Static task
static1
Behavioral task
behavioral1
Sample
c061f17f65917eb7339d40aaf12f86392490b19e7f5511286ddfb2f0c3864e36.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
c061f17f65917eb7339d40aaf12f86392490b19e7f5511286ddfb2f0c3864e36.exe
Resource
win10v2004-20220901-en
General
-
Target
c061f17f65917eb7339d40aaf12f86392490b19e7f5511286ddfb2f0c3864e36
-
Size
732KB
-
MD5
419c2668d2ba72c9b6a27b8f9a0a76bc
-
SHA1
217f8f5a17501aedb51c95c62218ef18ce1b24f0
-
SHA256
c061f17f65917eb7339d40aaf12f86392490b19e7f5511286ddfb2f0c3864e36
-
SHA512
f3cf5a9e34c0b158872fbede95fce919193e0726fd2a87ef7fd5deca8ff6cda46587ae39a28a4bb34f36e30e8c1bc765779eb5851ee3c610c44ad0161b48f07a
-
SSDEEP
12288:goWSUtIOWTm1EvMe7sdIQV5ItZ9TWCp8635CFTw3EY4bjQ:y2OgdwhV56Z9TURw3EZjQ
Malware Config
Signatures
Files
-
c061f17f65917eb7339d40aaf12f86392490b19e7f5511286ddfb2f0c3864e36.exe windows x86
7cd7af3c7f9b9420d3655fbaac0afe99
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetFileAttributesA
LCMapStringA
FlushFileBuffers
GetStartupInfoA
GetFileType
FindResourceA
MoveFileA
GetCommandLineA
FatalAppExitA
GlobalLock
SetUnhandledExceptionFilter
SystemTimeToFileTime
VirtualQuery
GetEnvironmentVariableA
HeapSize
GetTimeFormatA
LoadResource
InterlockedIncrement
GetModuleFileNameA
GetDiskFreeSpaceExA
SetFileAttributesA
GetCurrentDirectoryA
GetCurrentProcess
RtlUnwind
GetDateFormatA
TerminateProcess
GetSystemInfo
GetTimeZoneInformation
GlobalUnlock
SetEndOfFile
lstrcpyA
GetPrivateProfileStringA
GlobalDeleteAtom
GetCPInfo
SetLastError
GetWindowsDirectoryA
GetLocaleInfoA
FindClose
LoadLibraryA
GetACP
FreeEnvironmentStringsW
WideCharToMultiByte
ReadFile
GetLastError
CreateMutexA
FreeLibrary
LCMapStringW
VirtualProtect
WriteConsoleA
SetCurrentDirectoryA
TlsGetValue
VirtualFree
GetEnvironmentStringsW
SetEvent
GetStringTypeW
SetHandleCount
CompareStringA
SetConsoleCtrlHandler
GetConsoleCP
HeapDestroy
CreateFileA
Sleep
GetCurrentThread
VirtualAlloc
GetSystemTimeAsFileTime
GetStdHandle
InterlockedDecrement
lstrlenA
ResumeThread
GlobalAlloc
lstrcmpiA
GlobalFlags
WriteFile
GetTickCount
RaiseException
FindNextFileA
CompareStringW
GetUserDefaultLCID
FormatMessageA
EnterCriticalSection
SetStdHandle
HeapAlloc
GetModuleHandleA
UnhandledExceptionFilter
IsValidLocale
CompareFileTime
SizeofResource
GetTempFileNameA
WriteConsoleW
GetConsoleOutputCP
GetSystemDirectoryA
GetCurrentProcessId
ExitThread
GlobalMemoryStatus
GetVersionExA
EnumSystemLocalesA
CreateEventA
SetErrorMode
SuspendThread
MulDiv
FreeEnvironmentStringsA
SetFileTime
lstrlenW
MapViewOfFile
GetOEMCP
HeapCreate
lstrcmpA
LocalFileTimeToFileTime
GetCurrentThreadId
CreateThread
IsValidCodePage
FileTimeToLocalFileTime
GetConsoleMode
CreateProcessA
GetStringTypeA
TlsAlloc
HeapReAlloc
GetLocaleInfoW
SetFilePointer
IsDebuggerPresent
GetLocalTime
DeleteFileA
WaitForSingleObject
SetEnvironmentVariableA
LeaveCriticalSection
GetSystemTime
DeleteCriticalSection
ExitProcess
GetEnvironmentStrings
GetProcAddress
InterlockedExchange
LocalReAlloc
GetFileSize
GetProcessHeap
FindFirstFileA
GlobalGetAtomNameA
InitializeCriticalSection
TlsFree
CloseHandle
HeapFree
MultiByteToWideChar
TlsSetValue
lstrcpyW
GetShortPathNameA
QueryPerformanceCounter
comctl32
ImageList_Destroy
ImageList_DragShowNolock
ImageList_DragLeave
ImageList_DragMove
InitCommonControlsEx
ImageList_Remove
ImageList_Draw
ord17
ImageList_AddMasked
ImageList_GetImageCount
ImageList_SetBkColor
ImageList_Add
PropertySheetA
DestroyPropertySheetPage
_TrackMouseEvent
ImageList_GetImageInfo
ImageList_ReplaceIcon
ImageList_GetIconSize
ImageList_EndDrag
ImageList_LoadImageA
ImageList_GetIcon
ImageList_Create
ImageList_DrawEx
ole32
OleRun
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoTaskMemFree
OleRegGetUserType
CreateILockBytesOnHGlobal
GetHGlobalFromILockBytes
CoCreateInstance
OleDuplicateData
advapi32
RegQueryInfoKeyA
RegCreateKeyA
RegCloseKey
CreateServiceA
FreeSid
InitializeSecurityDescriptor
DeleteService
RegEnumKeyExA
OpenProcessToken
RegDeleteKeyA
RegSetValueExA
AllocateAndInitializeSid
CloseServiceHandle
RegEnumKeyA
GetUserNameA
ControlService
OpenSCManagerA
RegEnumValueA
OpenServiceA
RegOpenKeyExA
GetTokenInformation
RegDeleteValueA
RegCreateKeyExA
RegQueryValueExA
RegOpenKeyA
AdjustTokenPrivileges
LookupPrivilegeValueA
RegQueryValueA
OpenThreadToken
SetSecurityDescriptorDacl
user32
InvalidateRgn
LockWindowUpdate
SetMenuItemInfoA
GetMessagePos
GetCapture
GetActiveWindow
GetMenuItemInfoA
LoadCursorA
GetDCEx
GetWindowThreadProcessId
LoadBitmapA
LoadIconA
FrameRect
IntersectRect
EndDeferWindowPos
ReleaseDC
CreateWindowExA
BeginDeferWindowPos
GetCaretPos
GetMenuState
GetNextDlgTabItem
ScrollWindow
SetScrollPos
GetSysColorBrush
PostThreadMessageA
WindowFromPoint
SendMessageA
UpdateWindow
WaitMessage
BringWindowToTop
DeferWindowPos
SetCursor
InsertMenuA
SetMenuItemBitmaps
SetWindowLongA
ReleaseCapture
ReuseDDElParam
CharNextA
DrawIcon
GetDlgCtrlID
SetWindowRgn
GetParent
SetForegroundWindow
MapDialogRect
DrawMenuBar
GetTopWindow
RegisterClipboardFormatA
WinHelpA
IsWindow
RemovePropA
GetDlgItemTextA
GetWindowLongA
TrackPopupMenu
SystemParametersInfoA
ExitWindowsEx
SetFocus
GetMessageA
InvertRect
IsClipboardFormatAvailable
SetActiveWindow
ShowScrollBar
EnableWindow
ModifyMenuA
GetWindow
GetDlgItem
DestroyIcon
UnpackDDElParam
DefWindowProcA
ValidateRect
IsZoomed
GetMenuStringA
DestroyWindow
SetCapture
DeleteMenu
GetKeyState
DestroyCursor
GetScrollPos
CreatePopupMenu
DestroyMenu
CheckRadioButton
MessageBoxA
IsWindowVisible
SetParent
TranslateMessage
InvalidateRect
ShowOwnedPopups
CallWindowProcA
RegisterClassA
GetFocus
CheckMenuItem
PostMessageA
DrawTextA
GetMenuCheckMarkDimensions
SendNotifyMessageA
PeekMessageA
LoadAcceleratorsA
TranslateAcceleratorA
ShowWindow
TabbedTextOutA
IsRectEmpty
RegisterClassExA
SetRect
GetSystemMetrics
RedrawWindow
AdjustWindowRectEx
wsprintfA
SetMenu
SetTimer
SetWindowPlacement
GetWindowTextA
MapWindowPoints
shlwapi
PathFindExtensionA
PathStripToRootA
PathIsUNCA
PathFindFileNameA
winspool.drv
OpenPrinterA
GetJobA
ClosePrinter
DocumentPropertiesA
GetPrinterA
ord204
wsock32
WSACleanup
shell32
SHBrowseForFolderA
ShellExecuteA
SHGetPathFromIDListA
ord155
gdi32
GetTextExtentPoint32A
CreateBitmapIndirect
GetClipBox
SetBitmapDimensionEx
CloseEnhMetaFile
GetWindowExtEx
Arc
CreatePenIndirect
GetMapMode
SetROP2
ScaleWindowExtEx
SelectClipRgn
StretchDIBits
RectInRegion
GetCharWidthA
ExtTextOutA
SetBkMode
CreateDCA
CreateSolidBrush
CreatePalette
PathToRegion
SetTextJustification
Pie
Escape
GetBkColor
TextOutA
PatBlt
GetViewportExtEx
GetDeviceCaps
ExcludeClipRect
GetObjectType
ResetDCA
PlayMetaFile
SetMapMode
DeleteObject
CreatePatternBrush
SetTextAlign
DeleteDC
SetStretchBltMode
GetNearestPaletteIndex
CreateFontIndirectA
FrameRgn
Polygon
CreateRoundRectRgn
PolylineTo
SetArcDirection
LineTo
InvertRgn
CreateFontA
Polyline
CreateCompatibleDC
CreatePolygonRgn
GetRegionData
SetPolyFillMode
PolyBezierTo
PlayEnhMetaFile
SetAbortProc
SetWindowOrgEx
FillPath
GetRgnBox
SelectObject
SetPixel
StretchBlt
LPtoDP
GetBoundsRect
GetWindowOrgEx
ScaleViewportExtEx
CopyMetaFileA
StartDocA
GetObjectA
CreateEnhMetaFileA
GetBitmapDimensionEx
UnrealizeObject
Sections
.text Size: 104KB - Virtual size: 103KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 472KB - Virtual size: 471KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 92KB - Virtual size: 91KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 60KB - Virtual size: 58KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ