Static task
static1
Behavioral task
behavioral1
Sample
f9e2c83ecc291a4126d65025cdd4496d716d81ea234fb66d442876d41e314c54.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f9e2c83ecc291a4126d65025cdd4496d716d81ea234fb66d442876d41e314c54.exe
Resource
win10v2004-20220812-en
General
-
Target
f9e2c83ecc291a4126d65025cdd4496d716d81ea234fb66d442876d41e314c54
-
Size
672KB
-
MD5
72797345849cf9cd216fb85e53fe6620
-
SHA1
c678b48095973cc2b9ae95eb9da2971b8dfa3e89
-
SHA256
f9e2c83ecc291a4126d65025cdd4496d716d81ea234fb66d442876d41e314c54
-
SHA512
3371e20873aaa34076fb22ed7cf597028e169a4e39afbb1083f082678a3ec7ab472ca60ec304afaf65402a17508f25e6148106c3061b54ac0092f1030599e78b
-
SSDEEP
6144:LRR+XVM9tBJEGof51Z2SwNdOIb0dHvMKEAt9WvXfsxD/8E/1b0s3JJpcaKIrKia3:2lAVr6ZU2H0KE4bfJJpXKaahMAYPZC8O
Malware Config
Signatures
Files
-
f9e2c83ecc291a4126d65025cdd4496d716d81ea234fb66d442876d41e314c54.exe windows x86
fc899c4dd1a09d187064660cca7c5b13
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetOEMCP
HeapFree
HeapAlloc
VirtualAlloc
HeapReAlloc
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetSystemTimeAsFileTime
ExitThread
CreateThread
GetCommandLineA
GetProcessHeap
GetStartupInfoA
RtlUnwind
ExitProcess
RaiseException
SetStdHandle
GetFileType
HeapSize
HeapDestroy
HeapCreate
VirtualFree
GetStdHandle
GetCPInfo
LCMapStringA
LCMapStringW
GetTimeZoneInformation
GetStringTypeA
GetStringTypeW
GetConsoleCP
GetConsoleMode
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
QueryPerformanceCounter
GetTickCount
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEnvironmentVariableA
SetErrorMode
InterlockedIncrement
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
GlobalHandle
GlobalReAlloc
TlsGetValue
GlobalFlags
GlobalGetAtomNameA
GlobalFindAtomA
lstrcmpW
GetVersionExA
InterlockedDecrement
GetFileTime
CreateFileA
GetFullPathNameA
GetVolumeInformationA
GetCurrentProcess
DuplicateHandle
GetThreadLocale
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
LocalAlloc
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
FormatMessageA
LocalFree
SuspendThread
SetThreadPriority
WritePrivateProfileStringA
GlobalAddAtomA
GetCurrentProcessId
SetLastError
GetCurrentThread
GetCurrentThreadId
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
LoadLibraryA
lstrcmpA
FreeLibrary
GlobalDeleteAtom
GetModuleHandleA
GetProcAddress
FreeResource
ResumeThread
CloseHandle
ResetEvent
GlobalFree
GlobalUnlock
MulDiv
CreateEventA
GlobalAlloc
SetEvent
GlobalLock
DeleteFileA
GetTempPathA
FileTimeToLocalFileTime
FindNextFileA
GetModuleFileNameA
LockResource
GetLocalTime
FindClose
FindFirstFileA
GetModuleFileNameW
FileTimeToSystemTime
GetFileAttributesA
SizeofResource
Sleep
WaitForSingleObject
LoadResource
FindResourceA
GetVersion
CompareStringA
CreateMutexA
GetLastError
InterlockedExchange
MultiByteToWideChar
CompareStringW
WideCharToMultiByte
lstrlenA
GetACP
user32
UnregisterClassA
LoadCursorA
GetSysColorBrush
ShowWindow
SetWindowTextA
IsDialogMessageA
RegisterWindowMessageA
SendDlgItemMessageA
WinHelpA
GetCapture
GetClassLongA
GetClassNameA
SetPropA
GetPropA
RemovePropA
GetForegroundWindow
GetTopWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetForegroundWindow
UpdateWindow
GetMenu
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
PtInRect
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
SetWindowLongA
SystemParametersInfoA
GetWindowPlacement
GetWindowRect
UnhookWindowsHookEx
EndPaint
BeginPaint
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
GetWindow
SetFocus
GetMenuItemID
GetMenuItemCount
GetSubMenu
GetDesktopWindow
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
GetDlgItem
GetNextDlgTabItem
EndDialog
SetWindowsHookExA
CallNextHookEx
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
IsWindowVisible
GetKeyState
PeekMessageA
GetCursorPos
ValidateRect
GetWindowThreadProcessId
GetWindowLongA
GetLastActivePopup
IsWindowEnabled
MessageBoxA
SetCursor
PostQuitMessage
DestroyMenu
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
GetFocus
GetParent
ModifyMenuA
GetMenuState
EnableMenuItem
CheckMenuItem
FillRect
GetDC
SetRect
InvalidateRect
ReleaseDC
GetSysColor
CopyRect
IsIconic
LoadIconA
DrawIcon
FindWindowExA
GetClientRect
SendMessageA
GetWindowTextA
EnumChildWindows
IsWindow
PostMessageA
GetSystemMetrics
EnableWindow
FindWindowA
CharUpperA
SetWindowPos
gdi32
GetStockObject
GetObjectA
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
CreateSolidBrush
GetClipBox
SetMapMode
SetTextColor
SetBkColor
RestoreDC
SaveDC
CreateBitmap
BitBlt
DeleteDC
GetDeviceCaps
DeleteObject
SelectObject
CreateCompatibleDC
CreateCompatibleBitmap
comdlg32
GetFileTitleA
winspool.drv
OpenPrinterA
ClosePrinter
DocumentPropertiesA
advapi32
CryptDestroyHash
RegSetValueExA
RegCreateKeyExA
RegEnumKeyA
RegDeleteKeyA
CryptHashData
RegQueryValueExA
CryptCreateHash
CryptAcquireContextA
CryptReleaseContext
CryptGetHashParam
RegCloseKey
RegOpenKeyA
RegQueryValueA
RegOpenKeyExA
RegEnumKeyExA
shell32
ShellExecuteExA
SHGetSpecialFolderLocation
SHGetMalloc
SHGetPathFromIDListA
SHGetFolderPathA
SHGetSpecialFolderPathA
comctl32
InitCommonControlsEx
shlwapi
PathFindFileNameA
UrlUnescapeA
PathStripToRootA
PathFindExtensionA
PathIsUNCA
ole32
CoCreateInstance
CoUninitialize
CoInitialize
CreateStreamOnHGlobal
oleaut32
VariantTimeToSystemTime
SystemTimeToVariantTime
OleLoadPicture
SysAllocString
SysStringLen
SysFreeString
VariantClear
VariantChangeType
VariantInit
wininet
InternetQueryDataAvailable
HttpOpenRequestA
InternetOpenUrlA
InternetConnectA
HttpSendRequestA
InternetReadFile
InternetWriteFile
InternetSetFilePointer
InternetSetStatusCallback
InternetOpenA
InternetGetLastResponseInfoA
InternetCloseHandle
HttpQueryInfoA
InternetErrorDlg
FtpGetFileA
InternetCrackUrlA
InternetCanonicalizeUrlA
InternetQueryOptionA
Sections
.text Size: 220KB - Virtual size: 217KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 48KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 388KB - Virtual size: 385KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ