Static task
static1
Behavioral task
behavioral1
Sample
33842a3cc6851364558a807671ddcbd52ceef999a28d5f1502d8618100a1c781.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
33842a3cc6851364558a807671ddcbd52ceef999a28d5f1502d8618100a1c781.exe
Resource
win10v2004-20220901-en
General
-
Target
33842a3cc6851364558a807671ddcbd52ceef999a28d5f1502d8618100a1c781
-
Size
11.2MB
-
MD5
067a78596ec25a1502ed779c00e1cc28
-
SHA1
283dfdf1ac7c24cda59de17b6103337a5cadace8
-
SHA256
33842a3cc6851364558a807671ddcbd52ceef999a28d5f1502d8618100a1c781
-
SHA512
59ca026ccb05eca437fb4ddc00226693d8237b5498c6cf03c3c8119d213e59de239ee018e110eb2b59c39b87856c113485c0ed0bf667628e8ee2aa88476e5442
-
SSDEEP
196608:C02ev2WlvoHXd3uoW9KLywmSgZWvqAThnvqd1pG0sR6pgJ4PFS7k1A24ZX4l:CtevpkXdefDJZWCAFits3JEKkY4l
Malware Config
Signatures
Files
-
33842a3cc6851364558a807671ddcbd52ceef999a28d5f1502d8618100a1c781.exe windows x86
0fee28cda04eede345e197f3fd928360
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
Process32FirstW
Process32NextW
OpenProcess
GetSystemDirectoryA
GetWindowsDirectoryW
ReadProcessMemory
GetProcessTimes
GetLogicalDriveStringsW
QueryDosDeviceW
DuplicateHandle
GetFileAttributesW
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
CreateFileW
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
ResetEvent
WaitForSingleObject
WideCharToMultiByte
MultiByteToWideChar
GetLocalTime
InterlockedIncrement
lstrlenW
lstrcmpiW
LoadLibraryExW
GetModuleFileNameW
InitializeCriticalSection
TerminateProcess
WriteFile
lstrlenA
GetEnvironmentVariableW
GetShortPathNameW
CreateProcessW
SetPriorityClass
SetFileAttributesW
ResumeThread
CreateDirectoryW
SetErrorMode
CreateMutexW
ReleaseMutex
FindFirstFileW
GetFileInformationByHandle
GetStdHandle
MoveFileW
GetTickCount
SetEndOfFile
VirtualFree
VirtualAlloc
ReleaseSemaphore
CreateSemaphoreW
SetUnhandledExceptionFilter
GetFileSizeEx
Module32FirstW
Module32NextW
SuspendThread
GetCurrentThreadId
GetPrivateProfileStringW
EnterCriticalSection
RaiseException
LeaveCriticalSection
GetCurrentProcessId
SetEnvironmentVariableA
CompareStringW
CompareStringA
GetLocaleInfoW
GetConsoleOutputCP
CreateToolhelp32Snapshot
GetStringTypeW
GetStringTypeA
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
GetDateFormatA
GetTimeFormatA
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetStdHandle
GetTimeZoneInformation
FlushFileBuffers
GetStartupInfoA
GetFileType
SetHandleCount
GetConsoleMode
GetConsoleCP
IsValidCodePage
GetOEMCP
GetACP
HeapCreate
GetCurrentProcess
GetFileTime
ReadFile
SetFilePointer
GetFileSize
CreateFileA
Sleep
SetEvent
FindNextFileA
SetLastError
FindClose
FindFirstFileA
InterlockedDecrement
LocalAlloc
GetDriveTypeA
GetLogicalDriveStringsA
CreateEventW
GetModuleFileNameA
WaitForMultipleObjects
CreateThread
CloseHandle
GetSystemInfo
LocalFree
GetNativeSystemInfo
FindResourceExW
FindResourceW
LoadResource
LockResource
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
VirtualQuery
VirtualProtect
GetCPInfo
LCMapStringW
LCMapStringA
RtlUnwind
GetStartupInfoW
ExitThread
GetSystemTimeAsFileTime
IsDebuggerPresent
UnhandledExceptionFilter
DisconnectNamedPipe
WriteConsoleW
CreateNamedPipeW
OutputDebugStringW
ConnectNamedPipe
AllocConsole
IsBadStringPtrW
GetCommandLineW
ExitProcess
InterlockedExchange
IsProcessorFeaturePresent
LoadLibraryA
InterlockedCompareExchange
GetProcessHeap
HeapSize
HeapReAlloc
HeapFree
HeapAlloc
HeapDestroy
SizeofResource
GetComputerNameW
DeleteFileW
GetLastError
GetModuleHandleA
MulDiv
FlushInstructionCache
WriteConsoleA
GetTempPathW
FreeLibrary
LoadLibraryW
GetModuleHandleW
GetProcAddress
GetVersionExW
user32
ShowWindow
EnableWindow
GetDlgItem
GetWindow
DispatchMessageW
GetWindowLongW
GetSystemMetrics
TranslateMessage
MonitorFromWindow
PeekMessageW
CreateDialogParamW
SetWindowLongW
DestroyWindow
IsDialogMessageW
PostQuitMessage
LoadImageW
IsWindowVisible
MessageBoxW
UnregisterClassA
SendMessageW
SetWindowTextW
SetWindowPos
MapWindowPoints
GetMonitorInfoW
GetWindowRect
GetParent
GetMessageW
RedrawWindow
DefWindowProcW
CharUpperW
CharNextW
wsprintfW
InvalidateRect
GetClientRect
advapi32
RegEnumValueA
InitializeAcl
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
LookupAccountNameW
ConvertSidToStringSidW
RegOpenKeyExW
RegQueryInfoKeyW
RegEnumKeyExW
RegQueryValueExW
RegDeleteValueW
RegCreateKeyExW
RegSetValueExW
RegDeleteKeyW
CryptGetHashParam
CryptDestroyHash
CryptHashData
CryptReleaseContext
CryptCreateHash
CryptAcquireContextW
RegEnumKeyExA
RegOpenKeyExA
RegQueryValueExA
GetUserNameW
AdjustTokenPrivileges
LookupPrivilegeValueW
OpenProcessToken
LookupAccountSidW
RegCloseKey
AddAccessAllowedAce
shell32
SHGetFileInfoA
SHGetSpecialFolderPathW
CommandLineToArgvW
ShellExecuteW
ole32
CoUninitialize
CoInitializeEx
CoSetProxyBlanket
CoCreateInstance
CoTaskMemRealloc
CoTaskMemAlloc
CoInitializeSecurity
CoTaskMemFree
CoInitialize
CoCreateGuid
oleaut32
SysFreeString
VariantInit
VariantClear
SysAllocString
VarUI4FromStr
SysAllocStringLen
VariantCopy
shlwapi
PathRemoveExtensionW
PathFileExistsW
PathFileExistsA
PathStripPathA
PathRemoveFileSpecA
PathRemoveExtensionA
PathRemoveFileSpecW
PathFindFileNameW
PathFindExtensionA
comctl32
InitCommonControlsEx
iphlpapi
GetExtendedTcpTable
GetAdaptersInfo
GetAdaptersAddresses
GetExtendedUdpTable
ws2_32
inet_ntoa
ntohs
psapi
GetModuleFileNameExW
rpcrt4
RpcStringFreeA
UuidToStringA
winhttp
WinHttpQueryHeaders
WinHttpWriteData
WinHttpReceiveResponse
WinHttpCloseHandle
WinHttpSetTimeouts
WinHttpOpen
WinHttpSendRequest
WinHttpOpenRequest
WinHttpConnect
wtsapi32
WTSEnumerateProcessesW
WTSFreeMemory
netapi32
NetApiBufferFree
NetUserGetInfo
NetUserEnum
crypt32
CryptMsgClose
CertCloseStore
CertFreeCertificateContext
CertGetCertificateContextProperty
CertFindCertificateInStore
CryptMsgGetParam
CryptQueryObject
version
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
sfc
SfcIsFileProtected
Sections
.text Size: 638KB - Virtual size: 638KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 129KB - Virtual size: 128KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 97KB - Virtual size: 117KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 48KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 43KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ