Static task
static1
Behavioral task
behavioral1
Sample
d11ef7e5caf077bf62e16ba9607802a940f29be08fa44a56eeeca5ba135cc7e3.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d11ef7e5caf077bf62e16ba9607802a940f29be08fa44a56eeeca5ba135cc7e3.exe
Resource
win10v2004-20220812-en
General
-
Target
d11ef7e5caf077bf62e16ba9607802a940f29be08fa44a56eeeca5ba135cc7e3
-
Size
77KB
-
MD5
a33a2f9b9fa3938cb46cde2321b13090
-
SHA1
8d1d6b7b3df5a077e1d17f7b9fbe72239c796f4c
-
SHA256
d11ef7e5caf077bf62e16ba9607802a940f29be08fa44a56eeeca5ba135cc7e3
-
SHA512
f8cfa360000e8b37e34112d66467b3b3b42893a24624f56e6b2676db95a4e1a65576c5a44844963082c50f2594ed130a543d3d3719154e03c285b15674d9aa00
-
SSDEEP
1536:ysEwVdDkWgTy9LKIS/BUkIGxq8qsHC2+W/zJT5k0p0ApSIln:ystVy1T+9S/BUkI8Y2792pIl
Malware Config
Signatures
Files
-
d11ef7e5caf077bf62e16ba9607802a940f29be08fa44a56eeeca5ba135cc7e3.exe windows x86
2d58d646bc221092a894430b7a218c70
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ole32
CoInitializeEx
StringFromIID
OleCreateFromData
CreateAntiMoniker
CoResumeClassObjects
StgGetIFillLockBytesOnILockBytes
CoReleaseMarshalData
CreateDataAdviseHolder
CreateClassMoniker
UtConvertDvtd32toDvtd16
StgOpenStorageOnILockBytes
CoFreeUnusedLibraries
CoFreeAllLibraries
ReadStringStream
OleQueryLinkFromData
OleBuildVersion
OleMetafilePictFromIconAndLabel
OleRegGetUserType
OleDraw
OleCreateFromFile
OleConvertOLESTREAMToIStorageEx
OleRun
CoGetCurrentProcess
CoSuspendClassObjects
GetHGlobalFromStream
CoQueryReleaseObject
CoCreateInstance
CoRevokeMallocSpy
CoGetMalloc
OpenOrCreateStream
CoImpersonateClient
OleSetAutoConvert
OleInitialize
OleConvertIStorageToOLESTREAMEx
GetHookInterface
CoRegisterMessageFilter
OleSetContainedObject
CoCreateGuid
OleCreateLinkFromData
CoUnmarshalHresult
StgIsStorageFile
CoLockObjectExternal
OleCreateLinkEx
CreateBindCtx
CoQueryProxyBlanket
ReadFmtUserTypeStg
CoDisconnectObject
StgCreateStorageEx
OleConvertOLESTREAMToIStorage
CoTaskMemFree
OleLoadFromStream
CoLoadLibrary
CoMarshalInterThreadInterfaceInStream
SetDocumentBitStg
OleRegGetMiscStatus
CoInitialize
CoGetPSClsid
CoCreateFreeThreadedMarshaler
CreateObjrefMoniker
StgCreateDocfile
OleRegEnumFormatEtc
shlwapi
PathIsSameRootA
StrTrimW
PathAddBackslashW
PathIsDirectoryW
PathStripPathW
UrlCreateFromPathW
PathCompactPathExW
SHRegGetBoolUSValueW
StrSpnA
PathRemoveBackslashW
PathGetDriveNumberW
SHDeleteKeyW
StrCmpNA
UrlUnescapeA
StrCmpNIA
StrStrIA
SHRegCreateUSKeyW
ChrCmpIA
SHQueryInfoKeyA
UrlIsOpaqueA
UrlHashW
wvnsprintfW
PathIsUNCW
StrChrIA
PathSetDlgItemPathW
PathCommonPrefixW
StrToIntExA
StrRetToBufW
UrlCreateFromPathA
StrNCatA
PathRelativePathToW
SHEnumValueW
SHRegEnumUSKeyW
PathGetArgsA
UrlCanonicalizeA
PathMakePrettyA
PathMakePrettyW
SHRegOpenUSKeyW
PathBuildRootW
SHRegGetUSValueW
PathRemoveBlanksA
StrFormatByteSizeA
PathIsFileSpecA
PathIsContentTypeA
PathIsUNCServerW
PathIsRelativeA
UrlGetLocationA
SHCreateStreamOnFileW
PathFileExistsA
StrCpyW
PathIsLFNFileSpecW
StrRChrW
PathIsSystemFolderW
SHCreateShellPalette
PathRemoveArgsA
PathIsURLW
SHRegDeleteUSValueA
StrCmpIW
StrCSpnIA
PathIsRootW
SHRegDeleteUSValueW
PathIsFileSpecW
PathUnquoteSpacesW
PathGetCharTypeA
PathSetDlgItemPathA
StrFormatKBSizeW
PathFileExistsW
PathFindFileNameA
PathUnquoteSpacesA
SHOpenRegStream2A
SHRegEnumUSKeyA
PathFindSuffixArrayA
PathIsRelativeW
PathFindOnPathA
UrlApplySchemeA
SHEnumKeyExA
SHRegDeleteEmptyUSKeyW
UrlHashA
PathCreateFromUrlA
UrlIsOpaqueW
StrSpnW
PathCreateFromUrlW
PathSearchAndQualifyA
StrToIntExW
kernel32
CreateEventA
CreatePipe
EnumDateFormatsW
ReadConsoleOutputCharacterA
RemoveDirectoryA
OpenFileMappingW
WriteConsoleOutputA
TlsFree
EnumDateFormatsA
FindResourceA
GetPrivateProfileIntA
BackupWrite
SizeofResource
CreateEventW
SetThreadContext
GlobalMemoryStatus
CreateRemoteThread
CallNamedPipeW
GetStringTypeExA
GetWindowsDirectoryW
WriteConsoleA
GetProcessShutdownParameters
VirtualProtect
LoadModule
SetProcessWorkingSetSize
GetTickCount
GetProfileStringW
ReadConsoleOutputAttribute
DefineDosDeviceW
GetLongPathNameW
GetLargestConsoleWindowSize
GetPrivateProfileStructW
lstrcpyn
lstrcpy
WriteFileGather
GetTimeFormatW
BuildCommDCBA
GetProfileIntA
GetStdHandle
GetCommMask
GetStartupInfoW
OpenFileMappingA
GetLocalTime
Heap32Next
SwitchToFiber
SetThreadAffinityMask
SystemTimeToTzSpecificLocalTime
VirtualFree
MapViewOfFileEx
HeapLock
SetCommState
EnumDateFormatsExW
InitializeCriticalSectionAndSpinCount
GetEnvironmentStrings
CreateDirectoryW
OutputDebugStringW
BeginUpdateResourceA
GetProcessTimes
Process32First
TransmitCommChar
GetExitCodeThread
SleepEx
FindFirstFileW
SetHandleCount
SetTapePosition
SetProcessPriorityBoost
WriteConsoleOutputAttribute
GetCurrentProcess
LoadResource
LockFileEx
IsBadReadPtr
WritePrivateProfileStructA
AreFileApisANSI
GetCurrencyFormatW
HeapWalk
GetStringTypeA
GetLocaleInfoW
SetLocaleInfoW
GlobalWire
LockFile
Sleep
GlobalHandle
GetCommProperties
VirtualAlloc
user32
MapVirtualKeyA
GetGUIThreadInfo
SendMessageA
DdeQueryStringA
GetClipboardFormatNameA
MsgWaitForMultipleObjectsEx
GetDlgCtrlID
GrayStringW
GetDesktopWindow
OpenIcon
OpenWindowStationW
CharUpperBuffW
GetAltTabInfo
TranslateAcceleratorA
WinHelpW
SetCaretPos
SetWindowsHookA
MonitorFromPoint
MessageBoxIndirectA
ChangeDisplaySettingsExA
GetTitleBarInfo
CheckMenuItem
SetWindowPos
DestroyAcceleratorTable
ShowWindowAsync
EnumPropsA
DdeAddData
RegisterClassExA
SendNotifyMessageW
SetActiveWindow
EnableScrollBar
InvalidateRgn
GetClassInfoExW
DdeNameService
DdeInitializeW
DlgDirListW
GetClassInfoW
GetWindowInfo
IsMenu
DragObject
FlashWindow
GetMessageExtraInfo
LoadMenuIndirectW
EnumPropsExA
CreateIcon
SetParent
GetMenuItemInfoA
ModifyMenuW
SetDlgItemTextA
GetCursorInfo
GetWindowModuleFileNameA
DefWindowProcA
GetSubMenu
SwitchToThisWindow
InsertMenuItemA
DdeQueryConvInfo
CallMsgFilterA
GetKeyboardState
SetDlgItemInt
MapVirtualKeyW
SubtractRect
DragDetect
GetWindowRgn
SwapMouseButton
DdeGetData
DrawIconEx
InSendMessageEx
GetDCEx
UnhookWinEvent
DialogBoxIndirectParamA
MonitorFromWindow
SetCursorPos
SendDlgItemMessageW
OpenInputDesktop
IsRectEmpty
SetDlgItemTextW
ToAsciiEx
EnumDisplaySettingsA
CreateDialogParamA
DdeClientTransaction
SetWindowsHookExW
DrawFrameControl
ScreenToClient
advapi32
SetSecurityInfo
AddAccessAllowedAce
GetAccessPermissionsForObjectA
SetServiceBits
GetUserNameA
CryptSignHashW
CreateProcessAsUserA
StartServiceA
RegQueryInfoKeyA
InitializeSecurityDescriptor
StartServiceCtrlDispatcherA
GetSidLengthRequired
CloseServiceHandle
GetTokenInformation
LookupSecurityDescriptorPartsW
AddAce
RegEnumValueW
RegisterEventSourceA
LookupPrivilegeNameA
ObjectCloseAuditAlarmW
EnumDependentServicesW
RegQueryMultipleValuesW
QueryServiceStatus
OpenSCManagerA
CryptDeriveKey
GetAuditedPermissionsFromAclW
DeregisterEventSource
QueryServiceLockStatusA
ConvertAccessToSecurityDescriptorW
ObjectDeleteAuditAlarmW
QueryServiceConfigW
MakeSelfRelativeSD
ControlService
LookupPrivilegeNameW
SetNamedSecurityInfoW
CryptSetHashParam
OpenSCManagerW
LogonUserA
StartServiceCtrlDispatcherW
OpenBackupEventLogW
AdjustTokenPrivileges
RegQueryValueExW
SetSecurityDescriptorSacl
RegReplaceKeyW
CryptSetKeyParam
AccessCheckAndAuditAlarmA
CryptExportKey
SetFileSecurityW
SetSecurityDescriptorDacl
BuildExplicitAccessWithNameA
EnumServicesStatusA
GetSecurityDescriptorLength
MapGenericMask
ObjectDeleteAuditAlarmA
LookupAccountNameA
GetCurrentHwProfileW
ConvertSecurityDescriptorToAccessNamedW
SetNamedSecurityInfoA
SetServiceStatus
EnumDependentServicesA
UnlockServiceDatabase
LookupAccountSidA
GetExplicitEntriesFromAclW
PrivilegedServiceAuditAlarmA
SetSecurityInfoExW
SetEntriesInAclA
GetSidSubAuthority
LookupPrivilegeDisplayNameA
GetNamedSecurityInfoExW
GetOverlappedAccessResults
RegUnLoadKeyA
IsValidAcl
InitiateSystemShutdownA
CryptVerifySignatureW
RegOpenKeyW
OpenEventLogW
GetTrusteeNameW
Sections
.text Size: 64KB - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE