CreateInterface
Static task
static1
Behavioral task
behavioral1
Sample
f7499c5a83eca79287c03110b2c57bf550869e227771abc7c034436167111a42.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
f7499c5a83eca79287c03110b2c57bf550869e227771abc7c034436167111a42.exe
Resource
win10v2004-20220901-en
General
-
Target
f7499c5a83eca79287c03110b2c57bf550869e227771abc7c034436167111a42
-
Size
948KB
-
MD5
a3ac9f171a70a3d05c9eb60f41fb1620
-
SHA1
847d0cc3f421c32a248e3d9c6759dfd0bbb656ff
-
SHA256
f7499c5a83eca79287c03110b2c57bf550869e227771abc7c034436167111a42
-
SHA512
b9964e5e1075f19c0a5ab0a57ee8492a970e9224f9436126cecf039f6fb4d04055336e52ffe2ffcc098326673a78a958ebfa4529fc4aa80727443de893832c85
-
SSDEEP
12288:krwNZcpuZ1zW//s29+3gwh/xObZRCm+nxAaADfqaZdpKqwXrSAjanQNAPnFjCKiP:kENZcbZNhYcMa3a38z
Malware Config
Signatures
Files
-
f7499c5a83eca79287c03110b2c57bf550869e227771abc7c034436167111a42.exe windows x86
c72e564f39311bb3fc978ea4c7a425da
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
SHDeleteKeyA
kernel32
WriteFile
HeapAlloc
HeapReAlloc
FileTimeToSystemTime
FileTimeToLocalFileTime
SetFileTime
CreateDirectoryA
DosDateTimeToFileTime
SystemTimeToFileTime
ReadFile
CloseHandle
CreateFileA
LocalFree
lstrlenW
lstrlenA
GetLocaleInfoW
SetEndOfFile
SetConsoleCtrlHandler
SetEnvironmentVariableA
CompareStringW
CompareStringA
GetStringTypeW
GetStringTypeA
GetTimeZoneInformation
CreateProcessA
GetExitCodeProcess
GetFileAttributesA
IsBadCodePtr
SetUnhandledExceptionFilter
GetCurrentProcess
EnumSystemLocalesA
GetLocaleInfoA
IsValidCodePage
IsValidLocale
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetOEMCP
GetACP
GetCPInfo
RaiseException
HeapSize
FlushFileBuffers
GetStdHandle
SetHandleCount
SetStdHandle
LCMapStringW
LCMapStringA
SetCurrentDirectoryA
GetFullPathNameA
FatalAppExitA
IsBadWritePtr
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
GetEnvironmentVariableA
GetCurrentThread
TlsGetValue
SetLastError
TlsFree
TlsAlloc
TlsSetValue
GetCurrentThreadId
DuplicateHandle
GetFileType
SetFilePointer
FreeLibrary
LoadLibraryA
GetProcAddress
GetLocalTime
GetCommandLineA
GetDiskFreeSpaceExA
GetLogicalDriveStringsA
GlobalSize
EnterCriticalSection
QueryPerformanceCounter
MoveFileA
LeaveCriticalSection
QueryPerformanceFrequency
DeleteCriticalSection
InitializeCriticalSection
GlobalAlloc
GlobalFree
GetVersionExA
GlobalLock
GlobalUnlock
WideCharToMultiByte
InterlockedDecrement
MultiByteToWideChar
GetModuleHandleA
FindClose
FindNextFileA
FindFirstFileA
OutputDebugStringA
GetCurrentDirectoryA
CreateMutexA
GetLastError
WaitForSingleObject
GetDriveTypeA
GetModuleFileNameA
HeapFree
GetUserDefaultLCID
Sleep
GetVersion
GetStartupInfoA
TerminateProcess
ExitProcess
IsBadReadPtr
InterlockedIncrement
DeleteFileA
RtlUnwind
user32
GetParent
CreateWindowExA
CallNextHookEx
CallWindowProcA
PostMessageA
MessageBoxA
GetWindowRect
PtInRect
GetClipboardData
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
GetKeyState
BeginPaint
EndPaint
ValidateRect
ClientToScreen
DefWindowProcA
LoadCursorA
LoadIconA
RegisterWindowMessageA
PeekMessageA
GetMessageA
TranslateMessage
DispatchMessageA
SystemParametersInfoA
WindowFromPoint
GetFocus
SetCursor
SetCapture
ReleaseCapture
DestroyWindow
GetWindowLongA
SetWindowLongA
SetWindowTextW
SetWindowTextA
IsIconic
FlashWindow
SetFocus
SetWindowPos
SetForegroundWindow
SetActiveWindow
LoadImageA
CreateIconIndirect
SetTimer
DestroyIcon
GetCursorPos
SetCursorPos
GetDC
ReleaseDC
IntersectRect
InvalidateRect
GetSysColor
GetWindow
GetWindowThreadProcessId
SetWindowsHookExA
EnumChildWindows
RedrawWindow
UnhookWindowsHookEx
ShowWindow
GetClassNameA
UnregisterClassA
RegisterClassA
gdi32
AddFontResourceA
BitBlt
CreateRectRgn
SetBkMode
SetTextAlign
CreateDIBSection
StretchBlt
ExtTextOutW
CreatePen
SetTextColor
GetTextColor
GetBkColor
CreateSolidBrush
Polygon
Polyline
ExtTextOutA
MoveToEx
SetBkColor
GetDeviceCaps
SetViewportOrgEx
SetRectRgn
RemoveFontResourceA
SetMapMode
LPtoDP
DPtoLP
CreateCompatibleDC
CreateCompatibleBitmap
SelectObject
GetDIBits
DeleteObject
DeleteDC
CreateBitmap
GetCharABCWidthsA
GetCharABCWidthsW
GetTextMetricsA
CreateFontA
EnumFontFamiliesExA
GetGlyphOutlineA
GetTextExtentPoint32A
advapi32
RegOpenKeyExA
RegQueryValueExA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
shell32
Shell_NotifyIconA
ShellExecuteA
SHGetSpecialFolderPathA
DragQueryFileA
ole32
CoInitialize
OleInitialize
RegisterDragDrop
RevokeDragDrop
CoUninitialize
ReleaseStgMedium
CoCreateInstance
oleaut32
VariantClear
GetErrorInfo
SetErrorInfo
VariantChangeType
SysAllocString
SysFreeString
CreateErrorInfo
VariantInit
winmm
PlaySoundA
Exports
Exports
Sections
.text Size: 440KB - Virtual size: 438KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 68KB - Virtual size: 66KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 40KB - Virtual size: 71KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
�]� Size: 88KB - Virtual size: 88KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE