Static task
static1
Behavioral task
behavioral1
Sample
17e9d68f32c7c42f8f8d55c3e7658d1763244f54bbb0a51bb724001745021872.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
17e9d68f32c7c42f8f8d55c3e7658d1763244f54bbb0a51bb724001745021872.exe
Resource
win10v2004-20220901-en
General
-
Target
17e9d68f32c7c42f8f8d55c3e7658d1763244f54bbb0a51bb724001745021872
-
Size
316KB
-
MD5
82c9e938ccec579dbbdfe1841817ac7d
-
SHA1
d65d8bd574f0e80ecf36bf2133f0b5bcb0eed948
-
SHA256
17e9d68f32c7c42f8f8d55c3e7658d1763244f54bbb0a51bb724001745021872
-
SHA512
a035462bdcf92f928e23c6507744a206c6a7d1f50e5d38bcb708c47cf9b00e271f8ce13e5196799b54d649f4cb18c80f9b0bcc6d8c9121e7c7f93ed11334f8b6
-
SSDEEP
6144:c71CkcW8u4lcxMmXOjo2/MidBk64nrkcUFsd3RGhWm0:c71UhubCvjo2U0BkHeFsdBKWm0
Malware Config
Signatures
Files
-
17e9d68f32c7c42f8f8d55c3e7658d1763244f54bbb0a51bb724001745021872.exe windows x86
3dd105dd293462a5497b886e38425026
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
CreateDialogParamA
UpdateWindow
UnregisterHotKey
DestroyAcceleratorTable
RegisterHotKey
RegisterClassA
LoadCursorA
MessageBoxA
KillTimer
DestroyWindow
GetWindowRect
SetDlgItemTextA
EnableWindow
SetDlgItemInt
ReleaseDC
LoadBitmapA
FillRect
SetClipboardData
IsWindow
GetClassNameA
GetDesktopWindow
LoadAcceleratorsA
ShowWindow
GetWindowDC
SystemParametersInfoA
DrawStateA
CreateWindowExA
GetWindowPlacement
EndPaint
LoadIconA
AdjustWindowRectEx
GetSystemMenu
GetCursorPos
InvalidateRgn
TranslateMessage
BeginPaint
DefWindowProcA
RegisterClassExA
GetDC
GetScrollPos
ClientToScreen
CopyRect
MapWindowPoints
SetCapture
GetSysColor
kernel32
InitializeCriticalSection
TlsSetValue
HeapFree
CompareStringA
IsBadWritePtr
LocalAlloc
SetUnhandledExceptionFilter
TlsAlloc
GetEnvironmentStringsW
SetThreadPriority
IsValidCodePage
DeleteFileA
SetErrorMode
GetPrivateProfileSectionNamesA
GetACP
EnumSystemLocalesA
CompareStringW
DeleteCriticalSection
RaiseException
ReadFile
CreateProcessA
FindClose
CreateThread
FlushFileBuffers
FreeEnvironmentStringsW
GetLocaleInfoW
SetLastError
GetStartupInfoA
HeapAlloc
SetFileTime
CloseHandle
GlobalLock
GetTimeFormatA
GetEnvironmentVariableA
GetLastError
CreateDirectoryA
VirtualProtect
GetDateFormatA
SizeofResource
FindFirstFileA
GetCurrentThreadId
ConvertDefaultLocale
GlobalUnlock
TlsGetValue
FormatMessageA
SetHandleCount
GetStringTypeA
GetOEMCP
GetStdHandle
CreateMutexA
HeapCreate
GetCurrentDirectoryA
GetEnvironmentStrings
lstrcmpiA
MultiByteToWideChar
SetEnvironmentVariableA
FileTimeToSystemTime
FreeEnvironmentStringsA
GetLocaleInfoA
FreeLibrary
GetVersionExA
IsBadCodePtr
GetLocalTime
HeapSize
EnumResourceLanguagesA
LoadResource
LeaveCriticalSection
GetFileSize
GetPrivateProfileStringA
RtlUnwind
GetCurrentProcessId
GetStringTypeW
WriteFile
LoadLibraryA
GetTempFileNameA
GetDriveTypeA
GetTimeZoneInformation
GetVersion
HeapDestroy
lstrcpyA
GetTickCount
VirtualFree
ExitProcess
GetSystemInfo
lstrlenA
CreateEventA
GetCurrentProcess
GlobalReAlloc
GetWindowsDirectoryA
InterlockedExchange
LocalFree
WaitForMultipleObjects
VirtualAlloc
lstrlenW
InterlockedIncrement
GetSystemTimeAsFileTime
VirtualQuery
GetSystemTime
GlobalFlags
HeapReAlloc
GetFileType
MoveFileA
SetStdHandle
GetTempPathA
SetFilePointer
GetCPInfo
LockResource
GetModuleHandleA
TlsFree
GetCommandLineA
QueryPerformanceCounter
EnterCriticalSection
GetCurrentThread
GetFileAttributesA
WritePrivateProfileStringA
GetProcAddress
LocalReAlloc
LCMapStringA
LCMapStringW
SuspendThread
TerminateProcess
WideCharToMultiByte
lstrcmpW
UnhandledExceptionFilter
lstrcpynA
GlobalAlloc
GetModuleFileNameA
CreateFileA
shell32
ord155
ShellExecuteExA
SHGetMalloc
DragQueryFileA
SHGetPathFromIDListA
ExtractIconExA
SHGetFileInfoA
SHBrowseForFolderA
ole32
CoInitialize
CoFreeUnusedLibraries
OleIsCurrentClipboard
CoTaskMemFree
advapi32
CloseServiceHandle
GetUserNameA
InitializeSecurityDescriptor
RegDeleteKeyA
RegisterServiceCtrlHandlerA
CopySid
DeregisterEventSource
RegisterEventSourceA
RegOpenKeyExA
RegCloseKey
RegDeleteValueA
RegOpenKeyA
ReportEventA
GetLengthSid
SetSecurityDescriptorDacl
RegCreateKeyA
CreateServiceA
DeleteService
GetTokenInformation
OpenSCManagerA
RegEnumKeyExA
RegCreateKeyExA
RegSetValueExA
StartServiceCtrlDispatcherA
SetServiceStatus
ControlService
AllocateAndInitializeSid
RegQueryInfoKeyA
RegEnumValueA
OpenProcessToken
OpenThreadToken
FreeSid
RegQueryValueExA
OpenServiceA
winmm
waveOutGetPosition
waveOutRestart
waveOutPrepareHeader
waveOutGetNumDevs
waveOutOpen
mciGetErrorStringA
waveOutWrite
waveOutClose
waveOutReset
gdi32
RectVisible
OffsetWindowOrgEx
CreateRectRgn
ExtTextOutA
GetClipRgn
Rectangle
CreateRectRgnIndirect
CreateCompatibleBitmap
StretchBlt
StartPage
SetRectRgn
BitBlt
GetDeviceCaps
GetTextColor
SetBkColor
GetViewportExtEx
GetMapMode
IntersectClipRect
ExtCreateRegion
EndDoc
SetWindowExtEx
EndPath
SelectObject
SaveDC
DeleteDC
CreatePatternBrush
CombineRgn
CreateDCA
DeleteObject
SetGraphicsMode
GetObjectType
SelectClipRgn
GetObjectA
EndPage
GetTextMetricsA
BeginPath
RestoreDC
StretchDIBits
Sections
.text Size: 80KB - Virtual size: 76KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 100KB - Virtual size: 98KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 64KB - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 68KB - Virtual size: 65KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ