Static task
static1
Behavioral task
behavioral1
Sample
683855607aed196d7a803170376ef001d32163c19a6657e4b743f1eccfbfe51d.exe
Resource
win7-20220812-en
General
-
Target
683855607aed196d7a803170376ef001d32163c19a6657e4b743f1eccfbfe51d
-
Size
325KB
-
MD5
0916dfe99c51c0549ba1a7b2b70b09d0
-
SHA1
4710466617b7953bc5e2f28e02afc915243c82d2
-
SHA256
683855607aed196d7a803170376ef001d32163c19a6657e4b743f1eccfbfe51d
-
SHA512
bf997e3dd5a4b5306108d37b0ca4b00ef7f4bcf49c7594f2cb496971c9b9491acf718145d0093b75f43fa39333510fb553244332c0f0de432b742d5e90e2dbde
-
SSDEEP
6144:QWSS7iyi8k8zcUE+rebXkwMEXZYy4AExQgbr11uibU8q:Q/78PEXDkwLXZYGBq1UZ8q
Malware Config
Signatures
Files
-
683855607aed196d7a803170376ef001d32163c19a6657e4b743f1eccfbfe51d.exe windows x86
edfdc79a30742c2a76bcd8f3a3647d8d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
EnumResourceLanguagesW
GetVersion
ConvertDefaultLocale
GlobalDeleteAtom
GlobalAddAtomW
GetCurrentProcessId
InterlockedIncrement
LocalAlloc
TlsGetValue
GlobalReAlloc
GlobalHandle
TlsAlloc
TlsSetValue
LocalReAlloc
DeleteCriticalSection
TlsFree
GetThreadLocale
FileTimeToSystemTime
GetVersionExA
CompareStringW
GlobalFindAtomW
GlobalFlags
WritePrivateProfileStringW
GetLocaleInfoW
GetModuleHandleA
MoveFileW
SetFilePointer
FlushFileBuffers
SetEndOfFile
SetErrorMode
FileTimeToLocalFileTime
GetFileAttributesW
GetStartupInfoW
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetDriveTypeW
RtlUnwind
RaiseException
HeapReAlloc
ExitProcess
HeapSize
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
HeapDestroy
HeapCreate
VirtualFree
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
LCMapStringA
LCMapStringW
VirtualAlloc
GetCurrentDirectoryA
GetTimeZoneInformation
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
GetConsoleCP
GetConsoleMode
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetDriveTypeA
CreateFileA
SetEnvironmentVariableA
SetEnvironmentVariableW
CompareStringA
InterlockedExchange
lstrcmpW
InterlockedDecrement
lstrlenA
lstrcmpA
GlobalLock
GlobalUnlock
lstrlenW
LoadLibraryA
GlobalFree
GlobalAlloc
GetTickCount
LoadLibraryExW
ReadFile
WriteFile
CreateFileW
LocalFree
FormatMessageW
OutputDebugStringW
GetCurrentThreadId
GetExitCodeProcess
WaitForSingleObject
CreateProcessW
GetCurrentProcess
MultiByteToWideChar
WideCharToMultiByte
GetCurrentThread
GetModuleHandleW
CloseHandle
HeapFree
GetProcessHeap
HeapAlloc
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
FreeLibrary
GetLocalTime
SetLastError
GetModuleFileNameW
CopyFileW
GetTempPathW
GetWindowsDirectoryW
RemoveDirectoryW
FindClose
FindNextFileW
SetFileAttributesW
FindFirstFileW
GetSystemDefaultLangID
GetUserDefaultLangID
GetSystemDefaultUILanguage
GetUserDefaultUILanguage
GetFullPathNameW
FindResourceW
GetProcAddress
LoadResource
LoadLibraryW
LockResource
SizeofResource
Sleep
GetLastError
DeleteFileW
user32
RegisterWindowMessageW
LoadIconW
WinHelpW
GetCapture
GetClassLongW
GetClassNameW
SetPropW
GetPropW
RemovePropW
IsWindow
GetForegroundWindow
GetDlgItem
UnregisterClassA
DestroyWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetForegroundWindow
GetClientRect
GetMenu
CreateWindowExW
GetClassInfoExW
GetClassInfoW
RegisterClassW
AdjustWindowRectEx
CopyRect
PtInRect
GetDlgCtrlID
DefWindowProcW
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindow
GetWindowTextW
LoadCursorW
GetDC
ReleaseDC
GetSysColor
GetSysColorBrush
GetWindowThreadProcessId
GetWindowLongW
GetLastActivePopup
IsWindowEnabled
EnableWindow
SetCursor
TranslateMessage
DispatchMessageW
GetActiveWindow
IsWindowVisible
GetKeyState
PeekMessageW
GetCursorPos
ValidateRect
PostQuitMessage
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapW
GetFocus
GetParent
SendMessageW
ModifyMenuW
EnableMenuItem
CheckMenuItem
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
LoadStringW
UnhookWindowsHookEx
MessageBoxW
SetWindowsHookExW
CallNextHookEx
SetWindowLongW
SetWindowPos
GetWindowRect
GetSystemMetrics
CallWindowProcW
ExitWindowsEx
PostMessageW
DestroyMenu
GrayStringW
DrawTextExW
DrawTextW
TabbedTextOutW
UnregisterClassW
ClientToScreen
ShowWindow
GetMessageW
SetWindowTextW
GetTopWindow
gdi32
SetBkColor
SetTextColor
GetClipBox
CreateBitmap
GetDeviceCaps
DeleteObject
SaveDC
PtVisible
RectVisible
TextOutW
ExtTextOutW
Escape
SelectObject
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
DeleteDC
GetStockObject
SetMapMode
RestoreDC
winspool.drv
OpenPrinterW
ClosePrinter
DocumentPropertiesW
advapi32
RegCloseKey
RegCreateKeyExW
RegSetValueExW
RegQueryValueExW
RegDeleteValueW
RegQueryValueW
RegEnumKeyW
RegDeleteKeyW
RegOpenKeyW
RegOpenKeyExW
AdjustTokenPrivileges
LookupPrivilegeValueW
OpenProcessToken
shell32
ord680
SHGetFolderPathW
shlwapi
PathFindFileNameW
PathFindExtensionW
PathAppendW
oleaut32
VariantChangeType
VariantClear
VariantInit
Sections
.text Size: 168KB - Virtual size: 167KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 40KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 12KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 96KB - Virtual size: 96KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE