Static task
static1
Behavioral task
behavioral1
Sample
33f0140adf89f751075ca51a1b448d78884454c5dfa34f4278e2e38579b9e111.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
33f0140adf89f751075ca51a1b448d78884454c5dfa34f4278e2e38579b9e111.exe
Resource
win10v2004-20220812-en
General
-
Target
33f0140adf89f751075ca51a1b448d78884454c5dfa34f4278e2e38579b9e111
-
Size
184KB
-
MD5
0fbb19439b440e881dc0b7a3db660f90
-
SHA1
26d7ee9657ad02fc023e411d8dae632f287864e1
-
SHA256
33f0140adf89f751075ca51a1b448d78884454c5dfa34f4278e2e38579b9e111
-
SHA512
0943dbb2e457f2f156871791a8ebbab7f9ff91a51ec56e79a41044cfd928e3456179f459ec4725aae281e8554b322e5788116479e58fe55d361ab9ae08cb3377
-
SSDEEP
3072:WoiEH2Rx+H/wKNDzyMkbyUtqGQveAqtPZuwk0ckdEz:wRx+fwKNHydxLmcZXk0ckdEz
Malware Config
Signatures
Files
-
33f0140adf89f751075ca51a1b448d78884454c5dfa34f4278e2e38579b9e111.exe windows x86
5db8f8dbc3fa2edacf3445d9923a557f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
hccutils
LoadSTRING
InitializeKeyHook
FindResources
LoadSTRINGFromHKCU
kernel32
GetProcAddress
GetModuleHandleA
CreateProcessA
FreeLibrary
LoadLibraryA
GetVersionExA
CloseHandle
GetLastError
InterlockedDecrement
SearchPathA
CompareFileTime
MultiByteToWideChar
WideCharToMultiByte
lstrlenW
RaiseException
InitializeCriticalSection
DeleteCriticalSection
lstrlenA
lstrcmpiA
InterlockedIncrement
GetModuleFileNameA
IsDBCSLeadByte
SizeofResource
LoadResource
FindResourceA
LoadLibraryExA
GetWindowsDirectoryA
Sleep
CreateMutexA
GetCurrentThreadId
GetCommandLineA
EnterCriticalSection
LeaveCriticalSection
FlushInstructionCache
GetCurrentProcess
FlushFileBuffers
GetStringTypeW
GetStringTypeA
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
HeapSize
GetStdHandle
WriteFile
HeapCreate
HeapDestroy
ExitProcess
LCMapStringW
LCMapStringA
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetOEMCP
GetCPInfo
GetStartupInfoA
HeapReAlloc
VirtualQuery
GetSystemInfo
VirtualProtect
RtlUnwind
SetFilePointer
CompareStringA
CompareStringW
SetEnvironmentVariableA
SetLastError
IsDebuggerPresent
SetUnhandledExceptionFilter
CreateFileA
UnhandledExceptionFilter
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
GetConsoleMode
GetConsoleCP
TerminateProcess
LocalFree
VirtualAlloc
VirtualFree
IsProcessorFeaturePresent
HeapAlloc
GetProcessHeap
HeapFree
InterlockedCompareExchange
GetThreadLocale
InterlockedExchange
GetACP
GetLocaleInfoA
user32
GetKeyboardLayout
MapVirtualKeyA
GetKeyNameTextA
LoadCursorA
GetClassInfoExA
SetWindowLongA
RegisterClassA
CreateWindowExA
GetMessageA
DispatchMessageA
PeekMessageA
RegisterClassExA
CreateDialogParamA
ShowWindow
PostQuitMessage
DefWindowProcA
RegisterHotKey
GetDlgItem
GetDesktopWindow
GetWindowRect
SetWindowTextA
SendMessageA
PostThreadMessageA
CharNextA
MessageBoxA
GetCursorPos
GetWindowLongA
EnumDisplaySettingsA
wsprintfA
UnregisterClassA
CallWindowProcA
DestroyWindow
UnregisterHotKey
IsWindow
advapi32
RegSetValueExA
RegQueryInfoKeyA
RegDeleteValueA
RegEnumKeyExA
RegDeleteKeyA
RegCreateKeyExA
RegOpenKeyA
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
shell32
ShellExecuteExA
ole32
CoRevokeClassObject
CoRegisterClassObject
CoCreateInstance
CoTaskMemFree
CoSuspendClassObjects
StringFromGUID2
CoUninitialize
CoInitialize
CoTaskMemRealloc
CoTaskMemAlloc
oleaut32
VarUI4FromStr
RegisterTypeLi
UnRegisterTypeLi
LoadTypeLi
SysStringLen
SysAllocString
SysFreeString
VariantClear
Sections
.text Size: 108KB - Virtual size: 108KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 24KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
clqxiqd Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE