Static task
static1
Behavioral task
behavioral1
Sample
0fcb48ebb01ec124775b3f7092759b4dfe14bb390534b267b0f6af574bca68b2.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
0fcb48ebb01ec124775b3f7092759b4dfe14bb390534b267b0f6af574bca68b2.exe
Resource
win10v2004-20220812-en
General
-
Target
0fcb48ebb01ec124775b3f7092759b4dfe14bb390534b267b0f6af574bca68b2
-
Size
768KB
-
MD5
408370aeba9d27c0e5c7eab410ee26a0
-
SHA1
a1b3209d23c863c2123a29b85a726009ff9824d8
-
SHA256
0fcb48ebb01ec124775b3f7092759b4dfe14bb390534b267b0f6af574bca68b2
-
SHA512
b33a0909793eceab838aac3167092634c1c30464304dc70612b84faf9498a82527188ab5e24112a8ea12ac0afc9143564c7518c4baa0fd385c30d1b6bb143adc
-
SSDEEP
12288:6LuWQ/c74pytWAzrpH6HsSEb6StLfyjKifFKu075G9+:5MM+WqrpH6HsSEb7dqjdx0F
Malware Config
Signatures
Files
-
0fcb48ebb01ec124775b3f7092759b4dfe14bb390534b267b0f6af574bca68b2.exe windows x86
2cc8b4025869637f148cda1d9f3e85b0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
sqlwntm
ord1
ord18
version
VerQueryValueA
GetFileVersionInfoA
GetFileVersionInfoSizeA
kernel32
SetErrorMode
RtlUnwind
HeapFree
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
HeapAlloc
GetStartupInfoA
GetCommandLineA
ExitProcess
HeapReAlloc
TerminateProcess
HeapSize
LCMapStringA
LCMapStringW
HeapDestroy
HeapCreate
VirtualFree
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
GetTimeZoneInformation
IsBadReadPtr
IsBadCodePtr
SetStdHandle
SetEnvironmentVariableA
LocalFileTimeToFileTime
FileTimeToLocalFileTime
GetShortPathNameA
CreateFileA
GetVolumeInformationA
FindFirstFileA
FindClose
GetCurrentProcess
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
DeleteFileA
MoveFileA
GetCurrentDirectoryA
SystemTimeToFileTime
FileTimeToSystemTime
GetOEMCP
GetCPInfo
InterlockedIncrement
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
TlsGetValue
EnterCriticalSection
GlobalHandle
GlobalReAlloc
LeaveCriticalSection
LocalAlloc
GlobalFlags
DeleteCriticalSection
InitializeCriticalSection
RaiseException
GetDiskFreeSpaceA
GetFullPathNameA
GetTempFileNameA
GetFileTime
SetFileTime
GetFileAttributesA
GetCurrentThread
lstrcmpA
ConvertDefaultLocale
EnumResourceLanguagesA
GetPrivateProfileStringA
WritePrivateProfileStringA
GetPrivateProfileIntA
CloseHandle
InterlockedDecrement
SetLastError
MulDiv
GlobalAlloc
FormatMessageA
LocalFree
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
lstrcmpW
lstrcpynA
GlobalLock
GlobalUnlock
GlobalFree
FreeResource
GetModuleHandleA
lstrcpyA
lstrcatA
GetLastError
lstrlenA
lstrcmpiA
GetStringTypeExA
CompareStringA
CompareStringW
MultiByteToWideChar
GetVersion
GetModuleFileNameA
LoadLibraryA
GetProcAddress
FreeLibrary
GetTickCount
OpenFile
WideCharToMultiByte
LoadResource
LockResource
SizeofResource
FindResourceA
GlobalMemoryStatus
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
GetVersionExA
IsBadWritePtr
user32
DestroyIcon
DeleteMenu
GetMenuItemInfoA
InflateRect
GetSysColorBrush
LoadCursorA
SetCapture
SetWindowRgn
DrawIcon
FindWindowA
ShowOwnedPopups
PostQuitMessage
EndPaint
BeginPaint
GetWindowDC
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
FillRect
LoadMenuA
DestroyMenu
UnpackDDElParam
ReuseDDElParam
SetCursor
ReleaseCapture
LoadAcceleratorsA
InvalidateRect
InsertMenuItemA
CreatePopupMenu
SetRectEmpty
BringWindowToTop
SetMenu
TranslateAcceleratorA
GetMessageA
TranslateMessage
GetCursorPos
ValidateRect
GetMenuStringA
InsertMenuA
ReleaseDC
GetDC
SetMenuItemBitmaps
ModifyMenuA
GetMenuState
EnableMenuItem
CheckMenuItem
GetMenuCheckMarkDimensions
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
SetDlgItemTextA
RegisterWindowMessageA
GetCapture
CreateWindowExA
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassInfoExA
GetClassNameA
SetPropA
GetPropA
RemovePropA
SendDlgItemMessageA
GetFocus
SetFocus
IsChild
GetWindowTextLengthA
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
DispatchMessageA
BeginDeferWindowPos
EndDeferWindowPos
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
SendMessageA
UpdateWindow
SetTimer
KillTimer
GetDesktopWindow
EnableWindow
LoadIconA
wsprintfA
GetSystemMetrics
LoadBitmapA
IsIconic
WinHelpA
PostMessageA
GetMessagePos
PeekMessageA
MapWindowPoints
ScrollWindow
MessageBoxA
TrackPopupMenu
GetKeyState
SetScrollRange
GetScrollRange
SetScrollPos
GetScrollPos
SetForegroundWindow
ShowScrollBar
IsWindowVisible
GetMenu
GetSubMenu
GetMenuItemID
GetMenuItemCount
GetSysColor
AdjustWindowRectEx
ScreenToClient
EqualRect
DeferWindowPos
GetScrollInfo
SetScrollInfo
GetClassInfoA
RegisterClassA
UnregisterClassA
SetWindowPlacement
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
SetWindowLongA
SetWindowPos
OffsetRect
IntersectRect
SystemParametersInfoA
GetClientRect
GetParent
CharUpperA
EndDialog
GetNextDlgTabItem
IsWindowEnabled
GetDlgItem
GetWindowLongA
IsWindow
DestroyWindow
CreateDialogIndirectParamA
SetActiveWindow
GetActiveWindow
GetWindow
PtInRect
GetWindowPlacement
GetWindowRect
CopyRect
gdi32
CreateEllipticRgn
LPtoDP
Ellipse
GetTextExtentPoint32A
CreateFontIndirectA
CreateSolidBrush
GetStockObject
CreatePatternBrush
DeleteDC
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
ScaleWindowExtEx
SetBkColor
SetTextColor
GetClipBox
BitBlt
CreateCompatibleDC
GetObjectA
SelectObject
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetPixel
DeleteObject
SetMapMode
SetBkMode
RestoreDC
SaveDC
CreateCompatibleBitmap
GetDeviceCaps
CreateBitmap
SetWindowExtEx
comdlg32
GetOpenFileNameA
GetSaveFileNameA
GetFileTitleA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
GetFileSecurityA
RegSetValueA
RegOpenKeyA
RegCreateKeyExA
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
RegDeleteValueA
RegDeleteKeyA
RegEnumKeyA
RegQueryValueA
RegCreateKeyA
RegCloseKey
SetFileSecurityA
shell32
SHGetFileInfoA
DragQueryFileA
ExtractIconA
DragFinish
comctl32
ord17
ImageList_Destroy
ImageList_Draw
ImageList_GetImageInfo
shlwapi
PathFindFileNameA
PathStripToRootA
PathIsUNCA
PathFindExtensionA
PathRemoveExtensionA
oleaut32
VariantClear
VariantChangeType
VariantInit
SysAllocStringLen
Sections
.text Size: 176KB - Virtual size: 172KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 48KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 532KB - Virtual size: 532KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
wlgtajg Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE