Static task
static1
Behavioral task
behavioral1
Sample
f84a5a0d34b3097e688185b33e6e15757161c8e0417403acee07e05eb40fa3a5.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
f84a5a0d34b3097e688185b33e6e15757161c8e0417403acee07e05eb40fa3a5.exe
Resource
win10v2004-20220901-en
General
-
Target
f84a5a0d34b3097e688185b33e6e15757161c8e0417403acee07e05eb40fa3a5
-
Size
967KB
-
MD5
77fc40d178451bc7b6bde1726e864bd0
-
SHA1
904770a1878891dafcec82964afd1613242bd52a
-
SHA256
f84a5a0d34b3097e688185b33e6e15757161c8e0417403acee07e05eb40fa3a5
-
SHA512
5a3e8e044a58a716359b1b32fb4b3575b6f514e337ecf9cb4996082a0e4357a339c8613eff718a36e5f414335ff77df17aa99390371cbfd91a5ec1e99d2e55b2
-
SSDEEP
6144:/jJYBdCNWN02fIpjEhWVETVLADC48nzmPdiyihYTiShYTi0vvvvvvvvvvvvvv:1YBdm2fIpjEhWVETVcDr81y
Malware Config
Signatures
Files
-
f84a5a0d34b3097e688185b33e6e15757161c8e0417403acee07e05eb40fa3a5.exe windows x86
6c254ddc4f88fdbfd85b90b5fe32cd38
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LocalFree
LocalAlloc
GetModuleHandleW
FormatMessageW
GetTempFileNameW
EnterCriticalSection
LeaveCriticalSection
SetEvent
WriteFile
OpenProcess
SetLastError
GetCurrentThreadId
RaiseException
FlushInstructionCache
GetFileSize
SearchPathW
CreateThread
TerminateThread
WaitForMultipleObjects
ResetEvent
FlushFileBuffers
InitializeCriticalSection
DeleteCriticalSection
CreateEventW
lstrcpyW
lstrcmpiW
CompareStringW
CreateFileA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
GetConsoleMode
GetConsoleCP
SetFilePointer
InitializeCriticalSectionAndSpinCount
GetLocaleInfoA
GetStringTypeW
CreateMutexW
LCMapStringA
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetStartupInfoA
GetFileType
SetHandleCount
GetVersionExW
GetEnvironmentStringsW
FreeEnvironmentStringsW
LCMapStringW
GetModuleFileNameA
GetStdHandle
ExitProcess
HeapCreate
GetModuleHandleA
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
InterlockedDecrement
InterlockedIncrement
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetStartupInfoW
GetSystemTimeAsFileTime
VirtualQuery
GetSystemInfo
VirtualProtect
RtlUnwind
VirtualAlloc
VirtualFree
IsProcessorFeaturePresent
LoadLibraryA
InterlockedCompareExchange
GetProcessHeap
HeapSize
HeapReAlloc
LoadLibraryW
GetProcAddress
FreeLibrary
GetSystemDirectoryW
MoveFileW
CopyFileW
SetFileAttributesW
DeleteFileW
MoveFileExW
lstrlenW
WideCharToMultiByte
FindResourceExW
LoadResource
LockResource
SizeofResource
FindResourceW
lstrlenA
GetLastError
GetCurrentProcess
ReadFile
CreateFileW
MultiByteToWideChar
CloseHandle
GetModuleFileNameW
GetTempPathW
CreateDirectoryW
FindFirstChangeNotificationW
FindFirstFileW
FindNextFileW
HeapFree
HeapAlloc
HeapDestroy
GetCommandLineW
OpenMutexW
FindClose
WaitForSingleObject
FindNextChangeNotification
FindCloseChangeNotification
Sleep
GetStringTypeA
user32
DestroyWindow
CreateWindowExW
ShowWindow
SetTimer
KillTimer
IsWindow
GetClassInfoExW
GetWindowLongW
SetWindowLongW
CallWindowProcW
DefWindowProcW
LoadCursorW
RegisterClassExW
LoadIconW
GetDesktopWindow
GetWindowTextW
GetWindowTextLengthW
GetForegroundWindow
SendInput
PostThreadMessageW
DispatchMessageW
TranslateMessage
PeekMessageW
MsgWaitForMultipleObjectsEx
LoadBitmapW
DrawTextW
SetRectEmpty
CreateDialogParamW
SendMessageW
SetWindowTextW
SetWindowPos
GetClientRect
GetDlgItem
GetShellWindow
FindWindowW
PostMessageW
DrawEdge
DrawFocusRect
FillRect
CharNextW
GetMenu
AdjustWindowRectEx
GetSysColor
GetFocus
ReleaseDC
GetDC
OffsetRect
GetClassNameW
IsWindowEnabled
GetSystemMetrics
InflateRect
ScreenToClient
GetCursorPos
SetFocus
SetCursor
ClientToScreen
GetWindowRect
PtInRect
GetDlgCtrlID
GetParent
ReleaseCapture
SetCapture
GetCapture
SystemParametersInfoW
InvalidateRect
UpdateWindow
EndPaint
BeginPaint
UnregisterClassA
gdi32
BitBlt
CreateFontIndirectW
GetStockObject
CreateCompatibleDC
SelectObject
DeleteObject
SetBkMode
SetTextColor
DeleteDC
GetObjectW
advapi32
GetLengthSid
LookupPrivilegeValueW
AdjustTokenPrivileges
OpenProcessToken
CreateProcessAsUserW
SetTokenInformation
RegOpenKeyExW
RegFlushKey
RegSetValueExW
RegQueryValueExW
RegCreateKeyExW
RegCloseKey
GetSidSubAuthorityCount
GetSidSubAuthority
DuplicateTokenEx
ConvertStringSidToSidW
GetTokenInformation
shell32
ShellExecuteExW
ShellExecuteW
Shell_NotifyIconW
ord680
ole32
CoCreateInstance
CoInitialize
CoUninitialize
StringFromGUID2
CoCreateGuid
oleaut32
SysFreeString
shlwapi
HashData
PathFindExtensionW
PathRemoveExtensionW
PathIsFileSpecW
PathMatchSpecW
PathAppendW
UrlEscapeW
PathFileExistsW
PathRemoveFileSpecW
PathAddExtensionW
userenv
UnloadUserProfile
comctl32
_TrackMouseEvent
ImageList_Draw
ImageList_Destroy
ImageList_GetIconSize
ImageList_LoadImageW
wininet
InternetCloseHandle
HttpSendRequestW
HttpOpenRequestW
InternetConnectW
InternetOpenW
InternetGetConnectedState
HttpQueryInfoW
psapi
EnumProcesses
EnumProcessModules
GetModuleBaseNameW
urlmon
URLDownloadToFileW
iphlpapi
GetAdaptersInfo
ws2_32
closesocket
WSACleanup
WSAStartup
__WSAFDIsSet
shutdown
inet_ntoa
inet_addr
select
send
connect
htons
WSAGetLastError
socket
recv
getaddrinfo
ioctlsocket
gethostbyname
Sections
.text Size: 194KB - Virtual size: 194KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 46KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 717KB - Virtual size: 717KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ