CreateInterface
Static task
static1
Behavioral task
behavioral1
Sample
277a25d1024e556f68a92e95fb48660a70e278d65029c4933c59359d3421bdee.exe
Resource
win7-20220812-en
General
-
Target
277a25d1024e556f68a92e95fb48660a70e278d65029c4933c59359d3421bdee
-
Size
2.3MB
-
MD5
93371e2e22b1193e1fb34eb92105768f
-
SHA1
7a527082ea2ba2007d62e22c949517aa48b0b2e2
-
SHA256
277a25d1024e556f68a92e95fb48660a70e278d65029c4933c59359d3421bdee
-
SHA512
230514b807e6e9fd0fed1e9e595393de812801da8283b199599ba5610515fd40c73c98c3bcbd45418a06474d1ce22983542f03f1883cb34129dd884b4138014a
-
SSDEEP
24576:k7l4iSRiwY62bC+KVP6FCkSjrSUm0o776xhRKUS:kmiSgw8tKVRkgmDmS
Malware Config
Signatures
Files
-
277a25d1024e556f68a92e95fb48660a70e278d65029c4933c59359d3421bdee.exe windows x86
c97f5470f88b4ce0648d62828c1ddab4
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
SHDeleteKeyA
kernel32
WriteFile
IsBadReadPtr
HeapValidate
FileTimeToSystemTime
FileTimeToLocalFileTime
SetFileTime
CreateDirectoryA
DosDateTimeToFileTime
SystemTimeToFileTime
ReadFile
CloseHandle
GetCurrentProcess
LocalFree
lstrlenA
lstrlenW
GetLocaleInfoW
SetEndOfFile
SetEnvironmentVariableA
CompareStringW
CompareStringA
GetTimeZoneInformation
GetStringTypeW
GetStringTypeA
CreateProcessA
GetExitCodeProcess
GetFileAttributesA
IsBadCodePtr
SetUnhandledExceptionFilter
GetUserDefaultLCID
DuplicateHandle
GetLocaleInfoA
IsValidCodePage
IsValidLocale
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetOEMCP
GetACP
GetCPInfo
RaiseException
FlushFileBuffers
SetHandleCount
SetStdHandle
LCMapStringW
LCMapStringA
SetConsoleCtrlHandler
SetCurrentDirectoryA
GetFullPathNameA
HeapCreate
HeapDestroy
GetEnvironmentVariableA
VirtualAlloc
VirtualFree
HeapFree
HeapReAlloc
HeapAlloc
GetCurrentThread
TlsGetValue
SetLastError
TlsFree
TlsAlloc
TlsSetValue
GetCurrentThreadId
FatalAppExitA
CreateFileA
GetFileType
SetFilePointer
FreeLibrary
LoadLibraryA
GetProcAddress
GetLocalTime
GetCommandLineA
GetDiskFreeSpaceExA
GetLogicalDriveStringsA
GlobalSize
EnterCriticalSection
QueryPerformanceCounter
DeleteFileA
LeaveCriticalSection
QueryPerformanceFrequency
DeleteCriticalSection
InitializeCriticalSection
GlobalAlloc
GlobalFree
GetVersionExA
GlobalLock
GlobalUnlock
WideCharToMultiByte
InterlockedDecrement
MultiByteToWideChar
GetModuleHandleA
FindClose
FindNextFileA
FindFirstFileA
OutputDebugStringA
GetCurrentDirectoryA
CreateMutexA
GetLastError
WaitForSingleObject
GetDriveTypeA
GetModuleFileNameA
IsBadWritePtr
EnumSystemLocalesA
GetStdHandle
DebugBreak
Sleep
GetVersion
GetStartupInfoA
TerminateProcess
ExitProcess
InterlockedIncrement
MoveFileA
RtlUnwind
user32
GetParent
CreateWindowExA
CallNextHookEx
PostMessageA
CallWindowProcA
MessageBoxA
GetWindowRect
PtInRect
GetClipboardData
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
GetKeyState
DefWindowProcA
ClientToScreen
BeginPaint
EndPaint
ValidateRect
LoadCursorA
LoadIconA
RegisterWindowMessageA
PeekMessageA
GetMessageA
TranslateMessage
DispatchMessageA
SystemParametersInfoA
WindowFromPoint
GetFocus
SetCursor
SetCapture
ReleaseCapture
DestroyWindow
GetWindowLongA
SetWindowLongA
SetWindowTextW
SetWindowTextA
IsIconic
FlashWindow
SetFocus
SetWindowPos
SetForegroundWindow
SetActiveWindow
LoadImageA
CreateIconIndirect
SetTimer
DestroyIcon
GetCursorPos
SetCursorPos
GetDC
ReleaseDC
IntersectRect
InvalidateRect
GetSysColor
GetWindow
GetWindowThreadProcessId
SetWindowsHookExA
EnumChildWindows
RedrawWindow
UnhookWindowsHookEx
ShowWindow
GetClassNameA
UnregisterClassA
RegisterClassA
gdi32
AddFontResourceA
BitBlt
CreateRectRgn
SetBkMode
SetTextAlign
CreateDIBSection
StretchBlt
ExtTextOutW
CreatePen
SetTextColor
GetTextColor
GetBkColor
CreateSolidBrush
Polygon
Polyline
ExtTextOutA
MoveToEx
SetBkColor
GetDeviceCaps
SetViewportOrgEx
SetRectRgn
RemoveFontResourceA
SetMapMode
LPtoDP
DPtoLP
CreateCompatibleDC
CreateCompatibleBitmap
SelectObject
GetDIBits
DeleteObject
DeleteDC
CreateBitmap
GetCharABCWidthsA
GetCharABCWidthsW
GetTextMetricsA
CreateFontA
EnumFontFamiliesExA
GetGlyphOutlineA
GetTextExtentPoint32A
advapi32
RegOpenKeyExA
RegQueryValueExA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
shell32
Shell_NotifyIconA
ShellExecuteA
SHGetSpecialFolderPathA
DragQueryFileA
ole32
CoInitialize
OleInitialize
RegisterDragDrop
RevokeDragDrop
CoUninitialize
ReleaseStgMedium
CoCreateInstance
oleaut32
GetErrorInfo
SetErrorInfo
VariantChangeType
SysAllocString
SysFreeString
CreateErrorInfo
VariantClear
VariantInit
winmm
PlaySoundA
Exports
Exports
Sections
.text Size: 1.6MB - Virtual size: 1.6MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 112KB - Virtual size: 108KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 32KB - Virtual size: 66KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.prdata Size: 68KB - Virtual size: 68KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE