Static task
static1
Behavioral task
behavioral1
Sample
5cb23562e0ad3b7d70d9d7dd7622c2238c7dc86c774f069708ef676a11f5f124.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
5cb23562e0ad3b7d70d9d7dd7622c2238c7dc86c774f069708ef676a11f5f124.exe
Resource
win10v2004-20221111-en
General
-
Target
5cb23562e0ad3b7d70d9d7dd7622c2238c7dc86c774f069708ef676a11f5f124
-
Size
1.1MB
-
MD5
09a66032dc5c4aefe3b28e18e25fd420
-
SHA1
1e0e81f10de8d4d8fa3034fe1e79eed78f1b1b95
-
SHA256
5cb23562e0ad3b7d70d9d7dd7622c2238c7dc86c774f069708ef676a11f5f124
-
SHA512
55d2a5dda199019bd372582fe10a92cbebfddd4f01d38390acbcb769ccb151f21a4eb608079f26dcbfe98e6a00ea83c2d9404aa3c60fbce981705cb5ad2833f1
-
SSDEEP
24576:2SSVPZ/hLg0iaxjbpb06OBCQBf85iKsFp9T1Y:VSpZ/hLgmxjV06OBCAUoKsFTK
Malware Config
Signatures
Files
-
5cb23562e0ad3b7d70d9d7dd7622c2238c7dc86c774f069708ef676a11f5f124.exe windows x86
a381fc3e57392d9c68cd0ea90ae86b11
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
inputhook
LockInput
DisableCtrlAltDel
kernel32
DuplicateHandle
GetVolumeInformationA
GetFullPathNameA
GetFileSizeEx
GetModuleFileNameW
InterlockedDecrement
GlobalFlags
LocalAlloc
TlsGetValue
GlobalHandle
TlsAlloc
TlsSetValue
LocalReAlloc
TlsFree
InterlockedIncrement
GetCPInfo
GetOEMCP
GetModuleHandleW
SetErrorMode
RtlUnwind
UnhandledExceptionFilter
IsDebuggerPresent
HeapFree
HeapAlloc
GetSystemTimeAsFileTime
GetStartupInfoA
VirtualProtect
GetSystemInfo
HeapReAlloc
ExitProcess
HeapSize
GetACP
IsValidCodePage
LCMapStringA
LCMapStringW
HeapCreate
VirtualFree
GetStdHandle
GetConsoleCP
GetConsoleMode
SetHandleCount
GetFileType
GetStringTypeA
GetStringTypeW
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
DebugBreak
InitializeCriticalSectionAndSpinCount
SetEndOfFile
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetStdHandle
GetProcessHeap
CompareStringW
SetEnvironmentVariableA
FindResourceA
UnlockFile
LockFile
FlushFileBuffers
SizeofResource
LockResource
LoadResource
WideCharToMultiByte
TerminateProcess
GetCurrentProcess
GetLastError
CreateMutexA
CopyFileA
GetWindowsDirectoryA
GetCommandLineA
EnterCriticalSection
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
GetPrivateProfileStringA
GetModuleFileNameA
GetPrivateProfileIntA
SetFileAttributesA
GlobalUnlock
GlobalLock
GlobalAlloc
FreeResource
MulDiv
SetLastError
GetProcAddress
LoadLibraryA
GetModuleHandleA
FreeLibrary
GetVersion
GetTickCount
lstrcpynA
MultiByteToWideChar
GetEnvironmentVariableA
GetCurrentDirectoryA
GetFileAttributesA
CloseHandle
ResumeThread
GetThreadContext
SuspendThread
GetCurrentThread
ReadProcessMemory
GetVersionExA
OutputDebugStringA
GetCurrentThreadId
SetUnhandledExceptionFilter
FormatMessageA
VirtualQuery
IsBadWritePtr
DeleteFileA
CreateDirectoryA
SetFilePointer
WriteFile
GetThreadLocale
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
InterlockedExchange
lstrcmpA
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
CompareStringA
lstrcmpW
DeviceIoControl
EnumResourceNamesA
ReadFile
GlobalReAlloc
ExpandEnvironmentStringsA
VirtualAlloc
WriteProcessMemory
lstrcmpiA
FileTimeToLocalFileTime
GetLocalTime
GetCurrentProcessId
CreateFileA
FileTimeToSystemTime
FindNextFileW
GetFileAttributesExW
GetFileAttributesExA
SetFileAttributesW
GetFileAttributesW
DeleteFileW
MoveFileW
MoveFileA
CopyFileW
RemoveDirectoryW
CreateDirectoryW
SetFileTime
GetFileTime
GetFileSize
CreateFileW
lstrlenA
lstrlenW
GetFullPathNameW
lstrcpynW
GetVolumeInformationW
FindFirstFileW
lstrcpyW
SystemTimeToFileTime
LocalFileTimeToFileTime
OpenMutexA
GetSystemDirectoryA
GetDriveTypeA
GlobalFree
CreateThread
TerminateThread
Sleep
OpenThread
RaiseException
WaitForSingleObject
ResetEvent
ReleaseMutex
SetEvent
UnmapViewOfFile
OpenFileMappingA
OpenEventA
CreateFileMappingA
CreateEventA
MapViewOfFile
WritePrivateProfileStructA
WritePrivateProfileStringA
LocalFree
CreateProcessA
GetTimeZoneInformation
SetSystemTime
FindFirstFileA
FindNextFileA
FindClose
RemoveDirectoryA
OpenProcess
user32
GetSysColorBrush
DestroyMenu
WindowFromPoint
CharUpperA
SetWindowContextHelpId
MapDialogRect
PostQuitMessage
GetMenuStringA
GetWindowThreadProcessId
ValidateRect
EndPaint
BeginPaint
MoveWindow
SetWindowTextA
IsDialogMessageA
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
CheckMenuItem
LoadIconA
SendDlgItemMessageA
WinHelpA
IsChild
GetCapture
SetWindowsHookExA
CallNextHookEx
GetClassLongA
SetPropA
GetPropA
RemovePropA
SetFocus
GetWindowTextLengthA
GetWindowTextA
GetLastActivePopup
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
MapWindowPoints
TrackPopupMenu
SetMenu
GetScrollRange
GetScrollPos
MessageBoxA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
EqualRect
GetScrollInfo
SetScrollInfo
GetDlgCtrlID
DefWindowProcA
GetMenu
IntersectRect
GetWindowPlacement
GetActiveWindow
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
GetDlgItem
IsWindowEnabled
GetNextDlgTabItem
EndDialog
CharUpperW
FindWindowExA
UpdateLayeredWindow
GetForegroundWindow
GetTopWindow
ShowWindow
FindWindowA
SystemParametersInfoA
GetWindowRect
SendMessageA
GetWindow
PeekMessageA
GetMessageA
TranslateMessage
DispatchMessageA
wsprintfA
CallWindowProcA
DrawFocusRect
SetRectEmpty
ClientToScreen
SetWindowPos
GetSystemMenu
SetForegroundWindow
DrawIconEx
IsWindow
IsZoomed
SetWindowLongA
GetKeyState
FillRect
IsIconic
CharNextA
CopyAcceleratorTableA
IsRectEmpty
GetNextDlgGroupItem
MessageBeep
UnregisterClassA
DrawIcon
FrameRect
CreateWindowExA
GetSystemMetrics
RegisterClipboardFormatA
PostThreadMessageA
GetClientRect
GetDC
ReleaseDC
GetDesktopWindow
EnableWindow
GetTitleBarInfo
ReleaseCapture
PtInRect
OffsetRect
InvalidateRect
SetCapture
SetRect
TabbedTextOutA
DrawTextA
DrawTextExA
GrayStringA
SetWindowRgn
GetParent
UpdateWindow
SetCursor
LoadCursorA
GetSysColor
DestroyCursor
GetWindowLongA
PostMessageA
InvalidateRgn
SetTimer
KillTimer
GetFocus
RegisterWindowMessageA
CopyImage
CopyRect
LoadBitmapA
EnableMenuItem
GetMenuItemCount
GetMenuItemID
GetMenuState
GetMenuItemInfoA
EnumChildWindows
GetClassNameA
DestroyIcon
GetWindowDC
InflateRect
GetWindowRgn
ScreenToClient
GetCursorPos
TrackMouseEvent
IsWindowVisible
ModifyMenuA
GetSubMenu
gdi32
ExtCreateRegion
DeleteDC
GetDIBits
CreateICA
CreateBitmap
RealizePalette
StretchBlt
SetBitmapBits
GetBitmapBits
CreateEllipticRgn
CreatePatternBrush
GetCurrentObject
SelectClipRgn
PtInRegion
CreateRoundRectRgn
GetStockObject
GetClipBox
SetBkMode
ExtSelectClipRgn
SetWindowOrgEx
CreateDIBSection
SetTextColor
SetBkColor
SaveDC
RestoreDC
SetStretchBltMode
SetMapMode
ExcludeClipRect
LineTo
MoveToEx
CreateSolidBrush
SelectPalette
GetViewportExtEx
GetWindowExtEx
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
GetMapMode
GetBkColor
GetTextColor
GetRgnBox
Rectangle
CreatePen
EnumFontFamiliesExA
CreateRectRgnIndirect
CreateFontIndirectA
GetDeviceCaps
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
OffsetRgn
CombineRgn
CreateRectRgn
DeleteObject
CreateFontA
BitBlt
SelectObject
CreateCompatibleDC
CreateCompatibleBitmap
GetObjectA
GetTextExtentPoint32A
msimg32
GradientFill
TransparentBlt
comdlg32
GetFileTitleA
winspool.drv
OpenPrinterA
ClosePrinter
DocumentPropertiesA
advapi32
FreeSid
SetNamedSecurityInfoA
RegCreateKeyExA
RegQueryValueA
RegOpenKeyA
RegEnumKeyA
RegDeleteKeyA
GetUserNameA
RegDeleteValueA
RegCreateKeyA
RegQueryValueExA
RegOpenKeyExA
RegSetValueExA
RegCloseKey
AllocateAndInitializeSid
SetEntriesInAclA
shell32
SHCreateDirectoryExA
SHGetPathFromIDListA
SHBrowseForFolderA
SHGetMalloc
SHFileOperationW
SHAppBarMessage
ExtractIconExA
ShellExecuteA
comctl32
FlatSB_EnableScrollBar
InitializeFlatSB
ord17
shlwapi
PathIsUNCW
PathStripToRootW
PathFindFileNameW
PathFileExistsW
PathFindExtensionA
PathFindFileNameA
PathStripToRootA
PathIsUNCA
PathRemoveFileSpecW
PathFileExistsA
oledlg
ord8
ole32
CoUninitialize
OleInitialize
CreateILockBytesOnHGlobal
OleUninitialize
CoTaskMemFree
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoGetClassObject
CoInitializeEx
CoCreateInstance
CoTaskMemAlloc
CLSIDFromProgID
CLSIDFromString
CoRevokeClassObject
CoFreeUnusedLibraries
OleIsCurrentClipboard
OleFlushClipboard
CoRegisterMessageFilter
CreateStreamOnHGlobal
oleaut32
SysAllocStringLen
VariantClear
VariantChangeType
VariantInit
SysStringLen
SysAllocStringByteLen
OleLoadPicture
VariantCopy
SafeArrayDestroy
VariantTimeToSystemTime
SystemTimeToVariantTime
OleCreateFontIndirect
SysAllocString
SysFreeString
ws2_32
gethostbyname
htonl
gethostname
ntohl
inet_ntoa
inet_addr
psapi
EnumProcesses
GetProcessMemoryInfo
EnumProcessModules
GetModuleBaseNameA
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
gdiplus
GdiplusStartup
GdipDeleteFont
GdipCreateFont
GdipDeleteFontFamily
GdipCreateFontFamilyFromName
GdipDrawImagePointRectI
GdipDrawString
GdipReleaseDC
GdipSetStringFormatLineAlign
GdipSetStringFormatAlign
GdipDeleteStringFormat
GdipCreateStringFormat
GdipCloneBrush
GdipDeleteBrush
GdipCreateSolidFill
GdipLoadImageFromFileICM
GdipLoadImageFromFile
GdipGetImageHeight
GdipGetImageWidth
GdipCloneImage
GdipDisposeImage
GdipLoadImageFromStreamICM
GdipLoadImageFromStream
GdipAlloc
GdipFree
GdipDrawImageRectRectI
GdipDeleteGraphics
GdipCreateFromHDC
GdiplusShutdown
dbghelp
MiniDumpWriteDump
netapi32
Netbios
iphlpapi
SendARP
GetAdaptersInfo
rpcrt4
UuidCreate
Sections
.text Size: 778KB - Virtual size: 777KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 161KB - Virtual size: 161KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 15KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 162KB - Virtual size: 164KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE