Static task
static1
Behavioral task
behavioral1
Sample
581eda72b41e637c6330269723fd99ec0e2b1a7e39ceb2854b0ff4cabfdb82f2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
581eda72b41e637c6330269723fd99ec0e2b1a7e39ceb2854b0ff4cabfdb82f2.exe
Resource
win10v2004-20220812-en
General
-
Target
581eda72b41e637c6330269723fd99ec0e2b1a7e39ceb2854b0ff4cabfdb82f2
-
Size
240KB
-
MD5
92c8e10b84818f5a20e64608996e4bd0
-
SHA1
df4831318463e39b964507579e47e4b7debbbd57
-
SHA256
581eda72b41e637c6330269723fd99ec0e2b1a7e39ceb2854b0ff4cabfdb82f2
-
SHA512
61b48067201d8c7a90284b2bce0613f48ff4b722202bfdd27024f067c165d8130e94614272a95093c190ec178c35a078aea8c3b1a895ee4d8ec076d7e803d389
-
SSDEEP
3072:2mFZ+E5ZD6rT3KsCMndqQVLQAg0FuZIrmay+pREBSUh0nINBac/GLLnO7:2mFZ+kJ6ixUuAOZIya1RyhiIiSeO7
Malware Config
Signatures
Files
-
581eda72b41e637c6330269723fd99ec0e2b1a7e39ceb2854b0ff4cabfdb82f2.exe windows x86
ea108965be8354f5f9bee9ecf595e6bd
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
CharNextA
GetClassInfoA
CreateWindowExA
SystemParametersInfoA
RegisterClassA
ScreenToClient
GetWindowRect
SetClassLongA
IsWindowEnabled
SetWindowPos
GetSysColor
LoadCursorA
SetCursor
CheckDlgButton
GetMessagePos
LoadBitmapA
CallWindowProcA
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
TrackPopupMenu
AppendMenuA
CreatePopupMenu
GetSystemMetrics
SetDlgItemTextA
GetDlgItemTextA
MessageBoxA
CharPrevA
CreateDialogParamA
SetForegroundWindow
wsprintfA
SendMessageTimeoutA
FindWindowExA
IsWindow
LoadImageA
GetDC
EnableWindow
PeekMessageA
DispatchMessageA
ExitWindowsEx
InvalidateRect
DefWindowProcA
BeginPaint
GetClientRect
FillRect
DrawTextA
EndPaint
PostQuitMessage
SendMessageA
SetTimer
KillTimer
DialogBoxParamA
SetWindowLongA
GetWindowLongA
SetWindowTextW
SetWindowTextA
LoadIconA
LoadStringW
LoadStringA
CharUpperW
CharUpperA
DestroyWindow
EndDialog
PostMessageA
ShowWindow
MessageBoxW
GetDlgItem
DialogBoxParamW
SetPropA
IsCharAlphaW
EnumChildWindows
CloseDesktop
FreeDDElParam
SwapMouseButton
RegisterClassExW
GetScrollInfo
GetTopWindow
DdeAddData
PeekMessageW
IsWindowVisible
CheckRadioButton
shell32
ShellExecuteA
SHChangeNotify
ShellExecuteExA
SHGetMalloc
advapi32
CreateServiceA
RegQueryValueExA
RegEnumValueA
RegEnumKeyA
RegDeleteKeyA
RegDeleteValueA
OpenProcessToken
StartServiceA
RegSetValueExA
AdjustTokenPrivileges
CloseServiceHandle
ControlService
RegSetValueA
DeleteService
GetTokenInformation
LookupPrivilegeValueA
OpenSCManagerA
OpenServiceA
RegCloseKey
RegCreateKeyA
RegFlushKey
RegOpenKeyExA
RegQueryValueA
gdi32
CreateFontIndirectA
BitBlt
ChoosePixelFormat
CreateCompatibleBitmap
CreateCompatibleDC
CreateFontA
CreatePen
CreateSolidBrush
DeleteDC
DeleteObject
LineTo
MoveToEx
Polygon
SelectObject
SetBkColor
SetBkMode
SetPixelFormat
SetTextColor
SwapBuffers
TextOutA
CreateBrushIndirect
SetTextAlign
GetDeviceCaps
comctl32
ImageList_LoadImageA
ord17
kernel32
HeapReAlloc
HeapFree
GetSystemTimeAsFileTime
HeapAlloc
SetErrorMode
GetExitCodeProcess
ExpandEnvironmentStringsA
GetEnvironmentVariableA
GetFileAttributesA
CompareFileTime
SearchPathA
GetShortPathNameA
MoveFileA
lstrcpynA
GetDiskFreeSpaceA
WritePrivateProfileStringA
GetPrivateProfileStringA
GetCPInfo
CopyFileA
SetPriorityClass
SetProcessAffinityMask
SetThreadAffinityMask
SetThreadPriority
TerminateProcess
TerminateThread
UnmapViewOfFile
GetTickCount
lstrcatA
lstrcmpiA
HeapCreate
GetThreadPriority
GetSystemInfo
GetSystemDirectoryA
GetProcAddress
GetPriorityClass
GetLocalTime
GetACP
GetOEMCP
IsValidCodePage
RaiseException
GetConsoleCP
GetConsoleMode
HeapSize
GetLocaleInfoA
LCMapStringA
GetStringTypeA
GetStringTypeW
FlushFileBuffers
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CompareStringA
CompareStringW
GetModuleHandleW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
InterlockedDecrement
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
SetHandleCount
GetFileType
GetTimeZoneInformation
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCurrentProcessId
InitializeCriticalSectionAndSpinCount
RtlUnwind
lstrcpyA
SetEnvironmentVariableA
MulDiv
WideCharToMultiByte
GlobalLock
GetOverlappedResult
EnumResourceNamesW
CreateSemaphoreW
LCMapStringW
LockResource
PeekNamedPipe
ClearCommBreak
FindAtomA
LocalLock
AllocConsole
lstrcmpW
RegisterWaitForSingleObject
SetThreadPriorityBoost
EnterCriticalSection
LeaveCriticalSection
GetVersionExA
SetCurrentDirectoryA
CreateProcessA
CloseHandle
WaitForSingleObject
DeleteCriticalSection
MultiByteToWideChar
GetLastError
AreFileApisANSI
GetModuleFileNameA
GetModuleFileNameW
LocalFree
FormatMessageA
FormatMessageW
GetWindowsDirectoryA
SetFileTime
CreateFileW
SetLastError
SetFileAttributesA
RemoveDirectoryA
SetFileAttributesW
RemoveDirectoryW
CreateDirectoryA
CreateDirectoryW
DeleteFileA
DeleteFileW
lstrlenA
GetFullPathNameA
GetFullPathNameW
GetCurrentDirectoryA
GetTempPathA
GetTempFileNameA
FindClose
FindFirstFileA
FindFirstFileW
FindNextFileA
CreateFileA
GetFileSize
SetFilePointer
ReadFile
WriteFile
SetEndOfFile
GetStdHandle
WaitForMultipleObjects
Sleep
VirtualAlloc
VirtualFree
CreateEventA
SetEvent
ResetEvent
InitializeCriticalSection
GetModuleHandleA
GetStartupInfoA
GetCommandLineW
GetUserDefaultLangID
GetVersion
GlobalAlloc
GlobalFree
GlobalMemoryStatusEx
AllocateUserPhysicalPages
GlobalUnlock
LoadLibraryA
LoadResource
MapUserPhysicalPages
MapViewOfFile
OpenFileMappingA
OpenProcess
QueryPerformanceCounter
QueryPerformanceFrequency
CreateFileMappingA
CreateThread
DeviceIoControl
ExitProcess
ExitThread
FindResourceA
FreeLibrary
FreeUserPhysicalPages
GetCommandLineA
GetCurrentProcess
GetCurrentThread
GetCurrentThreadId
Sections
.text Size: 99KB - Virtual size: 99KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 41KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 82KB - Virtual size: 82KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ