Static task
static1
Behavioral task
behavioral1
Sample
1679a71143a32e8a4002fea66032ac83fdf21463dcfa9c42ad2ab83cf31937bf.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
1679a71143a32e8a4002fea66032ac83fdf21463dcfa9c42ad2ab83cf31937bf.exe
Resource
win10v2004-20221111-en
General
-
Target
1679a71143a32e8a4002fea66032ac83fdf21463dcfa9c42ad2ab83cf31937bf
-
Size
138KB
-
MD5
d7b46c388fe5666a2ee99f5d62b54a1d
-
SHA1
ee588b477dc19b04d381a78e011c62cf00b096d2
-
SHA256
1679a71143a32e8a4002fea66032ac83fdf21463dcfa9c42ad2ab83cf31937bf
-
SHA512
10df57d37a80de9016949befc1a6977e9f4e36214b1508faf1e3011201dca6bd046cbc6218f1e83a248f3c04ab750863f609a9d268d34d89fd09b459b4c5f7d7
-
SSDEEP
3072:C4m5miWR6kw+c/j7vp/C6+2cgzo4FREHgEEBx1yTSQwC:CRsNg/j7SZioqREHgEwQX
Malware Config
Signatures
Files
-
1679a71143a32e8a4002fea66032ac83fdf21463dcfa9c42ad2ab83cf31937bf.exe windows x86
e9488ecdd99b52e550f789d15a26d6b0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ReleaseMutex
ExpandEnvironmentStringsW
CreateRemoteThread
OpenProcess
Process32FirstW
Process32NextW
CreateToolhelp32Snapshot
MoveFileExW
GetUserDefaultUILanguage
GetNativeSystemInfo
GetLocalTime
CreateThread
GetEnvironmentVariableW
FileTimeToDosDateTime
GetTempFileNameW
HeapReAlloc
FindFirstFileW
SetEndOfFile
CreateProcessW
HeapAlloc
SystemTimeToFileTime
SetFilePointerEx
HeapFree
GetProcessHeap
IsBadReadPtr
SetFileTime
VirtualQueryEx
GetCurrentThread
WideCharToMultiByte
SetFileAttributesW
HeapDestroy
HeapCreate
Thread32Next
ReadFile
GetTimeZoneInformation
MultiByteToWideChar
GetTempPathW
GetFileSizeEx
OpenMutexW
VirtualProtectEx
VirtualAllocEx
FindClose
LoadLibraryA
RemoveDirectoryW
FindNextFileW
VirtualProtect
GetFileTime
FileTimeToLocalFileTime
GetVolumeNameForVolumeMountPointW
DeleteFileW
GetFileInformationByHandle
UnmapViewOfFile
MapViewOfFile
WTSGetActiveConsoleSessionId
LoadLibraryW
CreateDirectoryW
FreeLibrary
GlobalUnlock
GetTickCount
GlobalLock
TerminateProcess
CreateMutexW
EnterCriticalSection
TlsSetValue
TlsGetValue
GetProcessId
VirtualAlloc
SetThreadContext
GetThreadContext
lstrcmpiA
ResetEvent
SetLastError
GetLastError
TlsFree
TlsAlloc
GetCurrentThreadId
CreateFileMappingW
ReadProcessMemory
SetThreadPriority
GetPrivateProfileIntW
FlushFileBuffers
CreateFileW
GetFileAttributesW
LeaveCriticalSection
InitializeCriticalSection
WriteFile
GetPrivateProfileStringW
GetSystemTime
WriteProcessMemory
LocalFree
GetCurrentProcessId
CloseHandle
DuplicateHandle
OpenEventW
GetFileAttributesExW
lstrcmpiW
WaitForMultipleObjects
CreateEventW
GetProcAddress
GetModuleFileNameW
GetVersionExW
Sleep
VirtualFreeEx
VirtualFree
GetModuleHandleW
SetEvent
GetComputerNameW
WaitForSingleObject
SetErrorMode
GetCommandLineW
Thread32First
ExitProcess
user32
OpenWindowStationW
RegisterWindowMessageW
GetThreadDesktop
GetMenuItemID
SetKeyboardState
GetSubMenu
OpenDesktopW
MenuItemFromPoint
GetMenu
GetMenuItemRect
TrackPopupMenuEx
SystemParametersInfoW
GetClassNameW
GetMenuState
GetMenuItemCount
PostThreadMessageW
HiliteMenuItem
SetThreadDesktop
SendMessageW
EndMenu
GetWindowThreadProcessId
GetShellWindow
CharLowerW
EndPaint
GetMessageA
CharToOemW
GetMessageW
RegisterClassExA
GetWindowDC
SetCapture
DefDlgProcW
MapVirtualKeyW
DrawIcon
MapWindowPoints
GetIconInfo
GetTopWindow
LoadImageW
MsgWaitForMultipleObjects
WindowFromPoint
CharLowerA
CharUpperW
SetWindowLongW
GetWindow
DispatchMessageW
GetSystemMetrics
GetWindowRect
GetParent
GetClassLongW
GetWindowLongW
GetAncestor
SetWindowPos
SendMessageTimeoutW
GetKeyboardState
ToUnicode
GetProcessWindowStation
FillRect
IsWindow
GetUserObjectInformationW
PostMessageW
CloseDesktop
DrawEdge
IntersectRect
ExitWindowsEx
RegisterClassA
EqualRect
PrintWindow
IsRectEmpty
CharLowerBuffA
DefFrameProcA
OpenInputDesktop
BeginPaint
GetUpdateRect
GetDC
GetCapture
TranslateMessage
RegisterClassExW
SetCursorPos
GetClipboardData
PeekMessageW
GetDCEx
PeekMessageA
ReleaseDC
DefWindowProcA
GetCursorPos
DefMDIChildProcW
SwitchDesktop
CreateDesktopW
SetProcessWindowStation
CloseWindowStation
CreateWindowStationW
GetUpdateRgn
DefFrameProcW
GetMessagePos
DefWindowProcW
CallWindowProcW
CallWindowProcA
RegisterClassW
ReleaseCapture
DefMDIChildProcA
DefDlgProcA
GetWindowInfo
advapi32
IsWellKnownSid
GetLengthSid
EqualSid
InitiateSystemShutdownExW
ConvertSidToStringSidW
RegOpenKeyExW
RegEnumKeyExW
RegCloseKey
CryptGetHashParam
OpenProcessToken
GetSidSubAuthority
CryptAcquireContextW
OpenThreadToken
GetSidSubAuthorityCount
GetTokenInformation
RegCreateKeyExW
CryptReleaseContext
RegQueryValueExW
CreateProcessAsUserW
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
SetNamedSecurityInfoW
LookupPrivilegeValueW
CryptCreateHash
ConvertStringSecurityDescriptorToSecurityDescriptorW
GetSecurityDescriptorSacl
SetSecurityDescriptorSacl
CryptDestroyHash
AdjustTokenPrivileges
RegSetValueExW
CryptHashData
shlwapi
StrCmpNIW
PathRemoveBackslashW
wvnsprintfA
StrCmpNIA
PathMatchSpecW
PathUnquoteSpacesW
PathAddExtensionW
PathCombineW
SHDeleteKeyW
PathSkipRootW
SHDeleteValueW
PathAddBackslashW
PathFindFileNameW
PathIsDirectoryW
wvnsprintfW
UrlUnescapeA
StrStrIW
StrStrIA
PathIsURLW
PathQuoteSpacesW
PathRemoveFileSpecW
PathRenameExtensionW
shell32
CommandLineToArgvW
SHGetFolderPathW
ShellExecuteW
secur32
GetUserNameExW
ole32
StringFromGUID2
CLSIDFromString
CoUninitialize
CoCreateInstance
CoInitializeEx
gdi32
SetViewportOrgEx
GdiFlush
CreateDIBSection
SetRectRgn
SaveDC
RestoreDC
DeleteDC
GetDeviceCaps
DeleteObject
SelectObject
GetDIBits
CreateCompatibleBitmap
CreateCompatibleDC
ws2_32
WSAEventSelect
WSAGetLastError
listen
WSASetLastError
freeaddrinfo
socket
bind
recv
getpeername
recvfrom
sendto
WSAIoctl
connect
WSAAddressToStringW
WSAStartup
getaddrinfo
select
shutdown
setsockopt
getsockname
accept
WSASend
closesocket
send
crypt32
PFXExportCertStoreEx
CertDuplicateCertificateContext
CertEnumCertificatesInStore
CertCloseStore
CertOpenSystemStoreW
CertDeleteCertificateFromStore
PFXImportCertStore
CryptUnprotectData
wininet
InternetQueryOptionA
InternetSetOptionA
InternetQueryOptionW
InternetOpenA
HttpOpenRequestA
InternetCrackUrlA
InternetConnectA
HttpAddRequestHeadersA
HttpAddRequestHeadersW
InternetSetStatusCallbackW
GetUrlCacheEntryInfoW
InternetCloseHandle
HttpSendRequestA
HttpSendRequestW
InternetReadFile
InternetReadFileExA
InternetQueryDataAvailable
HttpSendRequestExW
HttpQueryInfoA
HttpSendRequestExA
oleaut32
VariantInit
SysAllocString
VariantClear
SysFreeString
netapi32
NetApiBufferFree
NetUserEnum
NetUserGetInfo
Sections
.text Size: 130KB - Virtual size: 129KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ