Static task
static1
Behavioral task
behavioral1
Sample
f748cfbcaadcad01d70037a6f03a29958b13fd20cbbc8b3990439fdf0be1ca73.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
f748cfbcaadcad01d70037a6f03a29958b13fd20cbbc8b3990439fdf0be1ca73.exe
Resource
win10v2004-20220901-en
General
-
Target
f748cfbcaadcad01d70037a6f03a29958b13fd20cbbc8b3990439fdf0be1ca73
-
Size
311KB
-
MD5
8355a6a10a61a36c29c192d7e57daf9a
-
SHA1
cae72163cdba4ef10c8d5d902b343be4cdc43023
-
SHA256
f748cfbcaadcad01d70037a6f03a29958b13fd20cbbc8b3990439fdf0be1ca73
-
SHA512
bdea3cbf1a44c7bf5eaef6f62874d5b037fbecdc8742cc7194be46aa6c622dacd6b550004cf82b815a8260536bed928448aa1eb238670041748511285aac4113
-
SSDEEP
3072:OTZISbJVJx12f9+vJWI8Qsz5mMrWifl6vTeJKDrzuEPVD4dQTVAF0ZuEPV8:C64JVJx12f9+xWRRr7flwlVMWZAF03V8
Malware Config
Signatures
Files
-
f748cfbcaadcad01d70037a6f03a29958b13fd20cbbc8b3990439fdf0be1ca73.exe windows x86
832c016c853dd73fc132741d7b465a23
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
TabbedTextOutA
GetDesktopWindow
DlgDirSelectComboBoxExA
DeleteMenu
DrawTextA
GetClassNameW
CharToOemA
CharToOemBuffA
CharUpperA
CopyRect
CreateWindowExA
DefWindowProcA
DestroyIcon
DestroyWindow
DialogBoxParamA
DispatchMessageA
EnableWindow
EndDialog
FindWindowExA
GetClassNameA
GetClientRect
GetDlgItem
GetDlgItemTextA
GetMessageA
GetParent
GetSysColor
GetSystemMetrics
GetWindow
GetWindowLongA
GetWindowRect
GetWindowTextA
IsWindowVisible
LoadBitmapA
LoadCursorA
LoadIconA
LoadStringA
MapWindowPoints
MessageBoxA
OemToCharA
OemToCharBuffA
PeekMessageA
PostMessageA
RegisterClassExA
SendDlgItemMessageA
SendMessageA
SetDlgItemTextA
SetFocus
SetMenu
SetWindowLongA
SetWindowPos
SetWindowTextA
ShowWindow
TranslateMessage
UpdateWindow
WaitForInputIdle
wsprintfA
wvsprintfA
GetLastActivePopup
CloseClipboard
IsChild
PostThreadMessageA
SetClassWord
DlgDirListA
MsgWaitForMultipleObjectsEx
IsWindow
ole32
CreateStreamOnHGlobal
CoCreateInstance
CLSIDFromString
OleInitialize
OleUninitialize
opengl32
glMateriali
glGetMapdv
glPixelStoref
glNormal3b
glPushName
glTexCoord1dv
glIndexd
kernel32
WaitForSingleObject
InitializeCriticalSectionAndSpinCount
InterlockedDecrement
InterlockedIncrement
ResumeThread
GlobalAddAtomW
GetCurrentProcessId
WritePrivateProfileStringW
RaiseException
FreeResource
GetVersionExA
LoadLibraryA
CompareStringW
GlobalFindAtomW
GetModuleHandleA
TlsGetValue
GlobalReAlloc
GlobalHandle
TlsAlloc
TlsSetValue
LocalReAlloc
TlsFree
GlobalFlags
MoveFileW
LockFile
UnlockFile
SetEndOfFile
DuplicateHandle
GetFullPathNameW
FileTimeToSystemTime
lstrlenA
FileTimeToLocalFileTime
GetFileTime
HeapFree
HeapAlloc
ConvertDefaultLocale
GetStartupInfoW
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlUnwind
GetFileAttributesA
GetTempPathA
LockFileEx
GetFullPathNameA
OutputDebugStringA
PulseEvent
CreateEventA
QueryPerformanceFrequency
GetLogicalDrives
GetStringTypeExA
CreateMutexA
GetVersion
EnumResourceLanguagesW
lstrcmpA
GetLocaleInfoW
CompareStringA
lstrcmpW
GlobalDeleteAtom
GetModuleHandleW
GlobalFree
GlobalAlloc
MulDiv
SetFilePointer
SetFilePointerEx
GetCurrentThreadId
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
GetSystemDirectoryW
CreateProcessW
GetExitCodeProcess
FindResourceW
GlobalLock
GlobalUnlock
LocalAlloc
DeleteFileA
SetEnvironmentVariableA
CreateFileA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
GetStringTypeW
GetStringTypeA
IsValidCodePage
IsValidLocale
EnumSystemLocalesA
GetDateFormatA
GetTimeFormatA
GetLocaleInfoA
GetConsoleMode
GetConsoleCP
GetTimeZoneInformation
LCMapStringW
LCMapStringA
Sleep
GetOEMCP
GetCPInfo
QueryPerformanceCounter
VirtualFree
HeapCreate
HeapDestroy
GetStartupInfoA
SetHandleCount
GetCommandLineA
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetModuleFileNameA
HeapSize
VirtualQuery
VirtualAlloc
VirtualProtect
CreateThread
ExitThread
ExitProcess
GetSystemTimeAsFileTime
GetFileType
SetStdHandle
HeapReAlloc
CreateJobObjectW
GetVolumePathNameA
CreatePipe
lstrcmpiA
LocalLock
QueryDosDeviceA
GetProcessHeap
GetCurrentDirectoryA
SetEnvironmentVariableW
ReleaseSemaphore
CreateSemaphoreA
GetShortPathNameW
CloseHandle
GetFileSizeEx
CreateFileW
CopyFileW
FlushFileBuffers
WriteFile
GetSystemTime
GetLastError
CreateMutexW
WideCharToMultiByte
GetACP
MultiByteToWideChar
lstrlenW
GetDiskFreeSpaceExW
GetDriveTypeW
GetFileAttributesW
DeleteFileW
SetFileAttributesW
SetCurrentDirectoryW
GetVolumeInformationW
SetErrorMode
lstrcpyW
GetCurrentDirectoryW
GetTempPathW
ReadFile
GetFileSize
GetDriveTypeA
GetLogicalDriveStringsA
FindClose
FindNextFileW
FindFirstFileW
FreeLibrary
GetUserDefaultLCID
LockResource
LoadResource
FindResourceExW
LoadLibraryW
GetModuleFileNameW
ReleaseMutex
SetLastError
GetUserDefaultLangID
Module32NextW
Module32FirstW
CreateToolhelp32Snapshot
Thread32Next
Thread32First
Process32NextW
OpenProcess
Process32FirstW
GetTempFileNameW
SizeofResource
GetThreadLocale
LocalFree
GetCurrentProcess
GetCurrentThread
GetVersionExW
FormatMessageW
lstrcatW
GetFileAttributesExW
FreeConsole
GetConsoleWindow
GetProcAddress
GetCommandLineW
GetStdHandle
GlobalMemoryStatusEx
IsProcessorFeaturePresent
GetSystemInfo
GetSystemWindowsDirectoryW
GetLogicalDriveStringsW
CreateDirectoryW
GetTickCount
RemoveDirectoryW
Sections
.text Size: 140KB - Virtual size: 140KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 95KB - Virtual size: 94KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 69KB - Virtual size: 69KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ