Static task
static1
Behavioral task
behavioral1
Sample
0d1f3962f6323c0e65bbf44ba66767b61d0ee191a99be8c145131daaf77051d0.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0d1f3962f6323c0e65bbf44ba66767b61d0ee191a99be8c145131daaf77051d0.exe
Resource
win10v2004-20220812-en
General
-
Target
0d1f3962f6323c0e65bbf44ba66767b61d0ee191a99be8c145131daaf77051d0
-
Size
403KB
-
MD5
76cd0b81856220e3903a809eb440c7db
-
SHA1
37686414d120754eeb4868117843cd83ee3d99b1
-
SHA256
0d1f3962f6323c0e65bbf44ba66767b61d0ee191a99be8c145131daaf77051d0
-
SHA512
6805db1f8753262361ae5a5335c96d588e32f289920d7a0a09e3c0969b093343a1d966a6fa3d22f01ea19b9e725beb141f13f39290e6929dd276c40d81bd89ae
-
SSDEEP
12288:uaHXCoAnnTiQwZwG4P25z3Brp4Mcp7IJfEGGrfY:XHXQXYe25zpKMcOJnGrfY
Malware Config
Signatures
Files
-
0d1f3962f6323c0e65bbf44ba66767b61d0ee191a99be8c145131daaf77051d0.exe windows x86
8117ed1c01918c0a71b40814e1bf975b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ReadProcessMemory
GetExitCodeProcess
lstrcpynW
TerminateProcess
lstrlenW
GetLastError
FindClose
OpenThread
LockResource
lstrcatW
FindNextFileW
DeleteFileW
WriteProcessMemory
CreateThread
SetFilePointer
InterlockedIncrement
InterlockedDecrement
GlobalLock
OutputDebugStringW
WriteFile
GlobalAlloc
Sleep
IsDBCSLeadByte
CreateFileW
MultiByteToWideChar
GlobalUnlock
GlobalFree
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
GetTimeZoneInformation
DeviceIoControl
FreeResource
CreateEventW
ResumeThread
GetCommandLineW
VirtualQuery
GetCurrentProcess
QueryPerformanceCounter
CreateDirectoryW
GetSystemTimeAsFileTime
InitializeCriticalSection
GetProcessTimes
LeaveCriticalSection
SizeofResource
GetFileAttributesW
ReadFile
GetModuleFileNameW
GetProcAddress
MoveFileW
EnterCriticalSection
DeleteCriticalSection
GetCurrentProcessId
SetFileAttributesW
Process32FirstW
Process32NextW
CreateToolhelp32Snapshot
GetThreadSelectorEntry
VirtualFree
VirtualAlloc
GetCurrentThreadId
GetFileSize
GetSystemDefaultLCID
GetVersionExW
WritePrivateProfileStringW
GetTempPathW
GetPrivateProfileIntW
GetPrivateProfileSectionW
OpenProcess
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetStartupInfoW
HeapSetInformation
InterlockedCompareExchange
InterlockedExchange
DecodePointer
EncodePointer
InitializeCriticalSectionAndSpinCount
RaiseException
HeapSize
HeapReAlloc
HeapDestroy
CopyFileW
WideCharToMultiByte
LoadLibraryW
VirtualQueryEx
SetEvent
WaitForSingleObject
CreateProcessW
LoadResource
FreeLibrary
FindResourceW
FindResourceExW
FindFirstFileW
CreateFileA
SetCurrentDirectoryW
GetTickCount
CloseHandle
VirtualProtect
GetProcessHeap
GetModuleHandleW
HeapFree
HeapAlloc
user32
PostMessageW
ShowWindow
SendMessageW
EnableWindow
MapWindowPoints
SetDlgItemTextW
GetDesktopWindow
LoadImageW
RegisterClipboardFormatW
OpenClipboard
GetMenuItemCount
GetSysColorBrush
SendDlgItemMessageW
GetWindow
EmptyClipboard
DrawIconEx
GetWindowTextW
InvalidateRect
GetDC
GetClientRect
DestroyMenu
GetWindowThreadProcessId
GetGuiResources
DestroyWindow
GetClassInfoExW
ReleaseDC
CreateWindowExW
EndPaint
ClientToScreen
CallWindowProcW
SetWindowTextW
SetClipboardData
LoadIconW
GetDlgItem
EndDialog
GetWindowTextLengthW
CloseClipboard
GetSystemMenu
SetTimer
GetWindowRect
MapDialogRect
GetMenuItemID
wvsprintfW
DrawTextW
EnableMenuItem
SetWindowPos
TrackPopupMenu
SetWindowLongW
CreatePopupMenu
RegisterClassExW
IsWindow
BeginPaint
DialogBoxParamW
GetKeyState
KillTimer
DefWindowProcW
gdi32
SetTextColor
SetBkMode
DeleteObject
SelectObject
CreateFontW
GetStockObject
advapi32
RegCloseKey
RegCreateKeyExW
RegDeleteValueW
RegSetValueExW
RegOpenKeyExW
RegQueryValueExW
shell32
SHGetSpecialFolderPathW
SHGetFileInfoW
ShellExecuteExW
SHBindToParent
ord155
SHGetDesktopFolder
ShellExecuteW
ole32
DoDragDrop
OleUninitialize
CreateStreamOnHGlobal
OleInitialize
oleaut32
SysStringLen
SysAllocString
SysFreeString
SysAllocStringByteLen
SysStringByteLen
gdiplus
GdipDeleteGraphics
GdipImageGetFrameCount
GdipImageGetFrameDimensionsCount
GdipGetPropertyItemSize
GdipLoadImageFromStreamICM
GdipFree
GdipAlloc
GdiplusShutdown
GdiplusStartup
GdipGetImageHeight
GdipDrawImageRectI
GdipDisposeImage
GdipCreateFromHDC
GdipCloneImage
GdipGetImageWidth
GdipImageGetFrameDimensionsList
GdipImageSelectActiveFrame
GdipGetPropertyItem
dbghelp
SymInitialize
SymGetSymFromAddr
SymCleanup
SymLoadModule
SymSetOptions
SymGetModuleInfoW
wininet
HttpOpenRequestA
InternetCloseHandle
InternetReadFile
InternetConnectA
InternetOpenUrlA
InternetOpenA
HttpSendRequestA
psapi
GetModuleFileNameExA
GetModuleFileNameExW
comctl32
InitCommonControlsEx
ImageList_ReplaceIcon
ImageList_Create
shlwapi
PathFileExistsW
PathRemoveFileSpecW
crypt32
CertGetNameStringW
version
GetFileVersionInfoSizeW
VerQueryValueW
GetFileVersionInfoW
wintrust
WTHelperGetProvSignerFromChain
WTHelperProvDataFromStateData
WTHelperGetProvCertFromChain
WinVerifyTrust
zlib
deflateInit2_
deflate
deflateEnd
crc32
tinyxml
?Attribute@TiXmlElement@@QBEPBDPBD@Z
?LoadFile@TiXmlDocument@@QAE_NPB_WW4TiXmlEncoding@@@Z
?NextSiblingElement@TiXmlNode@@QAEPAVTiXmlElement@@XZ
?FirstChildElement@TiXmlNode@@QAEPAVTiXmlElement@@XZ
?ToElement@TiXmlNode@@UBEPBVTiXmlElement@@XZ
?ToComment@TiXmlNode@@UBEPBVTiXmlComment@@XZ
?ToUnknown@TiXmlNode@@UBEPBVTiXmlUnknown@@XZ
?ToText@TiXmlNode@@UBEPBVTiXmlText@@XZ
?ToDeclaration@TiXmlNode@@UBEPBVTiXmlDeclaration@@XZ
?ToElement@TiXmlNode@@UAEPAVTiXmlElement@@XZ
?ToComment@TiXmlNode@@UAEPAVTiXmlComment@@XZ
?ToUnknown@TiXmlNode@@UAEPAVTiXmlUnknown@@XZ
?ToText@TiXmlNode@@UAEPAVTiXmlText@@XZ
?ToDeclaration@TiXmlNode@@UAEPAVTiXmlDeclaration@@XZ
??1TiXmlDocument@@UAE@XZ
?RootElement@TiXmlDocument@@QAEPAVTiXmlElement@@XZ
?ToDocument@TiXmlDocument@@UBEPBV1@XZ
?ToDocument@TiXmlDocument@@UAEPAV1@XZ
?GetText@TiXmlElement@@QBEPBDXZ
??0TiXmlDocument@@QAE@XZ
?Parse@TiXmlDocument@@UAEPBDPBDPAVTiXmlParsingData@@W4TiXmlEncoding@@@Z
?Print@TiXmlDocument@@UBEXPAU_iobuf@@H@Z
?Accept@TiXmlDocument@@UBE_NPAVTiXmlVisitor@@@Z
?Clone@TiXmlDocument@@MBEPAVTiXmlNode@@XZ
?Value@TiXmlNode@@QBEPBDXZ
msvcp100
??1_Container_base12@std@@QAE@XZ
?_Orphan_all@_Container_base0@std@@QAEXXZ
?_Xlength_error@std@@YAXPBD@Z
?_Xout_of_range@std@@YAXPBD@Z
msvcr100
memcpy
_gmtime32
wcscpy_s
wcscat_s
fread
_mbschr
atoi
memset
_unlock
__dllonexit
_lock
_onexit
?terminate@@YAXXZ
_amsg_exit
__wgetmainargs
_cexit
_exit
_XcptFilter
exit
_wcmdln
isspace
strncmp
_mbsicmp
towlower
strncpy_s
tolower
memchr
_time64
strrchr
wcsstr
strchr
_wtoi
_beginthreadex
isalnum
sprintf_s
iswdigit
iswalnum
iswalpha
_snwprintf
fclose
fseek
ftell
fwrite
fprintf
wcsncat
_wfopen
wcsncpy
strtoul
iswspace
_wcsicmp
__argc
??2@YAPAXI@Z
_mbscmp
_vscprintf
wcsncmp
__wargv
??_V@YAXPAX@Z
wcsrchr
vsprintf_s
_wcslwr_s
strnlen
vswprintf_s
_snprintf
__CxxFrameHandler3
_mbsstr
wcsnlen
malloc
free
wmemcpy_s
memmove
??0exception@std@@QAE@ABV01@@Z
??0exception@std@@QAE@ABQBD@Z
??1exception@std@@UAE@XZ
?what@exception@std@@UBEPBDXZ
_time32
swscanf
_vscwprintf
_mbslwr_s
wcschr
_initterm
_initterm_e
_configthreadlocale
_commode
srand
memcpy_s
_purecall
_fmode
__set_app_type
memmove_s
??3@YAXPAX@Z
_crt_debugger_hook
_except_handler4_common
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_invoke_watson
_controlfp_s
_CxxThrowException
__setusermatherr
iphlpapi
GetAdaptersInfo
GetAdaptersAddresses
netapi32
Netbios
wtsapi32
WTSQuerySessionInformationW
WTSFreeMemory
Sections
.text Size: 186KB - Virtual size: 186KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 50KB - Virtual size: 49KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 3KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 62KB - Virtual size: 62KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 83KB - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE