Static task
static1
Behavioral task
behavioral1
Sample
1fc22a4f9237df931fd372aca11ae2c149eafc19eeb5744002c15d88a73d82c8.exe
Resource
win7-20221111-en
General
-
Target
1fc22a4f9237df931fd372aca11ae2c149eafc19eeb5744002c15d88a73d82c8
-
Size
1.6MB
-
MD5
2a5c4374a25ee337cd1e247779dcee30
-
SHA1
4416035c8c9bc19e7d7025f303fd7fdba2ce7df3
-
SHA256
1fc22a4f9237df931fd372aca11ae2c149eafc19eeb5744002c15d88a73d82c8
-
SHA512
a8f8af7cabf547feba598372c8b9020a17dc0c11c14d5afcab11408ee9e3ceb4871977ef257ef2ba67d44ecf521d932127d0a272566a7b984a02caa56a3f146e
-
SSDEEP
24576:Xs7qinDMX1SIEuG2aF07pFSFuqHo7Feo417JB3KzMG6VR/CxUlXuVRAW+82un:c7qioXFaFq6Fuqh17JRLVFxXuVnZ2un
Malware Config
Signatures
Files
-
1fc22a4f9237df931fd372aca11ae2c149eafc19eeb5744002c15d88a73d82c8.exe windows x86
1386767dc627ba93182f4f22f1cccf70
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
DuplicateHandle
SystemTimeToFileTime
VirtualQuery
GetSystemDefaultUILanguage
GetSystemDirectoryW
GetLongPathNameA
Process32Next
Process32First
GetFileAttributesExA
DeviceIoControl
GetDiskFreeSpaceA
GetShortPathNameA
TerminateThread
GetSystemTime
RemoveDirectoryA
DeleteFileW
SetFileAttributesW
TerminateProcess
SuspendThread
SetThreadPriority
OutputDebugStringW
GetPrivateProfileSectionNamesA
GetCommandLineA
CreateMutexA
ExitProcess
SetUnhandledExceptionFilter
MapViewOfFile
CreateFileMappingA
UnmapViewOfFile
GetLogicalDriveStringsA
ExpandEnvironmentStringsW
GetFileAttributesW
SearchPathW
GetLongPathNameW
SearchPathA
Module32NextW
Module32FirstW
SetConsoleCtrlHandler
FormatMessageA
GlobalFindAtomA
GetProcessTimes
LoadLibraryExW
GetModuleHandleW
GetModuleFileNameW
GlobalAddAtomA
FindClose
GetStartupInfoA
GetSystemTimeAsFileTime
InterlockedCompareExchange
SetFileTime
DosDateTimeToFileTime
GetFileInformationByHandle
FileTimeToDosDateTime
TlsGetValue
OpenThread
TlsSetValue
GetEnvironmentVariableA
GetProcessHeap
HeapAlloc
TlsAlloc
SetEnvironmentVariableA
TlsFree
HeapFree
TzSpecificLocalTimeToSystemTime
FileTimeToLocalFileTime
SetFilePointerEx
GetFileSizeEx
InitializeCriticalSectionAndSpinCount
UnlockFileEx
LockFileEx
ReleaseMutex
FormatMessageW
GetACP
GetFileType
RaiseException
InterlockedExchange
IsBadCodePtr
VirtualProtect
LoadLibraryW
MoveFileExA
MoveFileA
GetLocalTime
GetCurrentProcessId
CreateToolhelp32Snapshot
Module32First
Module32Next
IsBadReadPtr
CreatePipe
CreateProcessA
CreateDirectoryA
GetCommandLineW
GetTempPathA
GetTempFileNameA
GetSystemDirectoryA
QueryDosDeviceA
GetWindowsDirectoryA
GetFileAttributesA
SetFileAttributesA
CopyFileA
DeleteFileA
GetModuleHandleA
LocalAlloc
LocalFree
GetFileSize
SetLastError
GetCurrentThreadId
ExpandEnvironmentStringsA
FileTimeToSystemTime
lstrcmpiA
lstrcmpA
GetPrivateProfileIntA
GetPrivateProfileStringA
WritePrivateProfileStringA
ResumeThread
ResetEvent
GetVolumeInformationA
GetDriveTypeA
FindFirstFileA
FindNextFileA
GetCurrentDirectoryA
SetCurrentDirectoryA
GetLogicalDrives
CreateEventA
WideCharToMultiByte
CreateThread
WriteFile
SetFilePointer
ReadFile
CreateFileA
DeleteCriticalSection
HeapDestroy
InitializeCriticalSection
OpenProcess
WaitForSingleObject
CloseHandle
Sleep
GetLastError
GetModuleFileNameA
GetLocaleInfoA
GetTimeFormatA
GetDateFormatA
OutputDebugStringA
DebugBreak
InterlockedDecrement
InterlockedIncrement
GetTickCount
MulDiv
GetVersionExA
GetProcAddress
LoadLibraryA
FreeLibrary
IsBadWritePtr
lstrlenW
lstrcpynW
lstrcpynA
FreeResource
LockResource
SizeofResource
FindResourceA
LoadResource
MultiByteToWideChar
lstrlenA
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
GetCurrentProcess
FlushInstructionCache
LeaveCriticalSection
EnterCriticalSection
SetEvent
FlushFileBuffers
WaitForMultipleObjects
user32
GetDlgCtrlID
SetCapture
SetTimer
PtInRect
ClientToScreen
KillTimer
CharLowerA
SendMessageA
IsWindow
GetPropA
IsWindowEnabled
LoadIconA
ShowWindow
EnableMenuItem
SetWindowPos
PostMessageA
ReleaseCapture
EnableWindow
DrawTextExA
IsDialogMessageA
SetRect
CopyRect
OffsetRect
GetWindowTextA
GetSysColor
DrawTextA
GetDC
TranslateAcceleratorA
BeginPaint
EndPaint
CreateDialogParamA
DefWindowProcA
CreateWindowExA
SetWindowTextA
GetSystemMenu
GetClientRect
AdjustWindowRectEx
GetWindowLongA
GetMenu
MapWindowPoints
SystemParametersInfoA
GetWindowRect
GetWindow
GetParent
SetWindowLongA
DestroyWindow
UpdateWindow
InvalidateRect
GetCapture
CallWindowProcA
SetWindowsHookExA
MessageBoxA
CharUpperA
IsIconic
ExitWindowsEx
GetSysColorBrush
GetDesktopWindow
SetPropA
GetTopWindow
SetForegroundWindow
GetUpdateRect
LoadImageA
LoadMenuA
LoadAcceleratorsA
GetMessageA
TranslateMessage
DispatchMessageA
DialogBoxParamA
EndDialog
EqualRect
DrawFrameControl
GetAsyncKeyState
GetComboBoxInfo
FillRect
SetWindowRgn
IntersectRect
FrameRect
IsRectEmpty
GetFocus
SetScrollInfo
wvsprintfA
CharNextA
RegisterClipboardFormatA
SetScrollPos
GetKeyState
ScreenToClient
GetMessagePos
GetScrollInfo
GetScrollPos
DestroyCursor
GetClassInfoExA
wsprintfA
RegisterClassExA
RedrawWindow
IsWindowVisible
DrawEdge
DrawFocusRect
GetSystemMetrics
InflateRect
GetWindowTextLengthA
SetCursor
LoadCursorA
GetDlgItem
MonitorFromPoint
GetMonitorInfoA
GetMenuItemInfoA
RemoveMenu
GetMenuItemCount
AppendMenuA
TrackPopupMenuEx
DestroyMenu
CreatePopupMenu
PeekMessageA
MessageBeep
LoadStringW
ReleaseDC
LoadStringA
SetFocus
PostQuitMessage
gdi32
ExtTextOutA
LineTo
MoveToEx
CreateFontIndirectA
GetStockObject
CreateCompatibleBitmap
BitBlt
CreatePatternBrush
SetBkColor
CreateSolidBrush
PatBlt
CreatePen
DeleteDC
CreateCompatibleDC
SelectObject
SetBkMode
Rectangle
DeleteObject
SaveDC
RestoreDC
SetViewportOrgEx
GetTextExtentPoint32A
GetClipBox
RoundRect
CreateRectRgn
CreatePolygonRgn
CombineRgn
OffsetWindowOrgEx
SetWindowOrgEx
GetDeviceCaps
CreateFontA
SetTextColor
GetObjectA
StretchBlt
advapi32
RegisterServiceCtrlHandlerA
SetSecurityDescriptorDacl
OpenServiceA
ControlService
QueryServiceStatus
DeleteService
OpenSCManagerA
CreateServiceA
CloseServiceHandle
RegisterEventSourceA
ReportEventA
DeregisterEventSource
SetServiceStatus
StartServiceCtrlDispatcherA
RegEnumValueA
RegCreateKeyA
RegSaveKeyA
RegRestoreKeyA
RegDeleteKeyA
RegOpenKeyExA
RegEnumKeyExA
GetTokenInformation
AllocateAndInitializeSid
EqualSid
FreeSid
RegQueryInfoKeyA
RegEnumKeyA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegDeleteValueA
RegSetValueExA
RegOpenKeyA
RegQueryValueExA
LookupAccountSidA
LookupAccountNameA
DeleteAce
GetExplicitEntriesFromAclA
SetNamedSecurityInfoA
SetEntriesInAclA
BuildExplicitAccessWithNameA
GetNamedSecurityInfoA
GetUserNameA
RegCloseKey
InitializeSecurityDescriptor
shell32
SHFileOperationA
CommandLineToArgvW
SHGetSpecialFolderPathA
SHGetMalloc
ShellExecuteA
ShellExecuteExA
SHGetFileInfoA
SHGetSpecialFolderLocation
ole32
CoTaskMemAlloc
CoTaskMemFree
CoInitializeEx
CoCreateGuid
CoInitialize
CoUninitialize
CoCreateInstance
RevokeDragDrop
CreateStreamOnHGlobal
DoDragDrop
oleaut32
SysAllocStringLen
SysAllocString
OleLoadPicture
SysFreeString
ntdll
strrchr
strncpy
_splitpath
RtlInitUnicodeString
isalnum
strncmp
strchr
_chkstk
_ftol
_fltused
pow
memcmp
strcmp
isdigit
_vsnprintf
atol
abs
_strnicmp
memchr
_allmul
wcslen
_snprintf
atoi
_alloca_probe
_wtoi
_wcsicmp
_alldiv
sscanf
DbgPrint
_wcslwr
LdrLoadDll
NtTerminateProcess
wcsrchr
wcsstr
LdrGetProcedureAddress
RtlInitAnsiString
LdrGetDllHandle
_stricmp
RtlPrefixUnicodeString
RtlEqualUnicodeString
RtlCopyUnicodeString
NtQueryObject
RtlAppendUnicodeStringToString
RtlAppendUnicodeToString
wcscpy
RtlUnwind
memcpy
memset
memmove
strlen
comctl32
ImageList_ReplaceIcon
ImageList_Duplicate
ImageList_Remove
InitCommonControlsEx
ImageList_DrawEx
ImageList_LoadImageA
ImageList_Draw
_TrackMouseEvent
ImageList_Add
ImageList_Destroy
ImageList_Create
ImageList_SetImageCount
ImageList_GetIconSize
msimg32
GradientFill
AlphaBlend
gdiplus
GdiplusShutdown
GdipCreateHBITMAPFromBitmap
GdipCreateBitmapFromResource
GdiplusStartup
GdipCreateBitmapFromStream
GdipCloneImage
GdipDisposeImage
GdipCreateBitmapFromFileICM
GdipCreateBitmapFromFile
GdipAlloc
GdipFree
GdipCreateBitmapFromStreamICM
shlwapi
StrDupW
PathIsDirectoryW
SHGetValueW
SHDeleteValueA
StrChrW
PathIsDirectoryA
PathIsDirectoryEmptyA
SHSetValueA
SHDeleteKeyA
PathAppendW
PathFileExistsW
StrRChrA
AssocQueryStringA
StrCmpNIW
PathCombineA
wnsprintfA
StrCmpIW
StrRChrIA
StrStrA
StrRStrIA
PathIsRootA
StrStrIW
PathRenameExtensionA
StrCmpNIA
SHGetValueA
PathFindFileNameA
PathFileExistsA
PathFindExtensionA
PathAppendA
PathRemoveFileSpecA
StrStrIA
PathCombineW
StrRChrIW
wsock32
gethostbyname
WSAStartup
ioctlsocket
iphlpapi
GetIpForwardTable
GetIpAddrTable
DeleteIpForwardEntry
DeleteIPAddress
GetNetworkParams
GetAdaptersInfo
wininet
HttpSendRequestA
InternetOpenA
InternetOpenUrlA
HttpQueryInfoA
InternetReadFile
InternetGetConnectedState
InternetConnectA
InternetCloseHandle
HttpOpenRequestA
InternetSetOptionA
ws2_32
WSAEnumNameSpaceProvidersW
WSCGetProviderPath
WSCUnInstallNameSpace
WSCDeinstallProvider
WSCEnumProtocols
setupapi
SetupCopyOEMInfW
SetupGetStringFieldW
SetupFindFirstLineW
SetupCloseInfFile
SetupOpenInfFileW
SetupIterateCabinetA
psapi
GetDeviceDriverFileNameA
GetDeviceDriverBaseNameA
EnumDeviceDrivers
msvcrt
??1type_info@@UAE@XZ
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
_onexit
__dllonexit
?terminate@@YAXXZ
bsearch
vfprintf
getenv
_iob
isalpha
ldiv
islower
isprint
clock
srand
rand
time
isxdigit
toupper
isspace
gmtime
calloc
mktime
_strupr
_wcsupr
_itoa
localtime
wcschr
_snwprintf
wcsncpy
wcscmp
strerror
wcstok
_errno
sprintf
tolower
swscanf
qsort
_mbsnbcmp
??0exception@@QAE@ABQBD@Z
??1exception@@UAE@XZ
_CxxThrowException
??0exception@@QAE@ABV0@@Z
_access
_mbsupr
_wsplitpath
_vsnwprintf
_mbslwr
_mbsnbcpy
_mbsnbicmp
printf
strtok
_ismbcspace
fwrite
fflush
_mbsnicmp
malloc
_tzset
_controlfp
__CxxFrameHandler
_purecall
??2@YAPAXI@Z
realloc
free
iswupper
fputs
fgets
fprintf
_mbsstr
_ismbcalnum
fopen
fseek
ftell
fclose
fread
_beginthreadex
iswprint
_mbsicmp
_mbscmp
_ismbcdigit
div
_strdup
_mbsrchr
_mbschr
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
Sections
.text Size: 960KB - Virtual size: 957KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 84KB - Virtual size: 83KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 100KB - Virtual size: 121KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 500KB - Virtual size: 500KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE