Static task
static1
Behavioral task
behavioral1
Sample
795a54c2c4869dc2dae88d3caf9b5781378cad442e1418edafd312f998e071ee.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
795a54c2c4869dc2dae88d3caf9b5781378cad442e1418edafd312f998e071ee.exe
Resource
win10v2004-20220901-en
General
-
Target
795a54c2c4869dc2dae88d3caf9b5781378cad442e1418edafd312f998e071ee
-
Size
440KB
-
MD5
04b6752c904dff768b83ceda820688d6
-
SHA1
25dc9df72699319a557c479717ff030a8111101f
-
SHA256
795a54c2c4869dc2dae88d3caf9b5781378cad442e1418edafd312f998e071ee
-
SHA512
0f44bccc70c152ed0fe300bbfc48d168f33d52139377141c94607c51d17dba09e99dbbb537fb993f93d9ad45892d57efeb08e77650cf17ce56db802f94a9bba7
-
SSDEEP
12288:JLHFopHVXrtaWH5W15c6sApsWBC4SKALl:JrFop1bFdH9KALl
Malware Config
Signatures
Files
-
795a54c2c4869dc2dae88d3caf9b5781378cad442e1418edafd312f998e071ee.exe windows x86
01dabc0225419ea1e8d997517fe5c1fd
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
SHChangeNotify
DragQueryFileW
CommandLineToArgvW
SHGetFileInfoW
SHGetPathFromIDListW
SHGetMalloc
SHFileOperationW
DragFinish
ord155
ExtractIconW
ShellExecuteW
SHGetSpecialFolderLocation
kernel32
LoadLibraryA
RaiseException
GetCurrentThread
SetHandleCount
TlsAlloc
GetVersion
GetStdHandle
IsBadReadPtr
HeapDestroy
FreeEnvironmentStringsW
InterlockedIncrement
IsBadWritePtr
WriteFile
LCMapStringW
GetModuleHandleA
ReadFile
InitializeCriticalSection
HeapReAlloc
SetLastError
InterlockedDecrement
GetStringTypeA
WideCharToMultiByte
GetFileType
GetACP
VirtualFree
GetStartupInfoA
EnterCriticalSection
GetTimeZoneInformation
VirtualQuery
GetModuleFileNameA
IsBadCodePtr
LCMapStringA
CompareStringW
SetConsoleCtrlHandler
CreateMutexA
GetCurrentProcess
GetCurrentThreadId
HeapAlloc
GetCPInfo
TerminateProcess
GetEnvironmentStrings
CompareStringA
FatalAppExitA
TlsGetValue
SetFilePointer
GetOEMCP
GetCommandLineA
ExitProcess
GetSystemTimeAsFileTime
LeaveCriticalSection
HeapCreate
GetLocalTime
RtlUnwind
DeleteCriticalSection
GetStringTypeW
InterlockedExchange
MultiByteToWideChar
GetSystemTime
GetCurrentProcessId
SetStdHandle
GetLastError
TlsSetValue
SetEnvironmentVariableA
CloseHandle
GetEnvironmentStringsW
VirtualAlloc
UnhandledExceptionFilter
QueryPerformanceCounter
GetTickCount
HeapFree
GetProcAddress
TlsFree
FlushFileBuffers
SetUnhandledExceptionFilter
FreeEnvironmentStringsA
user32
GetDlgItemInt
LoadBitmapA
GetMenu
PostThreadMessageA
GetCapture
SetCapture
SetWindowContextHelpId
InvertRect
DrawStateA
ShowScrollBar
GetActiveWindow
GetWindowTextA
GetDCEx
SetRect
LoadStringA
SetTimer
CreateDialogIndirectParamA
OffsetRect
IsDialogMessageA
FindWindowA
SetWindowsHookExA
InvalidateRect
DestroyMenu
SendMessageA
WindowFromPoint
SetMenuItemInfoA
PeekMessageA
ClientToScreen
DestroyCursor
GetSystemMetrics
BringWindowToTop
SetCursor
DestroyIcon
LoadIconA
IsRectEmpty
CharUpperA
DrawEdge
GetWindowThreadProcessId
LoadAcceleratorsA
wsprintfA
CreatePopupMenu
GetCursorPos
SetWindowPos
SystemParametersInfoA
KillTimer
DrawTextA
GetClassNameA
RedrawWindow
InvalidateRgn
TabbedTextOutA
InflateRect
CharNextA
RegisterClassA
SetActiveWindow
IsZoomed
IsIconic
CopyAcceleratorTableA
BeginPaint
TranslateAcceleratorA
GetDlgCtrlID
ReleaseCapture
SetFocus
LoadCursorA
MoveWindow
IsWindowEnabled
GetClassInfoExA
AppendMenuA
CopyIcon
TrackPopupMenuEx
EnableMenuItem
CloseClipboard
ShowCaret
DefWindowProcA
BeginDeferWindowPos
AdjustWindowRectEx
ShowWindow
GetAsyncKeyState
IsMenu
EndDialog
GetMessageA
TrackPopupMenu
RegisterClassExA
UnregisterClassA
CheckDlgButton
GetScrollRange
ScrollWindowEx
GetWindowLongA
GetMessagePos
RemovePropA
SetClipboardData
SetMenuItemBitmaps
DrawTextExA
WinHelpA
SetDlgItemInt
HideCaret
SetParent
CreateWindowExA
GetNextDlgGroupItem
IsWindowVisible
GetKeyState
GetLastActivePopup
SetMenuDefaultItem
EnableWindow
CheckMenuItem
DrawFocusRect
TranslateMessage
GetWindow
GetFocus
CallWindowProcA
IsWindow
DrawFrameControl
MapWindowPoints
FillRect
EndDeferWindowPos
GetIconInfo
CreateCaret
PostMessageA
DispatchMessageA
CopyRect
SetWindowTextA
RegisterHotKey
DefDlgProcA
CreateIconIndirect
GetSysColor
UpdateWindow
LoadMenuA
GetWindowTextLengthA
DestroyWindow
ValidateRect
GetClassLongA
GetNextDlgTabItem
SetScrollPos
DeferWindowPos
SetRectEmpty
DrawIconEx
SetMenu
ModifyMenuA
MapDialogRect
GetSubMenu
GetDesktopWindow
LoadImageA
SetScrollRange
CallNextHookEx
MessageBeep
SetWindowLongA
EqualRect
GetMenuItemInfoA
ReleaseDC
ScreenToClient
PtInRect
RegisterWindowMessageA
UnregisterHotKey
GetForegroundWindow
GetScrollPos
GrayStringA
GetMessageTime
GetDC
SetDlgItemTextA
MessageBoxA
UnhookWindowsHookEx
GetSystemMenu
EndPaint
GetDlgItem
GetMenuState
SetForegroundWindow
GetParent
GetWindowRect
GetClassInfoA
GetClientRect
GetMenuItemCount
SendDlgItemMessageA
GetMenuStringA
GetMenuItemID
OpenClipboard
PostQuitMessage
gdi32
RestoreDC
SetMapMode
Escape
IntersectClipRect
GetTextColor
PatBlt
LineTo
SetWindowOrgEx
GetTextMetricsA
SetTextColor
StretchDIBits
BitBlt
MoveToEx
SelectObject
CreateDIBSection
GetDeviceCaps
CreateRectRgnIndirect
CreateSolidBrush
SetPixelV
RoundRect
CreatePatternBrush
GetMapMode
CreateDIBitmap
GetObjectA
GetGraphicsMode
CreateFontA
ExcludeClipRect
EnumFontFamiliesExA
GetWindowExtEx
ExtFloodFill
GetClipBox
DPtoLP
CreateCompatibleDC
SetViewportOrgEx
SetBkMode
GetStockObject
Rectangle
GetTextExtentPoint32A
PtVisible
ExtTextOutA
SetGraphicsMode
SetTextAlign
SelectClipRgn
DeleteDC
LPtoDP
GetBkColor
CreateRectRgn
GetViewportExtEx
CreatePen
RectVisible
ScaleViewportExtEx
Ellipse
GetPixel
DeleteObject
CreateFontIndirectA
OffsetViewportOrgEx
CombineRgn
SaveDC
GetTextExtentPointA
ScaleWindowExtEx
SetRectRgn
SetViewportExtEx
FloodFill
CreateBitmap
CreateCompatibleBitmap
SetWindowExtEx
Polygon
SetPixel
SetBkColor
TextOutA
advapi32
RegEnumKeyA
RegQueryValueExA
RegDeleteValueA
RegEnumKeyExA
RegDeleteKeyA
RegCloseKey
RegSetValueA
RegOpenKeyExA
wininet
HttpQueryInfoW
InternetQueryDataAvailable
InternetGetLastResponseInfoW
InternetConnectW
InternetOpenW
InternetWriteFile
InternetSetFilePointer
InternetSetStatusCallbackW
InternetReadFile
HttpSendRequestW
DetectAutoProxyUrl
InternetCrackUrlW
shlwapi
PathSetDlgItemPathW
SHSetValueW
StrCatW
StrTrimW
SHDeleteValueW
Sections
.text Size: 64KB - Virtual size: 63KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 256KB - Virtual size: 254KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 68KB - Virtual size: 75KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 48KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ