Static task
static1
Behavioral task
behavioral1
Sample
c73646dfef1a24db8bbaaf4d9296e4b3ae2af08966095fe08568e421450b6bc7.exe
Resource
win7-20220812-en
General
-
Target
c73646dfef1a24db8bbaaf4d9296e4b3ae2af08966095fe08568e421450b6bc7
-
Size
1.2MB
-
MD5
07542d71819e90ea679ed2eae7b518a0
-
SHA1
1cfa508d3bc16eab2f9911d6f6128a3c8193dcfc
-
SHA256
c73646dfef1a24db8bbaaf4d9296e4b3ae2af08966095fe08568e421450b6bc7
-
SHA512
aff7a7111d3621e1b979f060cbf2bea704466724a06340002d50c7fe1b64a5215c7d9326c9fb1c97d89ed88ec1bbf9d735c1e4f96aa307667d3967afb3c860c3
-
SSDEEP
24576:LprrQeKgtYOfGuHtxHpAluTBfUMu0ZU/BL/VEi3pS8mTATn9:LprrjmOTJAluTB20qN3pS8mTYn9
Malware Config
Signatures
Files
-
c73646dfef1a24db8bbaaf4d9296e4b3ae2af08966095fe08568e421450b6bc7.exe windows x86
8ff96f65cbd233e9fe556bf2bec6063a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
version
VerQueryValueW
wininet
InternetSetOptionW
HttpOpenRequestW
InternetCloseHandle
rpcrt4
UuidCreateSequential
iphlpapi
GetAdaptersInfo
kernel32
GetExitCodeProcess
WaitForSingleObject
GetFileType
FindClose
CloseHandle
GetTimeZoneInformation
PeekNamedPipe
LoadLibraryW
GetModuleHandleW
GetTempPathW
GetDiskFreeSpaceW
CreateFileW
FindFirstFileW
FindNextFileW
WideCharToMultiByte
GetLocaleInfoW
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
Module32FirstW
Module32NextW
OpenThread
InitializeCriticalSection
LoadLibraryA
FreeLibrary
TerminateProcess
Sleep
HeapAlloc
HeapFree
GetProcessHeap
GetCurrentProcessId
GetModuleHandleA
GetFileSize
GetFileSizeEx
WriteFile
ReadFile
FlushFileBuffers
SetEndOfFile
SetFilePointer
GetSystemTimeAsFileTime
GetEnvironmentVariableW
ExpandEnvironmentStringsW
GetFileAttributesW
LocalFree
GetVersion
CreateMutexW
MultiByteToWideChar
GlobalHandle
GlobalFree
lstrcmpiW
LoadLibraryExW
GetStdHandle
QueryPerformanceCounter
GlobalMemoryStatus
GetVersionExA
FlushConsoleInputBuffer
TlsSetValue
TlsGetValue
OpenProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCPInfo
SetConsoleMode
ReadConsoleInputA
GetConsoleMode
SetConsoleCtrlHandler
AreFileApisANSI
GetModuleHandleExW
ExitProcess
GetCommandLineW
IsDebuggerPresent
ExitThread
CreateThread
RtlUnwind
GetStringTypeW
EncodePointer
DecodePointer
HeapSize
HeapReAlloc
HeapDestroy
VirtualFree
VirtualAlloc
IsProcessorFeaturePresent
InterlockedPushEntrySList
InterlockedPopEntrySList
InitializeSListHead
InterlockedCompareExchange
FindResourceExW
FindResourceW
GetModuleFileNameW
lstrcmpW
GetMailslotInfo
GetTickCount
MulDiv
SizeofResource
LoadResource
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
LeaveCriticalSection
EnterCriticalSection
SetLastError
GetLastError
GetCurrentThreadId
RaiseException
CompareStringW
LCMapStringW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
IsValidCodePage
GetACP
GetOEMCP
GetConsoleCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
ReadConsoleW
SetStdHandle
SetFilePointerEx
GetCurrentProcess
FlushInstructionCache
GlobalUnlock
GlobalLock
GlobalAlloc
LockResource
InterlockedDecrement
InterlockedIncrement
TlsAlloc
GetProcAddress
TlsFree
GetStartupInfoW
OutputDebugStringW
WriteConsoleW
SetEnvironmentVariableA
OpenMutexW
user32
CreateDialogIndirectParamW
PeekMessageW
DispatchMessageW
TranslateMessage
GetMessageW
GetWindowThreadProcessId
EnumWindows
GetMonitorInfoW
MonitorFromWindow
IsDialogMessageW
MapWindowPoints
GetWindowRect
GetLastInputInfo
PostMessageW
GetKeyboardLayoutList
MapDialogRect
LoadCursorW
GetWindow
GetClassNameW
GetParent
GetDesktopWindow
SetWindowLongW
FillRect
GetSysColor
ScreenToClient
GetUserObjectInformationW
GetProcessWindowStation
MessageBoxA
ClientToScreen
SetWindowContextHelpId
GetClientRect
GetWindowTextLengthW
GetWindowTextW
SetWindowTextW
RedrawWindow
InvalidateRgn
InvalidateRect
EndPaint
BeginPaint
ReleaseDC
GetDC
DestroyAcceleratorTable
CreateAcceleratorTableW
SetTimer
ReleaseCapture
SetCapture
GetFocus
SetFocus
CharNextW
SendDlgItemMessageW
GetDlgItem
EndDialog
SetWindowPos
MoveWindow
DestroyWindow
IsChild
IsWindow
CreateWindowExW
GetClassInfoExW
RegisterClassExW
CallWindowProcW
DefWindowProcW
SendMessageW
RegisterWindowMessageW
UnregisterClassW
GetWindowLongW
gdi32
BitBlt
CreateCompatibleBitmap
CreateCompatibleDC
DeleteDC
DeleteObject
GetDeviceCaps
GetStockObject
SelectObject
CreateSolidBrush
GetObjectW
advapi32
LookupAccountSidW
GetTokenInformation
LookupPrivilegeValueW
AdjustTokenPrivileges
RegSetValueExW
RegQueryValueExW
RegQueryInfoKeyW
RegOpenKeyExW
RegEnumValueW
RegEnumKeyExW
RegDeleteValueW
RegDeleteKeyW
RegSetValueW
DeregisterEventSource
ReportEventA
RegisterEventSourceA
RegCreateKeyExW
RegCloseKey
shell32
ShellExecuteExW
SHGetFolderPathW
ole32
OleUninitialize
OleInitialize
CoTaskMemFree
CoTaskMemAlloc
OleLockRunning
CLSIDFromProgID
CLSIDFromString
CoCreateInstance
CoGetClassObject
CreateStreamOnHGlobal
CoInitialize
CoUninitialize
CoTaskMemRealloc
StringFromGUID2
oleaut32
SysStringLen
VariantInit
VariantClear
LoadTypeLi
LoadRegTypeLi
DispCallFunc
SysFreeString
VarUI4FromStr
SysAllocStringLen
OleCreateFontIndirect
SysAllocString
comctl32
InitCommonControlsEx
psapi
GetProcessImageFileNameW
GetModuleFileNameExW
Sections
.text Size: 822KB - Virtual size: 821KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 263KB - Virtual size: 262KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 25KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.text Size: 125KB - Virtual size: 128KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE