Static task
static1
Behavioral task
behavioral1
Sample
684ccc7b963b469a3881d1fe1c189da831cbcb9e7a1937167ef07ed25a9cb4bf.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
684ccc7b963b469a3881d1fe1c189da831cbcb9e7a1937167ef07ed25a9cb4bf.exe
Resource
win10v2004-20220812-en
General
-
Target
684ccc7b963b469a3881d1fe1c189da831cbcb9e7a1937167ef07ed25a9cb4bf
-
Size
420KB
-
MD5
0cf8ee346eaa8467412818d6a0fab872
-
SHA1
709ee589c3fd3a7eb6cf1969b3af11ecb4132dae
-
SHA256
684ccc7b963b469a3881d1fe1c189da831cbcb9e7a1937167ef07ed25a9cb4bf
-
SHA512
9f02812a4dc2b0feb6218c6a03ae97cd00ca5479f3c8f039319a5920fc017c9a533eb0004b629abb552ca349d4923140b61069f8f79231cc849c6e004ea4e00c
-
SSDEEP
6144:amX7vfv7ddQLkNdGS3x6/SE3BhrJRos4u1S6XH9ReQcQYufWLdp8qMN:amX7vfv7dhGP3B5JRWuBNWg9
Malware Config
Signatures
Files
-
684ccc7b963b469a3881d1fe1c189da831cbcb9e7a1937167ef07ed25a9cb4bf.exe windows x86
6343dafa0a3197e30e4473f12653407b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalFlags
GetCPInfo
GetOEMCP
WritePrivateProfileStringA
GetTickCount
SetErrorMode
RtlUnwind
RaiseException
HeapFree
HeapAlloc
HeapReAlloc
VirtualProtect
VirtualAlloc
VirtualQuery
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCommandLineA
GetProcessHeap
GetStartupInfoA
ExitProcess
SetStdHandle
HeapSize
GetACP
GetStdHandle
Sleep
TlsFree
LCMapStringW
HeapDestroy
HeapCreate
VirtualFree
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetConsoleCP
GetConsoleMode
GetTimeZoneInformation
GetDriveTypeA
GetStringTypeA
GetStringTypeW
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEnvironmentVariableA
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
GetVolumeInformationA
UnlockFile
LockFile
FlushFileBuffers
GetThreadLocale
InterlockedIncrement
GetFullPathNameA
GetFileTime
FindFirstFileA
FileTimeToLocalFileTime
FileTimeToSystemTime
FindNextFileA
FindClose
InterlockedDecrement
GetModuleFileNameW
GetCurrentProcessId
FormatMessageA
LocalFree
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
lstrcmpA
MulDiv
FreeResource
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
FreeLibrary
LoadLibraryA
SetLastError
lstrcmpW
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
WriteFile
SetFileTime
GetCurrentDirectoryA
DosDateTimeToFileTime
SystemTimeToFileTime
GetCurrentProcess
DuplicateHandle
GetFileType
SetFileAttributesA
RemoveDirectoryA
GetTempPathA
GetTempFileNameA
GetFileAttributesA
GetVersionExA
GetProcAddress
GetSystemInfo
lstrlenA
CompareStringW
CompareStringA
GetVersion
GetLastError
MultiByteToWideChar
InterlockedExchange
CreateDirectoryA
GetPrivateProfileStringA
GetModuleHandleA
GetModuleFileNameA
CreateFileA
GetFileSize
SetFilePointer
ReadFile
SetEndOfFile
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
CloseHandle
DeleteFileA
WideCharToMultiByte
FindResourceA
LoadResource
LockResource
LCMapStringA
SizeofResource
user32
GetNextDlgGroupItem
MessageBeep
UnregisterClassA
RegisterClipboardFormatA
PostThreadMessageA
DestroyMenu
GetMenuItemInfoA
InflateRect
ReleaseCapture
LoadCursorA
SetCapture
SetWindowRgn
IsRectEmpty
FindWindowA
InvalidateRect
GetWindowThreadProcessId
ShowOwnedPopups
SetCursor
GetMessageA
TranslateMessage
GetCursorPos
ValidateRect
SetWindowContextHelpId
MapDialogRect
GetDesktopWindow
GetActiveWindow
CreateDialogIndirectParamA
GetNextDlgTabItem
EndDialog
PostQuitMessage
EndPaint
BeginPaint
GetWindowDC
ReleaseDC
GetDC
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
FillRect
IsWindowEnabled
ShowWindow
SetWindowTextA
IsDialogMessageA
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
ModifyMenuA
GetMenuState
EnableMenuItem
CheckMenuItem
RegisterWindowMessageA
SendDlgItemMessageA
WinHelpA
IsChild
GetCapture
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassNameA
SetPropA
GetPropA
RemovePropA
GetFocus
SetFocus
GetWindowTextLengthA
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
SetActiveWindow
DispatchMessageA
BeginDeferWindowPos
EndDeferWindowPos
GetDlgItem
GetTopWindow
DestroyWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
PeekMessageA
MapWindowPoints
ScrollWindow
TrackPopupMenu
GetKeyState
SetScrollRange
PostMessageA
GetWindowRect
GetParent
EnableWindow
SetRect
DrawIcon
GetScrollRange
SetScrollPos
GetScrollPos
SetForegroundWindow
ShowScrollBar
IsWindowVisible
UpdateWindow
GetMenu
GetSubMenu
GetMenuItemID
GetMenuItemCount
MessageBoxA
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
GetSysColorBrush
CharNextA
UnpackDDElParam
ReuseDDElParam
LoadMenuA
LoadAcceleratorsA
InsertMenuItemA
CreatePopupMenu
SetRectEmpty
BringWindowToTop
SetMenu
TranslateAcceleratorA
InvalidateRgn
CopyAcceleratorTableA
AppendMenuA
SendMessageA
GetSystemMenu
IsIconic
GetClientRect
LoadIconA
GetSystemMetrics
IsWindow
SetTimer
KillTimer
CharUpperA
AdjustWindowRectEx
GetWindow
GetWindowPlacement
SystemParametersInfoA
IntersectRect
OffsetRect
SetWindowPos
SetWindowLongA
GetWindowLongA
CallWindowProcA
DefWindowProcA
GetDlgCtrlID
PtInRect
SetScrollInfo
GetScrollInfo
CopyRect
DeferWindowPos
EqualRect
ScreenToClient
GetSysColor
MoveWindow
gdi32
CreatePatternBrush
CreateCompatibleDC
GetStockObject
GetDeviceCaps
CreateSolidBrush
CreateEllipticRgn
DeleteDC
LPtoDP
Ellipse
CreateFontIndirectA
GetTextExtentPoint32A
CreateRectRgnIndirect
GetRgnBox
CreateCompatibleBitmap
GetBkColor
GetTextColor
GetMapMode
ExtSelectClipRgn
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetPixel
BitBlt
GetWindowExtEx
GetViewportExtEx
DeleteObject
SetMapMode
SetBkMode
RestoreDC
SaveDC
CreateBitmap
GetObjectA
SetBkColor
SetTextColor
GetClipBox
SelectObject
comdlg32
GetFileTitleA
winspool.drv
DocumentPropertiesA
OpenPrinterA
ClosePrinter
advapi32
RegSetValueExA
RegCreateKeyExA
RegQueryValueA
RegEnumKeyA
RegDeleteKeyA
RegOpenKeyA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
shell32
DragFinish
DragQueryFileA
shlwapi
PathFileExistsA
PathFindExtensionA
PathFindFileNameA
PathStripToRootA
PathIsUNCA
oledlg
ord8
ole32
OleInitialize
CoFreeUnusedLibraries
OleUninitialize
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoGetClassObject
CLSIDFromString
CLSIDFromProgID
CoTaskMemAlloc
CoTaskMemFree
CoRevokeClassObject
OleIsCurrentClipboard
OleFlushClipboard
CoRegisterMessageFilter
oleaut32
SysAllocStringLen
SysFreeString
VariantInit
VariantClear
SysAllocString
VariantChangeType
SysStringLen
SysAllocStringByteLen
VariantTimeToSystemTime
SystemTimeToVariantTime
SafeArrayDestroy
SafeArrayUnaccessData
SafeArrayAccessData
SafeArrayGetUBound
SafeArrayGetLBound
SafeArrayGetElemsize
SafeArrayGetDim
SafeArrayCreate
VariantCopy
OleCreateFontIndirect
Sections
.text Size: 284KB - Virtual size: 282KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 76KB - Virtual size: 75KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 44KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ