Static task
static1
Behavioral task
behavioral1
Sample
16a85f11ba6146856fb6224eec371a9f20930cda6dbd718d1e5589b9effa6f58.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
16a85f11ba6146856fb6224eec371a9f20930cda6dbd718d1e5589b9effa6f58.exe
Resource
win10v2004-20220812-en
General
-
Target
16a85f11ba6146856fb6224eec371a9f20930cda6dbd718d1e5589b9effa6f58
-
Size
401KB
-
MD5
2b0e69d27ae119430a7c81ed0b6fbf60
-
SHA1
2417e0517cd6dc0fbb87bfea5e97f9c14cd85450
-
SHA256
16a85f11ba6146856fb6224eec371a9f20930cda6dbd718d1e5589b9effa6f58
-
SHA512
860f5678d4836d673d590d67a42bd31abe15cc6b4f6843e6e88351ee69da50420499993a2807bc2f992c4581f70704060306916dae50291d7db578b02753ebdd
-
SSDEEP
6144:miJt5iudS3M/bICI1j1U1e2Kbxenw/VO3bgoACvnw/w8YTvwKV2cNWM:jJi2bIJ2KbxlMkoAxw8OvwKV2coM
Malware Config
Signatures
Files
-
16a85f11ba6146856fb6224eec371a9f20930cda6dbd718d1e5589b9effa6f58.exe windows x86
98b754f8eff96537f6cbcd44878159b5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcpyW
WritePrivateProfileStringW
GetCurrentProcessId
GetShortPathNameW
GetPrivateProfileIntW
LocalFree
GetCommandLineW
GetTickCount
LockResource
SizeofResource
LoadResource
FindResourceW
WaitForSingleObject
CreateEventW
InterlockedIncrement
InterlockedDecrement
ResumeThread
ResetEvent
SetEvent
OutputDebugStringA
GetCurrentProcess
DeviceIoControl
FindClose
FindNextFileW
DeleteFileW
RemoveDirectoryW
FindFirstFileW
SetFilePointer
GetFileSize
CreateDirectoryW
LocalAlloc
lstrcatW
SetLastError
lstrcmpA
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
lstrcmpiA
OpenProcess
Module32FirstW
CreateToolhelp32Snapshot
GetVersionExW
GetPrivateProfileStringW
GetModuleHandleW
CreateFileW
ReadFile
VirtualAlloc
VirtualFree
GetStartupInfoA
GetModuleHandleA
WriteFile
CopyFileW
GetLastError
OutputDebugStringW
GetModuleFileNameW
GetLongPathNameW
lstrlenA
MultiByteToWideChar
lstrlenW
WideCharToMultiByte
LoadLibraryW
GetProcAddress
Sleep
CreateProcessW
CloseHandle
FreeLibrary
user32
SetWindowPos
CreateDialogParamW
LoadIconW
PeekMessageW
TranslateMessage
GetDlgItem
FindWindowW
PostMessageW
ShowWindow
EndPaint
DrawTextW
SetTimer
DestroyWindow
LoadStringW
GetDesktopWindow
MessageBoxW
GetWindowThreadProcessId
IsWindow
BeginPaint
DispatchMessageW
GetSystemMenu
PostThreadMessageW
CharNextW
DialogBoxParamW
SendMessageW
EndDialog
MsgWaitForMultipleObjectsEx
GetMessageW
EnableMenuItem
gdi32
GetObjectW
CreateFontIndirectW
SetBkMode
SelectObject
advapi32
RegOpenKeyExW
RegEnumKeyExW
RegQueryValueExW
RegCloseKey
shell32
ShellExecuteW
SHFileOperationW
CommandLineToArgvW
SHGetSpecialFolderPathW
wininet
InternetCloseHandle
InternetGetConnectedStateExW
InternetAttemptConnect
InternetConnectW
InternetSetOptionW
InternetQueryOptionW
InternetOpenW
HttpOpenRequestW
HttpAddRequestHeadersW
HttpSendRequestW
HttpEndRequestW
InternetWriteFile
HttpSendRequestExW
HttpQueryInfoW
InternetReadFile
InternetQueryDataAvailable
InternetCrackUrlW
comctl32
InitCommonControlsEx
msvcp60
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?erase@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAEAAV12@II@Z
?erase@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@II@Z
?resize@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAEXI@Z
?assign@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAEAAV12@IG@Z
??Hstd@@YA?AV?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@0@ABV10@PBG@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ID@Z
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?_Grow@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAE_NI_N@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?find@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QBEIPBGII@Z
??Hstd@@YA?AV?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@0@ABV10@0@Z
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
??1?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAE@XZ
?_C@?1??_Nullstr@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@CAPBGXZ@4GB
?append@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAEAAV12@PBGI@Z
?assign@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAEAAV12@ABV12@II@Z
?npos@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@2IB
?substr@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QBE?AV12@II@Z
?assign@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAEAAV12@PBGI@Z
?_Tidy@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAEX_N@Z
?erase@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAEPAGPAG@Z
?_Freeze@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAEXXZ
?nothrow@std@@3Unothrow_t@1@B
shlwapi
PathFileExistsW
SHGetValueW
PathIsRootW
SHGetValueA
msvcrt
wcsrchr
wcsstr
fclose
_wfopen
wcscmp
tolower
fread
_waccess
_purecall
_ultow
_vsnwprintf
free
malloc
_except_handler3
_strlwr
isspace
isprint
_vsnprintf
memcmp
_endthreadex
??2@YAPAXI@Z
_wtoi
iswdigit
swprintf
vswprintf
_beginthreadex
wcsncpy
_itow
_snwprintf
wcscat
strncpy
wcscpy
strlen
memcpy
__CxxFrameHandler
memset
_wcsicmp
wcslen
strncat
memmove
__dllonexit
_onexit
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_controlfp
_callnewh
psapi
EnumProcesses
version
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
wintrust
CryptCATAdminReleaseCatalogContext
WinVerifyTrust
CryptCATAdminAcquireContext
CryptCATAdminCalcHashFromFileHandle
CryptCATAdminReleaseContext
CryptCATAdminEnumCatalogFromHash
netapi32
Netbios
Sections
.text Size: 40KB - Virtual size: 39KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 12KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
__360sta Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 324KB - Virtual size: 324KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE