA
GetWindowRect
DestroyIcon
InSendMessage
MapDialogRect
PostMessageA
PeekMessageA
TranslateMessage
DispatchMessageA
LoadBitmapA
LoadMenuA
GetSubMenu
ClientToScreen
IsWindow
GetParent
EnableWindow
LoadIconA
SendMessageA
SetTimer
UpdateWindow
MessageBoxA
KillTimer
AdjustWindowRectEx
ScreenToClient
GetClientRect
CopyRect
GetTopWindow
FindWindowA
GetSysColor
SendDlgItemMessageA
MapWindowPoints
CheckMenuItem
SetFocus
EnableMenuItem
IsIconic
SetForegroundWindow
ShowWindow
LoadStringA
GetMessageA
GetFocus
SystemParametersInfoA
DefDlgProcA
HideCaret
ShowCaret
ExcludeUpdateRgn
DrawFocusRect
UnregisterClassA
CharNextA
IsWindowUnicode
gdi32
CreateFontA
DeleteObject
CreateScalableFontResourceA
CreateCompatibleDC
GetObjectA
BitBlt
RealizePalette
SetDIBitsToDevice
CreateDIBitmap
CreateBitmap
GetDeviceCaps
GetClipBox
SetTextColor
PatBlt
SetBkColor
SaveDC
DeleteDC
GetStockObject
SelectPalette
SelectObject
SetBkMode
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
IntersectClipRect
CreateSolidBrush
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
AddFontResourceA
GetTextExtentPointA
RestoreDC
comdlg32
GetFileTitleA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
RegDeleteKeyA
RegSetValueExA
InitiateSystemShutdownA
RegDeleteValueA
RegQueryInfoKeyA
GetUserNameA
AdjustTokenPrivileges
RegQueryValueExA
OpenProcessToken
LookupPrivilegeValueA
RegOpenKeyExA
RegEnumKeyExA
RegCreateKeyExA
RegCloseKey
shell32
SHGetSpecialFolderLocation
SHGetPathFromIDListA
SHGetMalloc
ShellExecuteA
Shell_NotifyIconA
comctl32
CreatePropertySheetPageA
PropertySheetA
DestroyPropertySheetPage
ord17
ImageList_Create
ImageList_Destroy
ImageList_Add
ole32
OleUninitialize
CoUninitialize
OleInitialize
CoCreateInstance
CoInitialize
Sections
.text Size: 360KB - Virtual size: 359KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 80KB - Virtual size: 78KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 600KB - Virtual size: 597KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ