Static task
static1
Behavioral task
behavioral1
Sample
5f3f6e28c21fccebfd79a641213ea62d22f8177fa43945fa33c564c47701382e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5f3f6e28c21fccebfd79a641213ea62d22f8177fa43945fa33c564c47701382e.exe
Resource
win10v2004-20220812-en
General
-
Target
5f3f6e28c21fccebfd79a641213ea62d22f8177fa43945fa33c564c47701382e
-
Size
824KB
-
MD5
073010a48991427ddf2df6d9a184d02f
-
SHA1
d5a5df376661712678bf5311055699103f1f919a
-
SHA256
5f3f6e28c21fccebfd79a641213ea62d22f8177fa43945fa33c564c47701382e
-
SHA512
739d42c0ba16bc04ddb59d2a8e4f3c9c25b85dd9f7befc312e9228f30daf99c655a7150c54fd8cd37ea2d8291a2bd767a65b8aefe8c378a78757f1767380009c
-
SSDEEP
12288:yw1xa3YR4nMtzBfwVGcy5VWyquoHskYxARt787d+zB3WbQ:pM+4n6fsGcy/WyqhHbYxARt7878z
Malware Config
Signatures
Files
-
5f3f6e28c21fccebfd79a641213ea62d22f8177fa43945fa33c564c47701382e.exe windows x86
a8ddb79d4f39e26d5f1229b45296e268
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
wininet
InternetGetCookieA
kernel32
GlobalFlags
LocalAlloc
LeaveCriticalSection
TlsGetValue
EnterCriticalSection
GlobalReAlloc
GlobalHandle
InitializeCriticalSection
TlsAlloc
TlsSetValue
LocalReAlloc
DeleteCriticalSection
TlsFree
InterlockedIncrement
GetCPInfo
GetOEMCP
SetErrorMode
GetTickCount
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapFree
GetSystemTimeAsFileTime
HeapReAlloc
HeapAlloc
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
GetTimeFormatA
GetDateFormatA
GetCommandLineA
GetProcessHeap
GetStartupInfoA
RtlUnwind
ExitThread
CreateThread
ExitProcess
SetStdHandle
HeapSize
GetACP
IsValidCodePage
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
HeapDestroy
HeapCreate
VirtualFree
GetTimeZoneInformation
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
QueryPerformanceCounter
GetConsoleCP
GetConsoleMode
GetDriveTypeA
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEnvironmentVariableA
FindNextFileA
GetFullPathNameA
GetVolumeInformationA
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
GetThreadLocale
GetFileTime
GetFileAttributesA
LocalFileTimeToFileTime
FindFirstFileA
FindClose
FileTimeToLocalFileTime
FileTimeToSystemTime
GlobalGetAtomNameA
GlobalFindAtomA
lstrcmpW
FormatMessageA
LocalFree
GlobalFree
FreeResource
GetCurrentProcessId
GlobalAddAtomA
GetModuleFileNameW
GlobalDeleteAtom
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
lstrcmpA
CreateEventA
SuspendThread
GetCurrentThreadId
SetThreadPriority
MulDiv
SetFileTime
WriteFile
DosDateTimeToFileTime
GetCurrentDirectoryA
SystemTimeToFileTime
SetFilePointer
GetFileType
GetCurrentProcess
DuplicateHandle
InterlockedDecrement
GlobalUnlock
ReadFile
GlobalLock
GlobalAlloc
GetFileSize
CreateFileA
WritePrivateProfileStringA
GetPrivateProfileStringA
GetVersionExA
WinExec
lstrcatA
lstrcpyA
Process32First
CreateToolhelp32Snapshot
ResumeThread
SetFileAttributesA
RemoveDirectoryA
DeleteFileA
GetProcAddress
WaitForSingleObject
ResetEvent
GetModuleHandleA
SetEvent
SetLastError
CopyFileA
CreateDirectoryA
Process32Next
CloseHandle
GetExitCodeProcess
GetExitCodeThread
TerminateProcess
Sleep
OpenProcess
InterlockedExchange
GetVersion
CompareStringA
lstrlenA
MultiByteToWideChar
CompareStringW
FreeLibrary
LoadLibraryA
GetLastError
CreateMutexA
FindResourceA
LoadResource
LockResource
SizeofResource
WideCharToMultiByte
GetModuleFileNameA
ReleaseMutex
RaiseException
user32
RegisterClipboardFormatA
PostThreadMessageA
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
RegisterWindowMessageA
SendDlgItemMessageA
WinHelpA
IsChild
GetCapture
GetClassLongA
GetClassNameA
RemovePropA
SetFocus
GetWindowTextLengthA
GetWindowTextA
GetForegroundWindow
GetTopWindow
GetMessageTime
GetMessagePos
MapWindowPoints
GetMenu
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
DestroyMenu
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
SetWindowLongA
IntersectRect
GetWindowPlacement
SetWindowContextHelpId
MapDialogRect
GetMenuItemID
GetMenuItemCount
GetSubMenu
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
GetDlgItem
GetNextDlgTabItem
EndDialog
GetWindowThreadProcessId
GetLastActivePopup
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
GetFocus
ModifyMenuA
GetMenuState
EnableMenuItem
CheckMenuItem
UnhookWindowsHookEx
PostQuitMessage
SetWindowsHookExA
CallNextHookEx
GetMessageA
TranslateMessage
DispatchMessageA
GetKeyState
PeekMessageA
ValidateRect
EndPaint
BeginPaint
GetWindowDC
ClientToScreen
GetNextDlgGroupItem
InvalidateRgn
IsRectEmpty
CopyAcceleratorTableA
wsprintfA
ScreenToClient
EqualRect
SetRect
DestroyIcon
InflateRect
ReleaseDC
GetDC
IsWindowVisible
SetCapture
ReleaseCapture
MessageBeep
GetWindowLongA
CopyRect
LoadBitmapA
CharNextA
GetSysColorBrush
UnregisterClassA
OffsetRect
GetWindowRgn
WindowFromPoint
GetActiveWindow
SetWindowRgn
IsIconic
SendMessageA
SetPropA
SetForegroundWindow
LoadIconA
IsZoomed
MessageBoxA
CharUpperA
DestroyCursor
SystemParametersInfoA
PtInRect
GetWindowRect
GetCursorPos
GetParent
SetTimer
KillTimer
GetSystemMetrics
SetWindowPos
SetCursor
LoadCursorA
TabbedTextOutA
FillRect
GetSysColor
GetClientRect
GrayStringA
DrawTextExA
EnableWindow
InvalidateRect
DrawTextA
UpdateWindow
PostMessageA
GetPropA
IsWindow
GetDesktopWindow
GetWindow
IsWindowEnabled
gdi32
SetWindowExtEx
ScaleWindowExtEx
ExtSelectClipRgn
DeleteDC
SelectPalette
SetWindowOrgEx
CreateRectRgnIndirect
GetMapMode
GetBkColor
GetTextColor
GetRgnBox
MoveToEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
GetWindowExtEx
GetViewportExtEx
CreateCompatibleDC
CreatePen
CreateFontA
LineTo
GetClipBox
SetMapMode
SetTextColor
SetStretchBltMode
SetBkMode
SetBkColor
RestoreDC
SaveDC
GetStretchBltMode
SelectObject
CreateBitmap
CreatePatternBrush
DeleteObject
RealizePalette
GetDeviceCaps
GetStockObject
GetTextExtentPoint32A
GetBitmapDimensionEx
CombineRgn
GetPixel
CreateRectRgn
StretchBlt
GetCurrentObject
CreateFontIndirectA
GetObjectA
CreateSolidBrush
ExtTextOutA
TextOutA
RectVisible
PtVisible
BitBlt
Escape
CreateCompatibleBitmap
comdlg32
GetFileTitleA
winspool.drv
DocumentPropertiesA
ClosePrinter
OpenPrinterA
advapi32
RegOpenKeyA
RegEnumKeyA
RegDeleteKeyA
RegQueryValueA
RegCreateKeyExA
RegQueryValueExA
RegSetValueExA
RegCloseKey
RegOpenKeyExA
shell32
ShellExecuteA
ExtractIconA
comctl32
_TrackMouseEvent
oledlg
ord8
ole32
CoRegisterMessageFilter
CreateStreamOnHGlobal
CoTaskMemFree
CoTaskMemAlloc
CLSIDFromProgID
CLSIDFromString
CoGetClassObject
StgOpenStorageOnILockBytes
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
OleUninitialize
CoFreeUnusedLibraries
OleInitialize
CoRevokeClassObject
OleIsCurrentClipboard
OleFlushClipboard
oleaut32
VariantClear
SysAllocString
OleCreateFontIndirect
SystemTimeToVariantTime
VariantTimeToSystemTime
SafeArrayDestroy
VariantCopy
VariantInit
VariantChangeType
OleLoadPicturePath
OleLoadPicture
SysFreeString
SysStringLen
SysAllocStringByteLen
SysAllocStringLen
urlmon
IsValidURL
ws2_32
WSAStartup
WSACleanup
WSASetLastError
recv
htons
select
WSAGetLastError
gethostbyname
inet_addr
send
closesocket
socket
ntohs
connect
version
GetFileVersionInfoA
VerQueryValueA
GetFileVersionInfoSizeA
shlwapi
PathFindFileNameA
PathStripToRootA
PathIsUNCA
PathFindExtensionA
Sections
.text Size: 404KB - Virtual size: 401KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 96KB - Virtual size: 94KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 72KB - Virtual size: 70KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.T� Size: 232KB - Virtual size: 232KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE