Static task
static1
Behavioral task
behavioral1
Sample
c49bf2b7c07539cca8688018d0d6ede9571b67f152d003696eb6f8e5d309761f.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
c49bf2b7c07539cca8688018d0d6ede9571b67f152d003696eb6f8e5d309761f.exe
Resource
win10v2004-20220901-en
General
-
Target
c49bf2b7c07539cca8688018d0d6ede9571b67f152d003696eb6f8e5d309761f
-
Size
302KB
-
MD5
e847fb3f4528d7c82cadbdbf7897d40d
-
SHA1
73d6bb3b5e110b05a25212cf2b2f80f7f7509763
-
SHA256
c49bf2b7c07539cca8688018d0d6ede9571b67f152d003696eb6f8e5d309761f
-
SHA512
5b1e17626fee819ce89e4604b3e6ee65f9e34cf5cc4bb0a8300d5a87af17bba4c1cf671e62eebab6ca17a554c6883cd8077aa72b4a19fed37d117541941972d0
-
SSDEEP
6144:9dTeqdWpOXZUFVZpcozdbr9sNcQGLoGIqsSzY6uYPqp:9d/UPdbr9sNcQGjIZS8r3p
Malware Config
Signatures
Files
-
c49bf2b7c07539cca8688018d0d6ede9571b67f152d003696eb6f8e5d309761f.exe windows x86
35abf1f96c2b3629ee411ad786599110
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapAlloc
HeapFree
HeapReAlloc
RtlUnwind
RaiseException
HeapSize
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
SetUnhandledExceptionFilter
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
HeapCreate
VirtualFree
QueryPerformanceCounter
GetSystemTimeAsFileTime
TerminateProcess
UnhandledExceptionFilter
IsDebuggerPresent
ExitProcess
InitializeCriticalSectionAndSpinCount
GetTimeZoneInformation
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetConsoleCP
GetConsoleMode
GetLocaleInfoA
GetCurrentDirectoryA
GetDriveTypeA
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CreateFileA
SetEnvironmentVariableA
Sleep
GetStartupInfoW
GetFileTime
GetFileSizeEx
GetModuleHandleA
CompareStringA
InterlockedExchange
GlobalFindAtomW
GlobalDeleteAtom
GetVersionExW
LoadLibraryA
GetVersionExA
GetFullPathNameW
GetVolumeInformationW
GetCurrentProcess
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
ReadFile
GlobalAddAtomW
GlobalFlags
lstrcmpW
GetCurrentThreadId
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
GetCurrentProcessId
CompareStringW
InterlockedDecrement
InterlockedIncrement
GetThreadLocale
lstrlenA
lstrcmpA
FindFirstFileW
FileTimeToLocalFileTime
FileTimeToSystemTime
FindNextFileW
FindClose
FreeResource
GetTickCount
SetLastError
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageW
LocalFree
lstrlenW
MulDiv
FreeLibrary
LoadLibraryW
GetModuleHandleW
GetProcAddress
MultiByteToWideChar
FindResourceW
LoadResource
LockResource
SizeofResource
CloseHandle
WriteFile
WideCharToMultiByte
CreateFileW
GetLastError
RemoveDirectoryW
GetFileAttributesW
SetFileAttributesW
DeleteFileW
GetPrivateProfileStringW
GetModuleFileNameW
user32
DrawTextExW
DrawTextW
TabbedTextOutW
RegisterWindowMessageW
SendDlgItemMessageA
WinHelpW
GetCapture
GetClassLongW
SetPropW
GetPropW
RemovePropW
GetForegroundWindow
SetActiveWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetMenu
SetForegroundWindow
UpdateWindow
PostMessageW
CreateWindowExW
GetClassInfoExW
GetClassInfoW
RegisterClassW
AdjustWindowRectEx
GetMenu
SystemParametersInfoA
IsIconic
GetWindowPlacement
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapW
ModifyMenuW
EnableMenuItem
CharUpperW
ClientToScreen
GetClassNameW
MessageBeep
IsChild
GetTopWindow
GetNextDlgTabItem
GetNextDlgGroupItem
ReleaseCapture
GetDesktopWindow
SetCapture
InvalidateRgn
InvalidateRect
GetClientRect
GetWindowRect
EqualRect
IntersectRect
SetRect
IsRectEmpty
CopyAcceleratorTableW
OffsetRect
PtInRect
CopyRect
CharNextW
GetFocus
SetFocus
ShowWindow
MoveWindow
SetWindowLongW
GetDlgCtrlID
IsWindow
SetWindowTextW
IsDialogMessageW
SendDlgItemMessageW
LoadStringW
GetMessageW
GetDlgItem
PostThreadMessageW
SetWindowsHookExW
CallNextHookEx
GetActiveWindow
IsWindowVisible
GetKeyState
PeekMessageW
ValidateRect
GetWindowThreadProcessId
CreateDialogIndirectParamW
SendMessageW
GetWindowLongW
DestroyMenu
GetWindowDC
CheckMenuItem
GrayStringW
TranslateMessage
DispatchMessageW
LoadIconW
LoadCursorW
RegisterClassExW
MessageBoxW
DialogBoxParamW
DestroyWindow
DefWindowProcW
BeginPaint
EndPaint
PostQuitMessage
EndDialog
GetSubMenu
GetMenuItemCount
GetMenuItemID
GetMenuState
RegisterClipboardFormatW
SetWindowPos
MapDialogRect
GetParent
SetWindowContextHelpId
GetWindow
GetWindowTextW
GetSysColorBrush
GetSysColor
ReleaseDC
GetDC
GetSystemMetrics
UnhookWindowsHookEx
EnableWindow
IsWindowEnabled
GetLastActivePopup
CallWindowProcW
gdi32
ExtSelectClipRgn
DeleteDC
GetMapMode
SetWindowExtEx
ScaleWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutW
TextOutW
RectVisible
PtVisible
GetDeviceCaps
GetWindowExtEx
GetViewportExtEx
SetMapMode
RestoreDC
SaveDC
SetBkColor
SetTextColor
GetClipBox
CreateBitmap
DeleteObject
GetRgnBox
CreateRectRgnIndirect
GetTextColor
GetBkColor
GetObjectW
GetStockObject
comdlg32
GetFileTitleW
winspool.drv
DocumentPropertiesW
ClosePrinter
OpenPrinterW
advapi32
RegOpenKeyW
RegCloseKey
RegDeleteKeyW
shell32
SHGetPathFromIDListW
ShellExecuteW
SHGetSpecialFolderLocation
comctl32
InitCommonControlsEx
shlwapi
PathFindFileNameW
PathStripToRootW
PathIsUNCW
oledlg
OleUIBusyW
ole32
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoRegisterMessageFilter
OleFlushClipboard
OleIsCurrentClipboard
CoRevokeClassObject
CoGetClassObject
CLSIDFromString
CLSIDFromProgID
OleInitialize
CoFreeUnusedLibraries
CreateILockBytesOnHGlobal
CoTaskMemAlloc
CoCreateInstance
CoInitialize
CoUninitialize
CoTaskMemFree
OleUninitialize
oleaut32
SysFreeString
SysAllocStringLen
SysStringLen
VariantClear
VariantChangeType
VariantCopy
SafeArrayDestroy
VariantTimeToSystemTime
SystemTimeToVariantTime
OleCreateFontIndirect
SysAllocString
VariantInit
Sections
.text Size: 200KB - Virtual size: 200KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 49KB - Virtual size: 49KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 33KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ