Static task
static1
Behavioral task
behavioral1
Sample
15b060af544a552d7d7d933cbbc6999ff635f29b778f9c226ca6c445eff484c8.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
15b060af544a552d7d7d933cbbc6999ff635f29b778f9c226ca6c445eff484c8.exe
Resource
win10v2004-20220812-en
General
-
Target
15b060af544a552d7d7d933cbbc6999ff635f29b778f9c226ca6c445eff484c8
-
Size
253KB
-
MD5
e657917732b92eaf3c59fc0eddeae2f2
-
SHA1
c67ec181108fa4453ef341dcf187b78c5b12a5c2
-
SHA256
15b060af544a552d7d7d933cbbc6999ff635f29b778f9c226ca6c445eff484c8
-
SHA512
dcd55546eec3f81e9d431e8420b416252b0ddfc0c78cd522c01a2768a8050bb033c1bd1ef6f0b18a4b793db5ea8e8f80e7e7d06f58e56637945cd7e97405a12a
-
SSDEEP
6144:HfZ5ZgbY5m7AORtEE7lucZpmg1pfwh9pbZoPh4:/RgE5oDTH91CbY4
Malware Config
Signatures
Files
-
15b060af544a552d7d7d933cbbc6999ff635f29b778f9c226ca6c445eff484c8.exe windows x86
f5214600caa8aa04cc88e06fcc153d2c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
VkKeyScanA
UnhookWindowsHookEx
UpdateWindow
UnregisterClassA
WaitForInputIdle
WindowFromPoint
wsprintfA
DialogBoxParamA
GetWindowThreadProcessId
ValidateRect
GetCursorPos
IsDialogMessageA
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
ModifyMenuA
GetMenuState
EnableMenuItem
CheckMenuItem
GetActiveWindow
CreateDialogIndirectParamA
IsWindowEnabled
GetNextDlgTabItem
EndDialog
RegisterWindowMessageA
WinHelpA
GetCapture
CallNextHookEx
GetClassLongA
SetPropA
GetPropA
RemovePropA
GetFocus
GetWindowTextLengthA
GetForegroundWindow
GetLastActivePopup
GetMessageTime
GetMessagePos
GetKeyState
GetMenu
GetSubMenu
GetMenuItemID
GetMenuItemCount
GetClassInfoExA
GetClassInfoA
AdjustWindowRectEx
PtInRect
GetDlgCtrlID
CallWindowProcA
GetWindowPlacement
EndPaint
GetDC
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
GetSysColorBrush
DestroyMenu
ExitWindowsEx
GetDesktopWindow
BeginPaint
IsIconic
DrawIcon
OffsetRect
LoadImageA
InvalidateRect
GetWindowDC
SetWindowRgn
GetTopWindow
SendDlgItemMessageA
GetDlgItemTextA
CheckRadioButton
GetSysColor
CharToOemA
OemToCharA
GetClassNameA
CharUpperA
GetWindowRect
GetParent
MapWindowPoints
CreateWindowExA
GetWindowLongA
DefWindowProcA
GetMessageA
DispatchMessageA
GetClientRect
CopyRect
IsWindow
GetDlgItem
EnableWindow
FindWindowExA
wvsprintfA
CharToOemBuffA
LoadStringA
GetWindowTextA
GetWindow
GetSystemMetrics
OemToCharBuffA
DestroyWindow
IsWindowVisible
IsZoomed
KillTimer
LoadBitmapA
LoadCursorA
LoadCursorFromFileA
LoadIconA
MapVirtualKeyA
MessageBeep
MessageBoxA
MessageBoxW
MoveWindow
MsgWaitForMultipleObjectsEx
OpenClipboard
PeekMessageA
PostMessageA
PostQuitMessage
RegisterClassA
RegisterClassExA
RegisterClassW
ReleaseCapture
ReleaseDC
RemoveMenu
ScreenToClient
ScrollWindowEx
SendInput
SendMessageA
SendMessageW
SetActiveWindow
SetCapture
SetCaretPos
SetClassLongA
SetClipboardData
SetCursor
SetCursorPos
SetFocus
SetForegroundWindow
SetMenu
SetParent
SetScrollInfo
SetTimer
SetWindowLongA
SetWindowLongW
SetWindowPos
SetWindowTextA
SetWindowTextW
SetWindowsHookExA
ShowWindow
SystemParametersInfoA
ToAscii
TrackPopupMenu
TranslateMessage
shell32
ShellExecuteA
SHGetPathFromIDListW
SHGetPathFromIDListA
SHGetDesktopFolder
SHBrowseForFolderW
SHBrowseForFolderA
SHChangeNotify
SHGetSpecialFolderLocation
SHGetFileInfoA
SHFileOperationA
ShellExecuteExA
SHGetMalloc
advapi32
RegCloseKey
LookupPrivilegeValueA
RegDeleteValueA
RegSetValueExA
RegCreateKeyExA
RegDeleteKeyA
RegQueryValueExA
AdjustTokenPrivileges
RegOpenKeyExA
OpenProcessToken
RegOpenKeyA
RegEnumKeyA
RegQueryValueA
gdi32
Arc
BitBlt
Chord
CombineRgn
CreateBitmap
CreateCompatibleBitmap
CreateCompatibleDC
CreateDCA
CreateDIBSection
CreateDIBitmap
CreateFontIndirectA
CreateFontIndirectW
CreatePalette
CreatePatternBrush
CreatePen
CreateRectRgn
CreateRectRgnIndirect
CreateSolidBrush
DPtoLP
DeleteDC
DeleteObject
EnumFontFamiliesA
EnumFontFamiliesW
ExtCreatePen
ExtTextOutA
GetBkMode
GetCharWidthA
GetCharWidthW
GetDIBits
GetDeviceCaps
GetFontData
GetMapMode
GetNearestColor
GetNearestPaletteIndex
GetObjectA
GetPaletteEntries
StretchBlt
GetRgnBox
GetStockObject
GetTextCharset
GetTextExtentPoint32A
GetTextExtentPoint32W
GetTextExtentPointA
GetTextFaceA
GetTextFaceW
GetTextMetricsA
OffsetClipRgn
PatBlt
Pie
Polygon
Polyline
RealizePalette
RectInRegion
Rectangle
ResizePalette
SelectClipRgn
SelectObject
SelectPalette
SetBkColor
SetBkMode
SetBrushOrgEx
SetMapMode
SetPaletteEntries
SetPolyFillMode
SetROP2
SetRectRgn
SetTextColor
StretchDIBits
TextOutA
TextOutW
TranslateCharsetInfo
UpdateColors
CreateBrushIndirect
SetTextAlign
GetBkColor
SaveDC
GetClipBox
PtVisible
RectVisible
Escape
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
GetPixel
RestoreDC
comctl32
_TrackMouseEvent
version
GetFileVersionInfoSizeA
VerQueryValueA
GetFileVersionInfoA
shlwapi
PathFindExtensionA
PathFindFileNameA
winspool.drv
DocumentPropertiesA
ClosePrinter
OpenPrinterA
kernel32
GetACP
GetCommModemStatus
GetCommState
GetCommandLineA
GetComputerNameA
GetComputerNameW
GetConsoleCP
GetConsoleMode
GetCurrentDirectoryA
GetCurrentDirectoryW
GetCurrentProcess
GetCurrentThread
GetCurrentThreadId
GetEnvironmentVariableA
GetEnvironmentVariableW
GetExitCodeProcess
GetExitCodeThread
GetFileAttributesA
GetFileAttributesW
GetFileInformationByHandle
GetFileType
GetFullPathNameA
GetFullPathNameW
GetLastError
GetLocaleInfoA
GetLogicalDriveStringsA
GetModuleFileNameA
GetModuleFileNameW
GetModuleHandleA
GetPrivateProfileStringA
FreeLibrary
GetProcessHeap
GetShortPathNameA
GetShortPathNameW
GetStartupInfoA
GetStdHandle
GetSystemInfo
GetSystemTimeAsFileTime
GetTempFileNameA
GetTempFileNameW
GetTempPathA
GetTempPathW
GetTickCount
GetTimeZoneInformation
GetVersion
GetVersionExA
GetVolumeInformationA
GetVolumeInformationW
GetWindowsDirectoryA
GetWindowsDirectoryW
GlobalAlloc
GlobalUnlock
HeapAlloc
HeapFree
InitializeCriticalSection
IsDBCSLeadByte
LeaveCriticalSection
LoadLibraryA
LoadLibraryExA
LoadLibraryExW
FormatMessageA
FlushFileBuffers
FindResourceA
FindNextFileW
FindNextFileA
FindFirstFileW
FindFirstFileA
FindClose
ExitProcess
EscapeCommFunction
EnterCriticalSection
DuplicateHandle
DeviceIoControl
DeleteFileW
DeleteFileA
DeleteCriticalSection
CreateThread
CreateSemaphoreA
CreateProcessW
CreateProcessA
CreatePipe
CreateFileW
CreateFileMappingA
CreateFileA
CreateEventA
CreateDirectoryW
CreateDirectoryA
CopyFileW
CopyFileA
CloseHandle
ClearCommError
BuildCommDCBW
BuildCommDCBA
DosDateTimeToFileTime
GetCPInfo
GetSystemTime
SystemTimeToFileTime
LocalFileTimeToFileTime
OpenFileMappingA
SetEnvironmentVariableA
MoveFileExA
ExpandEnvironmentStringsA
FileTimeToLocalFileTime
FileTimeToSystemTime
GetTimeFormatA
GetDateFormatA
GetNumberFormatA
CompareStringA
HeapReAlloc
SizeofResource
GetSystemDirectoryA
lstrcmpW
GlobalDeleteAtom
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
FreeResource
GlobalFree
lstrcmpA
EnumResourceLanguagesA
ConvertDefaultLocale
GetCurrentProcessId
LocalAlloc
GlobalReAlloc
GlobalHandle
LocalReAlloc
GlobalFlags
GetOEMCP
GetThreadLocale
WritePrivateProfileStringA
GetConsoleOutputCP
SetStdHandle
GetStringTypeW
GetStringTypeA
LCMapStringA
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
VirtualFree
HeapCreate
HeapDestroy
IsDebuggerPresent
UnhandledExceptionFilter
TerminateProcess
HeapSize
RaiseException
VirtualAlloc
RtlUnwind
GetModuleHandleW
InterlockedIncrement
InterlockedDecrement
InitializeCriticalSectionAndSpinCount
IsValidCodePage
CompareStringW
GetProcAddress
LoadResource
LocalFree
MapViewOfFile
MoveFileA
MoveFileW
MulDiv
MultiByteToWideChar
OutputDebugStringA
PeekConsoleInputA
PurgeComm
QueryPerformanceCounter
GlobalLock
GetOverlappedResult
EnumResourceNamesW
CreateSemaphoreW
LCMapStringW
LockResource
PeekNamedPipe
lstrlenW
lstrlenA
lstrcpynA
lstrcpyW
lstrcpyA
lstrcmpiA
WriteFile
WriteConsoleW
WriteConsoleA
WideCharToMultiByte
WaitForSingleObjectEx
WaitForSingleObject
WaitForMultipleObjects
VirtualQuery
VirtualProtect
UnmapViewOfFile
TlsSetValue
TlsGetValue
TlsFree
TlsAlloc
TerminateThread
Sleep
SetupComm
SetUnhandledExceptionFilter
SetThreadPriority
SetLastError
SetHandleInformation
SetFileTime
SetFilePointer
SetFileAttributesW
SetFileAttributesA
SetEvent
SetErrorMode
SetEndOfFile
SetCurrentDirectoryW
SetCurrentDirectoryA
SetConsoleMode
SetCommTimeouts
SetCommState
SearchPathW
SearchPathA
ResetEvent
RemoveDirectoryW
RemoveDirectoryA
ReleaseSemaphore
ReadFile
ReadConsoleW
ReadConsoleA
QueryPerformanceFrequency
Sections
.text Size: 119KB - Virtual size: 119KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 44KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 73KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ