Static task
static1
Behavioral task
behavioral1
Sample
818cd2a588bd743dd80c937d346840f7cf150b37b2009d9c62b5a7ab8d1e5485.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
818cd2a588bd743dd80c937d346840f7cf150b37b2009d9c62b5a7ab8d1e5485.exe
Resource
win10v2004-20220901-en
General
-
Target
818cd2a588bd743dd80c937d346840f7cf150b37b2009d9c62b5a7ab8d1e5485
-
Size
825KB
-
MD5
850abc4ed1ab9444597abf5bc3f88630
-
SHA1
59bdb03b42717f569944204f87cae88ba7be026f
-
SHA256
818cd2a588bd743dd80c937d346840f7cf150b37b2009d9c62b5a7ab8d1e5485
-
SHA512
243e6adbf20cdfd72b50e9e43d6150593ddcc30988dee87378f147d1e0aae5b2d7fefb1c61587d93343d5d56e91a868d4275653e85c188d0cd5003593ed8c47f
-
SSDEEP
24576:SYUiWxGq5Z78uzCaLf6x5m9AP7DjIm18QM9:SXiIz5Z7K2q5ZQm8H
Malware Config
Signatures
Files
-
818cd2a588bd743dd80c937d346840f7cf150b37b2009d9c62b5a7ab8d1e5485.exe windows x86
c3c4900711e32d5c3f82ffdd5ce60577
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLastError
GlobalUnlock
GetLocaleInfoA
GetVolumeInformationA
GetLogicalDriveStringsA
GetTickCount
TerminateThread
GetModuleFileNameA
WaitForSingleObject
ReadFile
CloseHandle
GetTempPathA
CreateFileMappingA
WideCharToMultiByte
CopyFileA
GetCurrentThread
lstrlenA
HeapDestroy
HeapCreate
InterlockedExchangeAdd
GetModuleHandleA
FreeLibrary
VirtualProtect
TlsSetValue
SystemTimeToFileTime
SizeofResource
GetProcessHeap
InterlockedCompareExchange
GetUserDefaultLCID
InterlockedIncrement
GetTempPathW
GlobalSize
SetErrorMode
FindFirstFileA
GetProcessTimes
HeapSize
GetFileType
GetVersionExA
ExpandEnvironmentStringsA
GetCPInfo
MultiByteToWideChar
IsDBCSLeadByteEx
SetNamedPipeHandleState
GetFileSizeEx
GetShortPathNameA
IsValidCodePage
QueryPerformanceCounter
SetEnvironmentVariableA
SetCurrentDirectoryA
LeaveCriticalSection
MoveFileExW
DeleteFileW
GlobalFree
GetACP
InterlockedExchange
GetFileTime
LockFile
FindClose
SuspendThread
InitializeCriticalSection
GetFullPathNameA
GetProfileStringA
LoadResource
GetDiskFreeSpaceA
GetSystemTimeAsFileTime
GetComputerNameA
GlobalMemoryStatusEx
GetSystemInfo
TlsAlloc
LocalAlloc
GetThreadLocale
SetLastError
GetCurrentThreadId
CreateSemaphoreA
SetUnhandledExceptionFilter
PeekNamedPipe
GetStartupInfoA
GetExitCodeProcess
FileTimeToSystemTime
SetThreadExecutionState
GetSystemTime
WriteFile
SetFilePointer
IsValidLocale
AreFileApisANSI
GetCurrentProcessId
SetFileTime
GetWindowsDirectoryA
GetProcessAffinityMask
TerminateProcess
ReleaseMutex
LockFileEx
GetTempFileNameA
GetFileAttributesA
LockResource
TlsGetValue
UnlockFile
UnmapViewOfFile
CreateFileA
CreateProcessA
GetProcAddress
MapViewOfFile
TlsFree
GetFileAttributesExA
OpenFileMappingA
DeleteFileA
DeleteCriticalSection
GlobalLock
GetStdHandle
GetProcessWorkingSetSize
GetFileSize
DuplicateHandle
GetExitCodeThread
GetEnvironmentVariableA
CreatePipe
FindResourceA
ExitProcess
CreateDirectoryA
GetDriveTypeA
DeviceIoControl
GetCommandLineA
InterlockedDecrement
GlobalAlloc
SetEndOfFile
OpenProcess
Sleep
EnterCriticalSection
SetThreadLocale
FindNextFileA
LocalFileTimeToFileTime
CreateMutexA
FlushFileBuffers
CreateThread
ReleaseSemaphore
FindFirstFileExA
GetCurrentProcess
GetThreadTimes
FormatMessageA
LocalFree
ResumeThread
UnlockFileEx
GlobalMemoryStatus
SetThreadPriority
RemoveDirectoryA
user32
GetMenuItemInfoW
InsertMenuW
GetSysColor
DestroyAcceleratorTable
AppendMenuW
SetWindowPos
DdeInitializeW
WindowFromPoint
InvalidateRect
CreateDialogParamW
DrawFrameControl
GetKeyState
RegisterClassW
GetSystemMenu
ShowCursor
CreateAcceleratorTableW
InsertMenuItemW
keybd_event
CheckMenuItem
DeferWindowPos
ScreenToClient
CreateIconIndirect
ShowWindow
DestroyCursor
GetClassNameW
GetActiveWindow
DdeConnect
IsZoomed
UnionRect
GetDoubleClickTime
LoadBitmapW
EnableWindow
UpdateWindow
InflateRect
GetWindowDC
DdeGetLastError
DispatchMessageW
CloseClipboard
GetDC
SetMenu
ToUnicode
LoadImageW
GetDlgItem
SetScrollInfo
DdeCreateDataHandle
TrackPopupMenu
SetForegroundWindow
VkKeyScanW
DestroyMenu
EnumClipboardFormats
ModifyMenuW
GetSystemMetrics
GetSubMenu
DdeCreateStringHandleW
DrawFocusRect
SetTimer
OpenClipboard
RegisterWindowMessageW
DrawIcon
DrawEdge
CallWindowProcW
KillTimer
GetClassInfoW
SetClipboardData
GetScrollInfo
FindWindowExW
GetMenuItemCount
SetFocus
GetDesktopWindow
EndDialog
ChangeDisplaySettingsW
DestroyIcon
PostQuitMessage
EnumThreadWindows
GetWindowThreadProcessId
ExitWindowsEx
DdeQueryStringW
GetOpenClipboardWindow
CheckMenuRadioItem
MsgWaitForMultipleObjects
GetCaretPos
SetParent
IsWindowEnabled
IsWindow
BeginDeferWindowPos
ScrollWindow
DdeDisconnect
EnumWindows
CreatePopupMenu
RegisterClipboardFormatW
DdeNameService
LoadCursorW
GetMessageTime
PostMessageW
GetWindowTextLengthW
FlashWindow
EndPaint
GetWindowLongW
GetMenuState
SetWindowRgn
GetFocus
RemoveMenu
GetCursorPos
CreateDialogIndirectParamW
CopyRect
CallNextHookEx
IsWindowVisible
GetClipboardViewer
BringWindowToTop
GetKeyboardState
CreateMenu
TranslateMessage
GetWindow
WaitForInputIdle
GetClipboardData
GetCapture
GetQueueStatus
SetWindowTextW
OffsetRect
GetIconInfo
SystemParametersInfoW
GetClientRect
AdjustWindowRectEx
DestroyWindow
ClientToScreen
EnumDisplaySettingsW
UnregisterClassW
GetUpdateRect
EndDeferWindowPos
GetMessageW
FillRect
RedrawWindow
MapWindowPoints
LoadAcceleratorsW
PeekMessageW
ShowCaret
DdeUninitialize
EndMenu
UnhookWindowsHookEx
DrawIconEx
EmptyClipboard
GetProcessWindowStation
GetInputState
BeginPaint
MoveWindow
IsDialogMessageW
SetWindowsHookExW
GetClipboardOwner
TranslateAcceleratorW
DefWindowProcW
SetCapture
ReleaseCapture
GetForegroundWindow
LoadIconW
GetParent
ChildWindowFromPoint
SetCursorPos
GetWindowTextW
DdePostAdvise
PtInRect
SetCursor
GetUpdateRgn
SetWindowLongW
PostThreadMessageW
SetMenuItemInfoW
DrawTextW
HideCaret
IsIconic
DdeFreeDataHandle
DrawMenuBar
GetMessagePos
ReleaseDC
DrawStateW
GetWindowRect
EnableMenuItem
DdeFreeStringHandle
GetMenu
DdeGetData
MessageBeep
GetAsyncKeyState
DdeClientTransaction
gdi32
GetDIBColorTable
CloseEnhMetaFile
SetViewportExtEx
CreatePatternBrush
ExcludeClipRect
GetBkColor
GetNearestPaletteIndex
DeleteEnhMetaFile
Rectangle
SetPixel
CreateBitmapIndirect
ExtFloodFill
RectInRegion
StretchDIBits
CreateSolidBrush
CreateDIBSection
GetMetaFileBitsEx
SetMetaFileBitsEx
GetClipBox
Ellipse
CreateCompatibleBitmap
SetTextAlign
StretchBlt
MoveToEx
CreatePen
CreatePolygonRgn
GetTextColor
Polyline
PlayEnhMetaFile
CreateCompatibleDC
EqualRgn
OffsetRgn
SelectPalette
GetRegionData
GetTextMetricsW
CombineRgn
CreateRectRgn
GetRgnBox
PolyPolygon
GdiFlush
CreateBitmap
DeleteObject
ExtSelectClipRgn
PtInRegion
CreateDIBitmap
CopyEnhMetaFileW
GetObjectW
GetSystemPaletteEntries
LineTo
SetWindowOrgEx
SetMapMode
RestoreDC
SetTextColor
CreateHatchBrush
CreateRectRgnIndirect
Pie
CreateEnhMetaFileW
GetDIBits
RoundRect
ExtCreateRegion
SetWinMetaFileBits
GetCharABCWidthsW
BitBlt
Polygon
RealizePalette
SetBkMode
TextOutW
CreateICW
SelectClipRgn
PatBlt
MaskBlt
GetEnhMetaFileW
GetPaletteEntries
SetPolyFillMode
DeleteDC
GetTextExtentExPointW
GetEnhMetaFileHeader
EnumFontFamiliesExW
SaveDC
GetPixel
SetBrushOrgEx
SetStretchBltMode
GetStockObject
SetWindowExtEx
SelectObject
GetWinMetaFileBits
SetBkColor
GetDeviceCaps
SetROP2
GetTextExtentPoint32W
CreateFontIndirectW
Arc
SetViewportOrgEx
ExtCreatePen
CreatePalette
comdlg32
ChooseColorW
GetSaveFileNameW
ChooseFontW
GetOpenFileNameW
CommDlgExtendedError
advapi32
RegCloseKey
RegDeleteValueW
LookupPrivilegeValueW
ControlService
RegDeleteKeyW
RegOpenKeyExW
RegQueryValueExW
RegQueryValueExA
RegCreateKeyW
OpenServiceW
CloseServiceHandle
GetUserNameW
RegSetValueExW
RegOpenKeyExA
RegEnumKeyW
OpenProcessToken
AdjustTokenPrivileges
RegQueryInfoKeyW
OpenSCManagerW
RegEnumValueW
shell32
ExtractIconW
SHGetMalloc
DragAcceptFiles
SHGetFolderPathW
SHGetSpecialFolderLocation
Shell_NotifyIconW
DragQueryPoint
DragFinish
SHGetFileInfoW
ExtractIconExW
SHBrowseForFolderW
SHFileOperationW
SHGetIconOverlayIndexW
SHGetPathFromIDListW
DragQueryFileW
ShellExecuteExW
oleaut32
SysAllocString
SysStringLen
winmm
PlaySoundW
wsock32
recvfrom
shutdown
select
ntohl
ioctlsocket
getservbyname
__WSAFDIsSet
getsockopt
sendto
htonl
gethostbyaddr
secur32
QuerySecurityPackageInfoA
oledlg
ord3
Sections
.text Size: 400KB - Virtual size: 399KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 378KB - Virtual size: 5.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: - Virtual size: 101B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ