Static task
static1
Behavioral task
behavioral1
Sample
50507b5257044246602965897865b4c3260cc57ac599fa0505ffab6f7a13c30a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
50507b5257044246602965897865b4c3260cc57ac599fa0505ffab6f7a13c30a.exe
Resource
win10v2004-20220812-en
General
-
Target
50507b5257044246602965897865b4c3260cc57ac599fa0505ffab6f7a13c30a
-
Size
1.2MB
-
MD5
025422ad2c5c9954887b799cf76c03cd
-
SHA1
3200a2ea2bd899a8e13de10a88b0bc36c96179aa
-
SHA256
50507b5257044246602965897865b4c3260cc57ac599fa0505ffab6f7a13c30a
-
SHA512
8b914310b5bed9017f1c2aff0111097df4098f2b2dfa2c0592b05768ba4453f830e0b22f59576e4d231d80426505ff6f45c0c957f955d13c513ef40c35f779a3
-
SSDEEP
24576:3HvtTCUZWhSQVH2arrTOYwz6dgR4tspC6659a7AV1q:/tTfaS2l3TndgStjzWAV1q
Malware Config
Signatures
Files
-
50507b5257044246602965897865b4c3260cc57ac599fa0505ffab6f7a13c30a.exe windows x86
1a78be0cb43a3009478e4c32c17f77f4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
dsetup
ord11
kernel32
GetCPInfo
GetOEMCP
SetErrorMode
FileTimeToLocalFileTime
LocalFileTimeToFileTime
GetFileTime
LocalUnlock
LocalLock
GetTempFileNameA
GetDiskFreeSpaceA
RtlUnwind
ExitProcess
FindNextFileA
HeapAlloc
HeapFree
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
GetStartupInfoA
GetCommandLineA
ExitThread
CreateThread
HeapReAlloc
HeapSize
QueryPerformanceCounter
GetSystemTimeAsFileTime
FatalAppExitA
GetTimeZoneInformation
SetUnhandledExceptionFilter
LCMapStringA
LCMapStringW
SetHandleCount
GetStdHandle
GetFileType
SetStdHandle
HeapDestroy
HeapCreate
VirtualFree
IsBadWritePtr
GetStringTypeA
GetStringTypeW
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
IsBadReadPtr
IsBadCodePtr
TlsFree
GetDateFormatA
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
SetConsoleCtrlHandler
GetLocaleInfoW
SetEnvironmentVariableA
ReleaseMutex
GetLastError
CreateMutexA
OpenMutexA
CreateProcessA
DeleteFileA
Sleep
InterlockedExchange
GetACP
GetLocaleInfoA
GetThreadLocale
GetVersionExA
GetCurrentProcessId
MultiByteToWideChar
SizeofResource
LockResource
LoadResource
FindResourceA
WideCharToMultiByte
OutputDebugStringA
GetLocalTime
SetFileAttributesA
GetFileAttributesA
FormatMessageA
GetModuleHandleA
WaitForSingleObject
ResumeThread
LocalReAlloc
TlsSetValue
TlsAlloc
TlsGetValue
EnterCriticalSection
GlobalHandle
GlobalReAlloc
LeaveCriticalSection
LocalAlloc
GlobalFlags
InterlockedIncrement
GetPrivateProfileStringA
WritePrivateProfileStringA
GetPrivateProfileIntA
GetShortPathNameA
CreateFileA
GetFullPathNameA
GetVolumeInformationA
FindFirstFileA
FindClose
GetCurrentProcess
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
TerminateThread
SetFileTime
MulDiv
GetTickCount
GetCurrentDirectoryA
FileTimeToSystemTime
GetFileAttributesExA
CreateDirectoryA
SystemTimeToFileTime
lstrlenA
RaiseException
InitializeCriticalSection
DeleteCriticalSection
GetVersion
WriteFile
ReadFile
MoveFileA
InterlockedDecrement
SetLastError
CopyFileA
GlobalSize
LocalFree
GlobalGetAtomNameA
GlobalFindAtomA
lstrcmpW
lstrcpynA
GlobalUnlock
GlobalFree
CreateEventA
SuspendThread
SetEvent
SetThreadPriority
GlobalAddAtomA
GetCurrentThread
GetCurrentThreadId
GlobalLock
GlobalAlloc
GlobalDeleteAtom
lstrcmpA
lstrcmpiA
GetModuleFileNameA
GetProcAddress
ConvertDefaultLocale
EnumResourceLanguagesA
FreeResource
GetWindowsDirectoryA
LoadLibraryA
FreeLibrary
lstrcatA
WinExec
lstrcpyA
IsDBCSLeadByte
CreateToolhelp32Snapshot
Process32First
Process32Next
CloseHandle
OpenProcess
GetExitCodeProcess
TerminateProcess
GetStringTypeExW
GetStringTypeExA
GetEnvironmentVariableW
GetEnvironmentVariableA
CompareStringW
CompareStringA
lstrcmpiW
lstrlenW
GetTimeFormatA
user32
BringWindowToTop
SetRectEmpty
CreatePopupMenu
InsertMenuItemA
LoadAcceleratorsA
ReuseDDElParam
UnpackDDElParam
IsClipboardFormatAvailable
GetTabbedTextExtentA
RegisterClipboardFormatA
UnionRect
PostThreadMessageA
GetDCEx
LockWindowUpdate
GetSystemMenu
SetParent
ReleaseCapture
SetCapture
ScrollWindowEx
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
IsDlgButtonChecked
SetDlgItemTextA
SetDlgItemInt
GetDlgItemTextA
GetDlgItemInt
CheckRadioButton
CheckDlgButton
EndPaint
BeginPaint
GetWindowDC
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
GetMenuStringA
AppendMenuA
InsertMenuA
RemoveMenu
SetWindowContextHelpId
MapDialogRect
MapVirtualKeyA
GetKeyNameTextA
RegisterWindowMessageA
WinHelpA
GetCapture
CreateWindowExA
GetClassLongA
GetClassInfoExA
GetClassNameA
SetPropA
GetPropA
RemovePropA
SendDlgItemMessageA
SetFocus
IsChild
GetWindowTextLengthA
GetWindowTextA
GetForegroundWindow
BeginDeferWindowPos
EndDeferWindowPos
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
MapWindowPoints
ScrollWindow
TrackPopupMenu
SetScrollRange
GetScrollRange
SetScrollPos
GetScrollPos
SetForegroundWindow
ShowScrollBar
SetMenu
GetMenuItemID
GetMenuItemCount
AdjustWindowRectEx
EqualRect
DeferWindowPos
GetScrollInfo
SetScrollInfo
GetClassInfoA
RegisterClassA
SetWindowPlacement
DefWindowProcA
CallWindowProcA
SetWindowPos
IntersectRect
SystemParametersInfoA
GetWindowPlacement
GetWindow
GetDesktopWindow
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
GetDlgItem
EndDialog
SetMenuItemBitmaps
GetFocus
ModifyMenuA
GetMenuState
EnableMenuItem
CheckMenuItem
GetMenuCheckMarkDimensions
LoadBitmapA
SetWindowsHookExA
CallNextHookEx
GetMessageA
TranslateMessage
DispatchMessageA
IsWindowVisible
GetKeyState
PeekMessageA
GetCursorPos
ValidateRect
MessageBoxA
GetLastActivePopup
IsWindowEnabled
ShowOwnedPopups
RedrawWindow
UpdateWindow
SetWindowLongA
LoadCursorA
CopyIcon
MessageBeep
IsWindow
GetMessagePos
KillTimer
SetTimer
ScreenToClient
PtInRect
LoadMenuA
LoadImageA
GetSubMenu
TrackPopupMenuEx
SetCursor
DestroyCursor
DestroyMenu
TranslateAcceleratorA
GetNextDlgGroupItem
InvalidateRgn
CopyAcceleratorTableA
SetRect
IsRectEmpty
GetMenuItemInfoA
GetWindowLongA
WindowFromPoint
GetParent
GetNextDlgTabItem
GetActiveWindow
InvalidateRect
ClientToScreen
DrawFocusRect
FrameRect
FillRect
OffsetRect
InflateRect
CopyRect
GetDialogBaseUnits
GetSysColorBrush
DeleteMenu
WaitMessage
GetMenu
GetWindowThreadProcessId
GetSysColor
GetIconInfo
GetDC
CreateIconIndirect
ReleaseDC
DrawStateA
DestroyIcon
CharNextA
UnregisterClassA
CharUpperW
CharUpperA
CharLowerW
CharLowerA
CharNextExA
SetWindowRgn
GetSystemMetrics
EnableWindow
LoadIconA
GetClientRect
GetWindowRect
IsIconic
DrawIcon
FindWindowA
SendMessageA
PostQuitMessage
wsprintfA
PostMessageA
GetDlgCtrlID
gdi32
SetStretchBltMode
SetMapMode
ExcludeClipRect
IntersectClipRect
OffsetClipRgn
LineTo
MoveToEx
SetTextAlign
SetTextJustification
SetTextCharacterExtra
SetMapperFlags
SetArcDirection
SetColorAdjustment
SelectClipRgn
GetClipRgn
CreateRectRgn
SelectClipPath
GetViewportExtEx
GetWindowExtEx
StartDocA
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowOrgEx
OffsetWindowOrgEx
SetWindowExtEx
SetROP2
GetCurrentPositionEx
ArcTo
PolyDraw
PolylineTo
PolyBezierTo
ExtSelectClipRgn
CreateDIBPatternBrushPt
CreatePatternBrush
SelectPalette
PlayMetaFileRecord
GetObjectType
EnumMetaFile
PlayMetaFile
CreatePen
ExtCreatePen
CreateHatchBrush
SetRectRgn
CombineRgn
GetMapMode
DPtoLP
GetTextMetricsA
GetBkColor
GetTextColor
GetRgnBox
GetCharWidthA
StretchDIBits
CreateFontA
StartPage
EndPage
SetAbortProc
AbortDoc
EndDoc
SetPolyFillMode
SetBkMode
RestoreDC
SaveDC
CreateDCA
CopyMetaFileA
GetDeviceCaps
PatBlt
CreateRectRgnIndirect
GetClipBox
GetDCOrgEx
CreateSolidBrush
GetTextExtentPoint32A
CreateCompatibleBitmap
GetPixel
SetPixel
CreateBitmap
SetBkColor
SetTextColor
DeleteObject
GetObjectA
CreateFontIndirectA
CreateRoundRectRgn
CreateCompatibleDC
SelectObject
BitBlt
DeleteDC
ScaleWindowExtEx
GetStockObject
comdlg32
FindTextA
PageSetupDlgA
ReplaceTextA
CommDlgExtendedError
GetOpenFileNameA
GetSaveFileNameA
GetFileTitleA
PrintDlgA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
GetJobA
advapi32
RegQueryValueA
RegOpenKeyExA
RegQueryValueExA
RegDeleteKeyA
RegEnumKeyA
RegOpenKeyA
RegSetValueA
RegCreateKeyExA
RegSetValueExA
RegDeleteValueA
RegCreateKeyA
SetFileSecurityA
GetFileSecurityA
RegCloseKey
shell32
DragQueryFileA
ShellExecuteExA
SHGetFileInfoA
ExtractIconA
DragFinish
ShellExecuteA
comctl32
_TrackMouseEvent
ord17
ord13
ImageList_Read
ImageList_Write
ord14
ImageList_Destroy
ImageList_Create
ImageList_LoadImageA
ImageList_Merge
ImageList_Draw
ImageList_GetImageInfo
shlwapi
PathRemoveExtensionA
PathFindFileNameA
PathStripToRootA
PathFindExtensionA
PathIsUNCA
oledlg
ord8
ole32
ReadClassStg
ReadFmtUserTypeStg
OleRegGetUserType
WriteClassStg
OleInitialize
StringFromCLSID
CoTaskMemFree
CLSIDFromString
CLSIDFromProgID
CreateStreamOnHGlobal
CoTreatAsClass
CreateBindCtx
CoTaskMemAlloc
ReleaseStgMedium
OleDuplicateData
CoCreateInstance
StringFromGUID2
CoDisconnectObject
CoGetClassObject
StgOpenStorageOnILockBytes
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
OleRun
OleUninitialize
SetConvertStg
CoFreeUnusedLibraries
CoRegisterMessageFilter
OleFlushClipboard
OleIsCurrentClipboard
OleSetClipboard
CoRevokeClassObject
WriteFmtUserTypeStg
CoRegisterClassObject
oleaut32
LoadTypeLi
OleCreateFontIndirect
VarBstrFromDate
VarBstrFromCy
VarCyFromStr
VarDecFromStr
VarBstrFromDec
VarDateFromStr
SysReAllocStringLen
SysAllocStringByteLen
SysAllocString
SystemTimeToVariantTime
VariantTimeToSystemTime
SysStringLen
SafeArrayDestroyDescriptor
SafeArrayDestroyData
SafeArrayDestroy
SafeArrayUnlock
SafeArrayLock
SafeArrayPutElement
SafeArrayPtrOfIndex
SafeArrayGetElement
SafeArrayCopy
SafeArrayAllocDescriptor
SafeArrayAllocData
VariantCopy
SysStringByteLen
SafeArrayRedim
SafeArrayCreate
SafeArrayGetDim
SafeArrayGetElemsize
SafeArrayGetLBound
SafeArrayGetUBound
SafeArrayAccessData
SafeArrayUnaccessData
SysFreeString
VariantInit
VariantChangeType
OleLoadPicture
VariantClear
SysAllocStringLen
d3d9
Direct3DCreate9
wininet
InternetReadFile
InternetOpenA
InternetSetOptionA
InternetConnectA
InternetCloseHandle
HttpSendRequestA
HttpOpenRequestA
HttpQueryInfoA
Sections
.text Size: 412KB - Virtual size: 410KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 124KB - Virtual size: 121KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 516KB - Virtual size: 513KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ