Static task
static1
Behavioral task
behavioral1
Sample
be82458e2c9361fd8e47e36a082c6d8e98e52aa05f6e4df858a5e2f5c968fbd4.exe
Resource
win7-20220812-en
General
-
Target
be82458e2c9361fd8e47e36a082c6d8e98e52aa05f6e4df858a5e2f5c968fbd4
-
Size
920KB
-
MD5
197fa0060b619c1d18120b433580b640
-
SHA1
336baca5d5221828bc8c0bd4f7cc07cfa183f66c
-
SHA256
be82458e2c9361fd8e47e36a082c6d8e98e52aa05f6e4df858a5e2f5c968fbd4
-
SHA512
1506a2e0a84d8460e6b88c9e75b15b6ada1ed969018561244b595ea11585f73f79b42e5f5340bdce88643f020341c00a5b74938caaa7ed1b87f0052766da5464
-
SSDEEP
24576:PhtJphrCokyZyaKzz2NNr4RkMPs6Z5b/Ieu:Ztjh2opczzgNr4RkMPs6Z57e
Malware Config
Signatures
Files
-
be82458e2c9361fd8e47e36a082c6d8e98e52aa05f6e4df858a5e2f5c968fbd4.exe windows x86
adad24d7963cbceeaec7b70d465c5544
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetTimeZoneInformation
GetSystemTime
GetLocalTime
GetACP
HeapReAlloc
CreateThread
ExitThread
HeapSize
GetEnvironmentVariableA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
GetDriveTypeA
LCMapStringA
LCMapStringW
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
HeapAlloc
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
IsBadCodePtr
SetStdHandle
CompareStringA
CompareStringW
SetEnvironmentVariableA
GetProfileStringA
InterlockedExchange
RaiseException
GetCommandLineA
GetStartupInfoA
TerminateProcess
ExitProcess
FindNextFileA
CreateDirectoryA
HeapFree
GetSystemTimeAsFileTime
RtlUnwind
FindResourceExA
GetCurrentDirectoryA
SetErrorMode
lstrlenW
CopyFileA
GetOEMCP
GetCPInfo
GetProcessVersion
TlsGetValue
LocalReAlloc
TlsSetValue
EnterCriticalSection
GlobalReAlloc
LeaveCriticalSection
TlsFree
GlobalHandle
DeleteCriticalSection
TlsAlloc
InitializeCriticalSection
LocalAlloc
SizeofResource
GlobalFlags
SearchPathA
GetTempPathA
GetCurrentThread
CreateEventA
SetThreadPriority
SetEvent
GetThreadLocale
GetStringTypeExA
GetFullPathNameA
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
GetCurrentProcess
DuplicateHandle
CreateFileA
SetFileTime
SystemTimeToFileTime
LocalFileTimeToFileTime
FindFirstFileA
FindClose
GetFileTime
GetFileSize
GetProfileIntA
WritePrivateProfileStringA
GetPrivateProfileStringA
GetPrivateProfileIntA
FileTimeToLocalFileTime
FileTimeToSystemTime
lstrcpynA
GetLastError
SetLastError
lstrcmpA
GetModuleFileNameA
LocalFree
InterlockedDecrement
InterlockedIncrement
FreeLibrary
GetCurrentThreadId
GlobalGetAtomNameA
lstrcmpiA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
lstrcpyA
GetModuleHandleA
WideCharToMultiByte
MultiByteToWideChar
GetTickCount
DeleteFileA
MoveFileA
FindResourceA
LoadResource
GetWindowsDirectoryA
GetVolumeInformationA
GetVersionExA
GetSystemDirectoryA
MulDiv
SuspendThread
ResumeThread
GetTempFileNameA
GetFileAttributesA
GetDiskFreeSpaceA
GetVersion
lstrcatA
lstrlenA
GlobalSize
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
LockResource
LoadLibraryA
GetProcAddress
IsBadReadPtr
GetShortPathNameA
CloseHandle
WaitForSingleObject
ReleaseMutex
CreateMutexA
GetEnvironmentStrings
Sleep
user32
RemoveMenu
GetAsyncKeyState
MapDialogRect
DrawFocusRect
FillRect
GetClassNameA
GetSysColorBrush
GetMenuStringA
FindWindowA
InvertRect
GetDCEx
LockWindowUpdate
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
LoadIconA
SendDlgItemMessageA
MapWindowPoints
SetFocus
AdjustWindowRectEx
ScreenToClient
EqualRect
DeferWindowPos
BeginDeferWindowPos
CopyRect
EndDeferWindowPos
GetScrollPos
SetScrollPos
GetTopWindow
MessageBoxA
IsChild
GetCapture
WinHelpA
GetClassInfoA
RegisterClassA
GetMenu
GetMenuItemCount
GetMenuItemID
TrackPopupMenu
SetWindowPlacement
GetWindowTextLengthA
GetKeyState
CreateWindowExA
SetWindowsHookExA
CallNextHookEx
GetClassLongA
SetPropA
UnhookWindowsHookEx
GetPropA
CallWindowProcA
RemovePropA
DefWindowProcA
GetMessageTime
GetMessagePos
GetLastActivePopup
GetWindow
LoadStringA
SetWindowPos
IntersectRect
SystemParametersInfoA
GetWindowPlacement
GetNextDlgTabItem
EndDialog
GetActiveWindow
SetActiveWindow
GetSystemMetrics
CreateDialogIndirectParamA
DestroyWindow
GetParent
GetWindowLongA
GetDlgItem
IsWindowEnabled
GetDC
IsWindowVisible
GetForegroundWindow
LoadImageA
IsClipboardFormatAvailable
GetClipboardData
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
ModifyMenuA
UpdateWindow
GetFocus
IsIconic
GetClientRect
EnumWindows
GetWindowTextA
ClientToScreen
UnregisterClassA
EndPaint
HideCaret
ShowCaret
ExcludeUpdateRgn
DefDlgProcA
CharNextA
IsWindowUnicode
IsWindow
SendMessageA
InvalidateRect
SetForegroundWindow
PostQuitMessage
DdeInitializeA
DdeCreateStringHandleA
DdeConnect
DdeClientTransaction
GetDlgCtrlID
ShowWindow
SendMessageTimeoutA
PostMessageA
PostThreadMessageA
GetWindowRect
OffsetRect
wsprintfA
RegisterClipboardFormatA
DestroyIcon
ShowOwnedPopups
GetSystemMenu
DeleteMenu
AppendMenuA
WindowFromPoint
LoadCursorA
DestroyCursor
SetCursorPos
RedrawWindow
IsZoomed
LoadMenuA
GetSysColor
GetSubMenu
InsertMenuA
GetDesktopWindow
KillTimer
RegisterWindowMessageA
PeekMessageA
TranslateMessage
DispatchMessageA
SetTimer
EnableWindow
WaitMessage
GetMessageA
ValidateRect
BringWindowToTop
UnpackDDElParam
ReuseDDElParam
SetMenu
SetCursor
TranslateAcceleratorA
LoadAcceleratorsA
CharUpperA
SetParent
SetRectEmpty
GetCursorPos
SetRect
IsRectEmpty
InflateRect
SetCapture
PtInRect
ReleaseCapture
DestroyMenu
GrayStringA
DrawTextA
TabbedTextOutA
BeginPaint
GetWindowDC
ReleaseDC
wvsprintfA
MoveWindow
SetWindowTextA
IsDialogMessageA
SetWindowLongA
SetDlgItemTextA
gdi32
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
SelectClipRgn
ExcludeClipRect
IntersectClipRect
DeleteObject
CreateRectRgn
GetDeviceCaps
CreateSolidBrush
CreatePatternBrush
PtVisible
RectVisible
Escape
PatBlt
CreateRectRgnIndirect
CreateCompatibleDC
CreateCompatibleBitmap
GetCharWidthA
CreateFontA
SetRectRgn
CombineRgn
DPtoLP
BitBlt
CopyMetaFileA
EnumFontFamiliesExA
SetBkMode
GetStockObject
RestoreDC
SaveDC
CreateBitmap
GetClipBox
RealizePalette
GetObjectA
CreateFontIndirectA
SelectObject
StartDocA
StartPage
GetTextMetricsA
TextOutA
EndPage
EndDoc
DeleteDC
GetTextExtentPoint32A
GetTextExtentPointA
SetTextAlign
ExtTextOutA
SetTextColor
SetBkColor
CreatePalette
SelectPalette
SetStretchBltMode
SetDIBitsToDevice
CreateDIBitmap
StretchDIBits
comdlg32
GetOpenFileNameA
GetFileTitleA
GetSaveFileNameA
PrintDlgA
winspool.drv
DocumentPropertiesA
ClosePrinter
OpenPrinterA
advapi32
SetFileSecurityA
RegEnumKeyExA
RegOpenKeyExA
GetUserNameA
RegSetValueExA
RegQueryValueExA
RegCreateKeyExA
RegDeleteValueA
RegDeleteKeyA
RegOpenKeyA
RegEnumKeyA
RegCreateKeyA
GetFileSecurityA
RegCloseKey
RegQueryValueA
RegSetValueA
shell32
Shell_NotifyIconA
ExtractIconA
DragFinish
SHGetFileInfoA
DragAcceptFiles
ShellExecuteA
DragQueryFileA
FindExecutableA
ShellExecuteExA
SHFileOperationA
comctl32
ord17
ImageList_Destroy
ImageList_LoadImageA
PropertySheetA
DestroyPropertySheetPage
CreatePropertySheetPageA
wsock32
send
connect
WSAAsyncSelect
socket
sendto
WSACancelBlockingCall
WSAGetLastError
ntohs
getpeername
htons
inet_ntoa
WSASetBlockingHook
WSAUnhookBlockingHook
ioctlsocket
WSACleanup
WSAStartup
WSASetLastError
accept
bind
htonl
closesocket
gethostbyname
recv
recvfrom
oledlg
ord8
ole32
ReleaseStgMedium
CoTaskMemFree
OleFlushClipboard
OleIsCurrentClipboard
DoDragDrop
OleInitialize
OleUninitialize
CoRevokeClassObject
CoFreeUnusedLibraries
CoRegisterMessageFilter
CreateStreamOnHGlobal
CoTaskMemAlloc
OleDuplicateData
shlwapi
SHDeleteKeyA
Sections
.text Size: 444KB - Virtual size: 442KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 96KB - Virtual size: 92KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 52KB - Virtual size: 73KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 264KB - Virtual size: 262KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rmnet Size: 60KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE