Static task
static1
Behavioral task
behavioral1
Sample
17d89d09a0f65d24f6847de6b4ec84794742ae6dc0e1dd8912abc3a33334e751.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
17d89d09a0f65d24f6847de6b4ec84794742ae6dc0e1dd8912abc3a33334e751.exe
Resource
win10v2004-20220901-en
General
-
Target
17d89d09a0f65d24f6847de6b4ec84794742ae6dc0e1dd8912abc3a33334e751
-
Size
796KB
-
MD5
a38c562a0008d3ba7ac1f3f728c6c7e0
-
SHA1
1a9200d4e5e2e0d6ce3a30d68116b63f22fab15f
-
SHA256
17d89d09a0f65d24f6847de6b4ec84794742ae6dc0e1dd8912abc3a33334e751
-
SHA512
412048a4182f38e0acf20ba5ee1a942e7710cf414efa60f450686bef9f2b95c293e93211f793a5c5601be5766321e4f1e33c4785d4be4671b493d5661a8ca2c7
-
SSDEEP
12288:Oai1cP7MlyjQTL9SSUl0e5rCSx7kg/G/1/RSSUlhW3xoOBhfUeTMR+93sw9wHX3B:XeWsTL9He5FP/G/f83OBGz43gXmy
Malware Config
Signatures
Files
-
17d89d09a0f65d24f6847de6b4ec84794742ae6dc0e1dd8912abc3a33334e751.exe windows x86
650d7843aac6d5a0ae6ca811e7b3962c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
memset
malloc
free
memcpy
fopen
fread
fwrite
ftell
fseek
fclose
ferror
time
srand
rand
_strnicmp
strncmp
strncpy
_strdup
sprintf
atof
log10
strlen
strcmp
memmove
strcpy
strcat
memcmp
atoi
_stricmp
longjmp
_setjmp3
fabs
ceil
floor
localtime
mktime
gmtime
exit
__p__iob
fprintf
getenv
sscanf
kernel32
GetModuleHandleA
HeapCreate
HeapDestroy
ExitProcess
ReleaseMutex
CloseHandle
CreateMutexA
GetLastError
SetErrorMode
GetDiskFreeSpaceExA
GetUserDefaultLangID
GetSystemDirectoryA
GetVersionExA
WideCharToMultiByte
HeapFree
HeapAlloc
SetFileAttributesA
CreateFileA
SetFileTime
SystemTimeToFileTime
LocalFileTimeToFileTime
MultiByteToWideChar
FreeLibrary
LoadLibraryA
GetProcAddress
EnterCriticalSection
WaitForSingleObject
LeaveCriticalSection
InitializeCriticalSection
CreateThread
TerminateThread
GetFileSize
ReadFile
Sleep
GetCurrentThreadId
GetCurrentProcessId
GetModuleFileNameA
GetEnvironmentVariableA
SetEnvironmentVariableA
GetCurrentProcess
DuplicateHandle
CreatePipe
GetStdHandle
CreateProcessA
SetFilePointer
SetEndOfFile
WriteFile
IsBadReadPtr
HeapReAlloc
SetLastError
TlsAlloc
TlsSetValue
GlobalAlloc
GlobalFree
MulDiv
GetTempPathA
CreateDirectoryA
GetDriveTypeA
FindFirstFileA
FindClose
GetFileAttributesA
DeleteFileA
FindNextFileA
RemoveDirectoryA
CopyFileA
GetLocalTime
comctl32
InitCommonControls
ImageList_SetBkColor
InitCommonControlsEx
ImageList_Destroy
ImageList_Remove
ImageList_AddMasked
ImageList_Create
ImageList_Add
ImageList_ReplaceIcon
user32
SetWindowLongA
ShowWindow
ExitWindowsEx
SendMessageA
GetActiveWindow
OemToCharA
GetSysColorBrush
SetClassLongA
GetParent
GetWindowLongA
GetWindow
RedrawWindow
GetSysColor
GetClassNameA
IsWindow
FillRect
DrawTextA
GetDlgCtrlID
InvalidateRect
CallWindowProcA
ShowCursor
DestroyWindow
CharUpperA
BeginPaint
EndPaint
DefWindowProcA
LoadIconA
RegisterClassExA
CreateWindowExA
MessageBoxA
GetWindowThreadProcessId
IsWindowVisible
IsWindowEnabled
GetForegroundWindow
EnableWindow
EnumWindows
GetWindowRect
ScreenToClient
GetIconInfo
SetWindowPos
UpdateWindow
ReleaseCapture
DrawStateA
SetCapture
GetSystemMetrics
SetWindowTextA
GetWindowTextLengthA
GetWindowTextA
GetClientRect
LoadCursorA
GetDC
InflateRect
GetPropA
ReleaseDC
GetWindowDC
RemovePropA
SetPropA
PostMessageA
ValidateRect
MapWindowPoints
MoveWindow
PeekMessageA
TranslateMessage
DispatchMessageA
SetActiveWindow
UnregisterClassA
DestroyAcceleratorTable
RegisterClassA
AdjustWindowRectEx
CreateAcceleratorTableA
GetMenu
IsZoomed
IsIconic
MsgWaitForMultipleObjects
GetMessageA
TranslateAcceleratorA
EnumChildWindows
DefFrameProcA
SetCursorPos
LoadImageA
SetCursor
SystemParametersInfoA
GetKeyState
GetCursorPos
SetFocus
GetFocus
IsChild
DestroyIcon
CreateIconFromResourceEx
CreateIconFromResource
gdi32
DeleteObject
GetStockObject
CreateSolidBrush
SetBkMode
SetTextColor
SetBkColor
SelectObject
GetObjectType
GetObjectA
ExcludeClipRect
CreateCompatibleBitmap
CreateDCA
CreateCompatibleDC
DeleteDC
StretchBlt
SetStretchBltMode
SetBrushOrgEx
SetDIBits
CreateDIBSection
GetDIBits
BitBlt
CreateBitmap
SetPixel
GetDeviceCaps
CreateFontA
advapi32
GetUserNameA
RegOpenKeyExA
RegConnectRegistryA
RegQueryValueExA
RegCloseKey
RegCreateKeyExA
RegSetValueExA
imagehlp
MakeSureDirectoryPathExists
shell32
ExtractIconA
SHGetSpecialFolderLocation
SHGetPathFromIDListA
SHBrowseForFolderA
ShellExecuteExA
ole32
CoCreateGuid
StringFromGUID2
CoTaskMemFree
CoInitialize
CoCreateInstance
CoUninitialize
RevokeDragDrop
winmm
timeEndPeriod
setupapi
SetupIterateCabinetA
Sections
.code Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 143KB - Virtual size: 143KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 21KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 220KB - Virtual size: 224KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 26KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ