Static task
static1
Behavioral task
behavioral1
Sample
c7c1ae02ea878e6fbfea4dc69fecbd0a40646258d0f8978af099b02b57986e43.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c7c1ae02ea878e6fbfea4dc69fecbd0a40646258d0f8978af099b02b57986e43.exe
Resource
win10v2004-20220901-en
General
-
Target
c7c1ae02ea878e6fbfea4dc69fecbd0a40646258d0f8978af099b02b57986e43
-
Size
3.2MB
-
MD5
c675abc27e666aa4e56055709200f10d
-
SHA1
46b94782a199189f213972a34c3474fb244e6be2
-
SHA256
c7c1ae02ea878e6fbfea4dc69fecbd0a40646258d0f8978af099b02b57986e43
-
SHA512
914d4c74508a3b710d0eb9f1ed741c90d3297ec5e9874bf3cf6b5df21bb5e7d021399087c5184f4f0fe06ce71db1c69f115535333f860fe94df0594565840ed7
-
SSDEEP
24576:EpOmyEmuPTFzC4PsBwEH7H2WBXQMURIibjeWW70y9mUE:EGEmuLFzCesZbDB1UtW7VcD
Malware Config
Signatures
Files
-
c7c1ae02ea878e6fbfea4dc69fecbd0a40646258d0f8978af099b02b57986e43.exe windows x86
34f2aed30ddfabc1309382c77276ccc1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetThreadLocale
GetModuleHandleW
SetFilePointer
FlushFileBuffers
LockFile
UnlockFile
SetEndOfFile
DuplicateHandle
GetCurrentProcess
GetVolumeInformationA
GetCPInfo
GetOEMCP
SetErrorMode
GetFileSizeEx
HeapAlloc
HeapFree
GetCommandLineA
GetStartupInfoA
ExitThread
GetSystemTimeAsFileTime
RtlUnwind
ExitProcess
RaiseException
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
HeapReAlloc
HeapSize
TerminateProcess
UnhandledExceptionFilter
InterlockedIncrement
IsDebuggerPresent
GetACP
IsValidCodePage
LCMapStringA
LCMapStringW
VirtualFree
HeapCreate
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetConsoleCP
GetConsoleMode
InitializeCriticalSectionAndSpinCount
GetStringTypeA
GetStringTypeW
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetProcessHeap
CompareStringW
SetEnvironmentVariableA
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
GlobalHandle
GlobalReAlloc
TlsGetValue
LocalAlloc
GlobalFlags
InterlockedDecrement
GetModuleFileNameW
GlobalGetAtomNameA
GlobalFindAtomA
lstrcmpW
GlobalAddAtomA
FormatMessageA
LocalFree
MulDiv
GetCurrentProcessId
SetLastError
GlobalUnlock
WritePrivateProfileStringA
FreeResource
GlobalFree
GlobalDeleteAtom
GetCurrentThread
GetCurrentThreadId
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
CompareStringA
InterlockedExchange
GlobalLock
lstrcmpA
GlobalAlloc
GetModuleHandleA
CreateFileW
SetThreadPriority
ResumeThread
QueryPerformanceCounter
DeleteCriticalSection
FileTimeToLocalFileTime
FileTimeToSystemTime
GetTimeZoneInformation
InitializeCriticalSection
QueryPerformanceFrequency
GetSystemTime
CreateEventA
ResetEvent
GetLastError
LeaveCriticalSection
EnterCriticalSection
WinExec
lstrlenA
lstrcatA
lstrcpyA
GetWindowsDirectoryA
GetTickCount
GetVersionExA
GetProcAddress
LoadLibraryA
FreeLibrary
DeviceIoControl
FindClose
FindFirstFileA
MultiByteToWideChar
SetFileTime
SetFilePointerEx
ReadFile
GetFileSize
GetFileTime
GetFileAttributesA
GetExitCodeProcess
WaitForSingleObject
CreateProcessA
SetVolumeMountPointA
GetVolumeNameForVolumeMountPointA
DefineDosDeviceA
GetLogicalDrives
GetDriveTypeA
GetLogicalDriveStringsA
Sleep
GetFullPathNameA
DeleteFileA
WriteFile
SetFileAttributesA
GetTempPathA
CreateFileA
CopyFileA
CloseHandle
CreateThread
GetModuleFileNameA
FindResourceA
LoadResource
LockResource
SizeofResource
SetUnhandledExceptionFilter
WideCharToMultiByte
user32
RegisterClipboardFormatA
PostThreadMessageA
IsRectEmpty
CopyAcceleratorTableA
CharNextA
WindowFromPoint
DestroyMenu
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
RegisterWindowMessageA
SendDlgItemMessageA
WinHelpA
IsChild
GetCapture
GetClassLongA
GetClassNameA
SetPropA
GetPropA
RemovePropA
GetForegroundWindow
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
MapWindowPoints
SetMenu
SetForegroundWindow
UpdateWindow
CreateWindowExA
GetClassInfoA
RegisterClassA
EqualRect
CopyRect
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
GetMenu
OffsetRect
IntersectRect
SystemParametersInfoA
GetWindowPlacement
GetWindowTextLengthA
GetWindowTextA
SetFocus
SetWindowsHookExA
CallNextHookEx
GetMessageA
TranslateMessage
DispatchMessageA
IsWindowVisible
GetKeyState
PeekMessageA
GetCursorPos
ValidateRect
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
GetFocus
ModifyMenuA
CheckMenuItem
EndPaint
BeginPaint
GetWindowDC
ClientToScreen
ScreenToClient
GrayStringA
DrawTextExA
EnableWindow
LoadIconA
GetSystemMenu
AppendMenuA
DrawTextA
TabbedTextOutA
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
GetWindowThreadProcessId
GetLastActivePopup
GetDesktopWindow
GetActiveWindow
UnregisterClassA
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
CharUpperA
GetSysColorBrush
GetNextDlgGroupItem
InvalidateRgn
AdjustWindowRectEx
SetRect
LoadBitmapA
SendMessageA
GetClientRect
GetWindowRect
GetSystemMetrics
SetTimer
EnableMenuItem
MessageBoxA
KillTimer
IsIconic
DrawIcon
PtInRect
InvalidateRect
PostMessageA
SetCursor
LoadCursorA
GetSysColor
MessageBeep
ReleaseCapture
RedrawWindow
SetCapture
SetWindowLongA
IsWindow
GetParent
GetDC
ReleaseDC
InflateRect
CopyIcon
PostQuitMessage
SetWindowPos
MapDialogRect
SetWindowContextHelpId
GetWindow
EndDialog
GetNextDlgTabItem
IsWindowEnabled
GetDlgItem
GetWindowLongA
GetClassInfoExA
gdi32
CreateBitmap
CreateRectRgnIndirect
DeleteDC
GetMapMode
GetBkColor
GetTextColor
GetRgnBox
PtVisible
ExtSelectClipRgn
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
RectVisible
SetViewportOrgEx
Escape
ExtTextOutA
CreateFontIndirectA
GetWindowExtEx
GetViewportExtEx
DeleteObject
GetClipBox
SetMapMode
SetTextColor
SetBkMode
SetBkColor
RestoreDC
SaveDC
GetDeviceCaps
GetTextExtentPoint32A
GetStockObject
CreateSolidBrush
GetObjectA
BitBlt
SelectObject
CreateCompatibleDC
TextOutA
msimg32
TransparentBlt
comdlg32
GetFileTitleA
winspool.drv
DocumentPropertiesA
ClosePrinter
OpenPrinterA
advapi32
RegQueryValueExA
RegOpenKeyA
RegEnumKeyA
RegDeleteKeyA
RegOpenKeyExA
RegSetValueExA
RegCreateKeyExA
RegQueryValueA
RegEnumKeyExA
RegCloseKey
shell32
ShellExecuteA
comctl32
InitCommonControlsEx
_TrackMouseEvent
shlwapi
PathFindFileNameA
PathStripToRootA
PathIsUNCA
PathAppendA
PathFindExtensionA
oledlg
ord8
ole32
CoRevokeClassObject
OleInitialize
CoFreeUnusedLibraries
OleUninitialize
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
OleIsCurrentClipboard
CoTaskMemAlloc
CoTaskMemFree
CLSIDFromString
CLSIDFromProgID
OleFlushClipboard
CoRegisterMessageFilter
CoGetClassObject
oleaut32
SysFreeString
SysAllocStringLen
SysStringLen
SysAllocStringByteLen
VariantClear
VariantChangeType
VariantInit
OleCreateFontIndirect
VariantTimeToSystemTime
SystemTimeToVariantTime
SafeArrayDestroy
SysAllocString
VariantCopy
Sections
.text Size: 299KB - Virtual size: 299KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 67KB - Virtual size: 67KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 14KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2.8MB - Virtual size: 2.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 46KB - Virtual size: 46KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ