InjectEx
Static task
static1
Behavioral task
behavioral1
Sample
91400e86b3726ad2b8543ca9c818d6187dc7952d93b592bb5a757048b58cec78.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
91400e86b3726ad2b8543ca9c818d6187dc7952d93b592bb5a757048b58cec78.exe
Resource
win10v2004-20220812-en
General
-
Target
91400e86b3726ad2b8543ca9c818d6187dc7952d93b592bb5a757048b58cec78
-
Size
797KB
-
MD5
92efc11ce986b92403af9eadbc34f250
-
SHA1
4c06dc228f4c7bcbad7764e8fd91f5e98599b3a0
-
SHA256
91400e86b3726ad2b8543ca9c818d6187dc7952d93b592bb5a757048b58cec78
-
SHA512
5dd375f5e05dd23fdff7dda4e8d58c6d56074768a6787e4ed14dd7a927a5668afebf81cfe9462fa71c8aca1513e4cc7d1988ab447d57f6f9c6cb8791f8edf98a
-
SSDEEP
12288:JsKyvgAhEjCsPUyKy/1PcxkaVCUq8pONEtZSio9TfwZbFQ:2Ky4jOscyKy/muaEKONEtZk9TfYb
Malware Config
Signatures
Files
-
91400e86b3726ad2b8543ca9c818d6187dc7952d93b592bb5a757048b58cec78.exe windows x86
0403d0e26876a97b94654f6024a35b9f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
TlsGetValue
GlobalReAlloc
GlobalHandle
TlsAlloc
TlsSetValue
LocalReAlloc
TlsFree
GlobalFlags
GetCurrentDirectoryA
GetCPInfo
GetOEMCP
GetSystemDirectoryW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetSystemTimeAsFileTime
ExitProcess
HeapReAlloc
GetTimeFormatA
GetDateFormatA
VirtualProtect
VirtualAlloc
GetSystemInfo
GetCommandLineA
RtlUnwind
RaiseException
ExitThread
CreateThread
HeapSize
SetStdHandle
GetFileType
GetACP
SetErrorMode
InterlockedIncrement
GetStdHandle
GetTimeZoneInformation
GetConsoleCP
GetConsoleMode
LCMapStringA
LCMapStringW
HeapCreate
VirtualFree
InitializeCriticalSectionAndSpinCount
GetStringTypeA
GetStringTypeW
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetLocaleInfoW
CompareStringW
SetEnvironmentVariableA
InterlockedDecrement
CreateFileW
InterlockedCompareExchange
GetFileSizeEx
SystemTimeToFileTime
LocalFileTimeToFileTime
SetHandleCount
GetFileAttributesExA
GetModuleFileNameW
LocalAlloc
FileTimeToLocalFileTime
GlobalGetAtomNameA
GlobalFindAtomA
lstrcmpW
GetDiskFreeSpaceA
GetTempFileNameA
GetFileTime
SetFileTime
GlobalAddAtomA
FreeResource
GetCurrentProcessId
GlobalDeleteAtom
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
LoadLibraryExA
CompareStringA
lstrcmpA
CreateEventA
SuspendThread
SetEvent
GetCurrentThreadId
FormatMessageA
LocalFree
MulDiv
GetFullPathNameA
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
SetLastError
lstrcmpiA
GetThreadLocale
GetStringTypeExA
WriteProcessMemory
VirtualAllocEx
VirtualProtectEx
FlushInstructionCache
GetVersionExW
LoadLibraryW
VirtualFreeEx
CreateRemoteThread
GetModuleHandleW
GlobalUnlock
GlobalLock
GlobalSize
GetModuleHandleA
ResumeThread
GetCurrentThread
GetShortPathNameA
VirtualQuery
TerminateProcess
FindNextFileA
FileTimeToSystemTime
GetDriveTypeA
GetCurrentProcess
GetComputerNameA
GetTickCount
GetVolumeInformationA
GlobalMemoryStatus
GetVersionExA
FindClose
FindFirstFileA
GetPrivateProfileSectionNamesA
WritePrivateProfileStringA
GetPrivateProfileIntA
GetPrivateProfileStringA
GetFileAttributesA
FreeLibrary
GetProcAddress
LoadLibraryA
GlobalFree
GlobalAlloc
MoveFileA
CreateDirectoryA
DeleteFileA
OpenProcess
Process32Next
Process32First
CreateToolhelp32Snapshot
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
MultiByteToWideChar
ReadFile
CreateProcessA
GetStartupInfoA
CreatePipe
DeviceIoControl
HeapFree
GetProcessHeap
HeapAlloc
ReleaseMutex
GetModuleFileNameA
CreateMutexA
FindResourceA
LoadResource
LockResource
SizeofResource
WideCharToMultiByte
WaitForSingleObject
InterlockedExchange
InterlockedExchangeAdd
WriteFile
Sleep
CreateFileA
GetLastError
lstrlenA
IsValidCodePage
CloseHandle
user32
SetRect
CopyAcceleratorTableA
CharNextA
DeleteMenu
GetSysColorBrush
EndPaint
BeginPaint
GetWindowDC
ReleaseDC
GetDC
GrayStringA
DrawTextExA
TabbedTextOutA
IsZoomed
UnpackDDElParam
ReuseDDElParam
LoadMenuA
DestroyMenu
LoadAcceleratorsA
InsertMenuItemA
CreatePopupMenu
SetRectEmpty
BringWindowToTop
TranslateAcceleratorA
ReleaseCapture
SetCapture
ClientToScreen
SetWindowRgn
DrawIcon
FillRect
IsRectEmpty
RegisterWindowMessageA
WinHelpA
GetCapture
GetClassLongA
GetForegroundWindow
SetActiveWindow
BeginDeferWindowPos
EndDeferWindowPos
DestroyWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
MapWindowPoints
ScrollWindow
TrackPopupMenu
SetMenu
SetScrollRange
InvalidateRgn
SetScrollPos
GetScrollPos
ShowScrollBar
GetClassInfoExA
GetClassInfoA
GetSysColor
ScreenToClient
EqualRect
DeferWindowPos
GetScrollInfo
SetScrollInfo
CopyRect
UpdateWindow
GetWindowThreadProcessId
EnumWindows
GetParent
PtInRect
CallWindowProcA
GetMenu
OffsetRect
IntersectRect
SystemParametersInfoA
GetWindowPlacement
InvalidateRect
IsIconic
AdjustWindowRectEx
GetWindowRect
IsChild
ShowOwnedPopups
SetCursor
GetWindowTextLengthA
SetFocus
ShowWindow
GetDlgCtrlID
SetWindowTextA
IsDialogMessageA
SendDlgItemMessageA
GetDlgItem
SetWindowContextHelpId
MapDialogRect
GetNextDlgGroupItem
GetNextDlgTabItem
MessageBeep
DestroyIcon
EndDialog
CreateDialogIndirectParamA
InflateRect
SetWindowPos
GetWindowLongA
GetMenuItemInfoA
GetSystemMenu
SetParent
WindowFromPoint
GetScrollRange
UnregisterClassA
GetWindowTextA
GetClientRect
SetTimer
PostQuitMessage
KillTimer
SetForegroundWindow
PostMessageA
SendMessageTimeoutA
GetDesktopWindow
GetWindow
GetClassNameA
EnableWindow
SetWindowLongA
SetPropA
RemovePropA
SendMessageA
ExitWindowsEx
DrawTextA
GetTopWindow
GetPropA
DefWindowProcA
PostThreadMessageA
LoadIconA
LoadCursorA
RegisterClassA
CreateWindowExA
IsWindow
CloseWindow
MoveWindow
MessageBoxW
GetSystemMetrics
CharUpperA
GetSubMenu
GetMenuItemCount
InsertMenuA
GetMenuItemID
GetLastActivePopup
IsWindowEnabled
MessageBoxA
RegisterClipboardFormatA
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
GetFocus
ModifyMenuA
EnableMenuItem
CheckMenuItem
SetWindowsHookExA
CallNextHookEx
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
IsWindowVisible
GetKeyState
PeekMessageA
GetCursorPos
ValidateRect
GetMenuState
GetMenuStringA
AppendMenuA
gdi32
GetRgnBox
CreateRectRgnIndirect
GetTextColor
GetBkColor
CreateSolidBrush
GetMapMode
CreatePatternBrush
ExtSelectClipRgn
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
Escape
PtVisible
GetPixel
GetWindowExtEx
GetViewportExtEx
IntersectClipRect
ExcludeClipRect
SetMapMode
RestoreDC
SaveDC
GetTextExtentPoint32A
GetTextMetricsA
Ellipse
LPtoDP
CreateEllipticRgn
SetBkColor
GetClipBox
CreateBitmap
GetStockObject
CreateDIBitmap
ExtTextOutA
CreateDCA
TextOutA
GetDeviceCaps
CreateFontIndirectA
SelectObject
SetTextColor
SetBkMode
DeleteObject
DeleteDC
CreateCompatibleBitmap
GetObjectA
CreateCompatibleDC
BitBlt
RectVisible
comdlg32
GetFileTitleA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
RegSetValueA
RegCreateKeyA
GetFileSecurityA
SetFileSecurityA
RegQueryValueA
RegEnumKeyA
RegDeleteKeyA
RegDeleteValueA
RegCreateKeyExA
RegOpenKeyA
LookupPrivilegeValueW
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegSetValueExA
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
shell32
SHGetFileInfoA
DragFinish
DragQueryFileA
ExtractIconA
ShellExecuteA
comctl32
InitCommonControlsEx
shlwapi
PathIsUNCA
PathFindFileNameA
PathFindExtensionA
PathFileExistsA
PathStripToRootA
PathRemoveFileSpecW
oledlg
ord8
ole32
OleUninitialize
CoFreeUnusedLibraries
CoTaskMemAlloc
CoTaskMemFree
CoCreateInstance
StgIsStorageFile
StgOpenStorage
OleInitialize
CLSIDFromProgID
CLSIDFromString
CoGetClassObject
CoRevokeClassObject
OleIsCurrentClipboard
OleFlushClipboard
CoRegisterMessageFilter
StgOpenStorageOnILockBytes
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
CoUninitialize
CoInitializeEx
CreateStreamOnHGlobal
oleaut32
VariantCopy
VariantInit
SafeArrayDestroy
OleCreateFontIndirect
SysAllocString
VariantChangeType
VariantClear
SysAllocStringByteLen
SysStringLen
SystemTimeToVariantTime
VariantTimeToSystemTime
SysAllocStringLen
SysFreeString
gdiplus
GdipFree
GdipAlloc
GdipDisposeImage
GdipCloneImage
GdipSaveImageToStream
GdipCreateBitmapFromScan0
GdipCreateBitmapFromHBITMAP
GdipGetImageEncodersSize
GdipGetImageEncoders
GdiplusStartup
GdiplusShutdown
avicap32
capCreateCaptureWindowA
capGetDriverDescriptionA
msvfw32
ICCompressorFree
ICSeqCompressFrameEnd
ICClose
ICSendMessage
winmm
timeGetTime
ws2_32
inet_addr
WSAAsyncSelect
WSAStartup
WSACleanup
gethostbyname
WSASetLastError
closesocket
socket
htons
getsockopt
connect
setsockopt
WSAIoctl
bind
listen
accept
ntohl
sendto
recv
select
__WSAFDIsSet
recvfrom
ioctlsocket
inet_ntoa
send
psapi
EnumProcessModules
GetModuleFileNameExA
iphlpapi
GetIfTable
SetTcpEntry
GetTcpTable
GetAdaptersInfo
wininet
InternetConnectA
InternetSetStatusCallback
InternetOpenA
InternetGetLastResponseInfoA
InternetCloseHandle
FtpPutFileA
FtpSetCurrentDirectoryA
FtpCreateDirectoryA
Exports
Exports
Sections
.text Size: 573KB - Virtual size: 573KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 124KB - Virtual size: 123KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 17KB - Virtual size: 556KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 26KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 54KB - Virtual size: 89KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ