Static task
static1
Behavioral task
behavioral1
Sample
69725e5e3f287f6117397ecff57087b40cfa079958c9fd7a6fbc5524714a2eca.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
69725e5e3f287f6117397ecff57087b40cfa079958c9fd7a6fbc5524714a2eca.exe
Resource
win10v2004-20221111-en
General
-
Target
69725e5e3f287f6117397ecff57087b40cfa079958c9fd7a6fbc5524714a2eca
-
Size
469KB
-
MD5
093ff0c1e6183af2d40a1f84ae4c61d0
-
SHA1
d54bf7646148564c9d422770104277b426b2380f
-
SHA256
69725e5e3f287f6117397ecff57087b40cfa079958c9fd7a6fbc5524714a2eca
-
SHA512
9814e103ebd0290c594e3233c512cd9564e839df574ab41f7096f04b16cad6ea553fb81416bc64ee9c8171ffa7cc3434c961da5f2c0dea256948e5420b67279e
-
SSDEEP
12288:AZWNWQkBAfTpJ0gdpQumJohj9NLMTdRSjivZ4Ts33guC4kIeSsPdP:AZWN5kgpAAHNoSGB4TA3gYxeSod
Malware Config
Signatures
Files
-
69725e5e3f287f6117397ecff57087b40cfa079958c9fd7a6fbc5524714a2eca.exe windows x86
7df99a804bedf845c6d82de061545846
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindResourceExW
LeaveCriticalSection
EnterCriticalSection
FreeLibrary
GetProcAddress
LoadLibraryA
Sleep
GetCurrentProcessId
GetCurrentThreadId
SetUnhandledExceptionFilter
CreateProcessA
RaiseException
FlushInstructionCache
GetVersion
SetLastError
InitializeCriticalSection
FindResourceW
GlobalAlloc
InterlockedIncrement
GetFileAttributesA
FlushFileBuffers
FindResourceA
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
lstrlenW
lstrcmpiA
IsDBCSLeadByte
LoadLibraryExA
InterlockedPopEntrySList
VirtualAlloc
VirtualFree
InterlockedPushEntrySList
HeapSize
HeapReAlloc
HeapDestroy
GetSystemTimeAsFileTime
GetTickCount
QueryPerformanceCounter
IsProcessorFeaturePresent
IsDebuggerPresent
UnhandledExceptionFilter
TerminateProcess
GetStartupInfoW
HeapSetInformation
InterlockedCompareExchange
DecodePointer
EncodePointer
LoadResource
LockResource
SizeofResource
InterlockedExchange
LocalAlloc
LocalFree
InterlockedDecrement
GetEnvironmentVariableA
GetModuleHandleA
GetModuleFileNameA
ResumeThread
CreateDirectoryA
CopyFileA
DeleteFileA
FindFirstFileA
FindNextFileA
FindClose
GetCurrentDirectoryA
GetTempPathA
GetTempFileNameA
GetShortPathNameA
UnmapViewOfFile
GetLocalTime
SystemTimeToFileTime
GetCurrentProcess
DuplicateHandle
CreateFileMappingA
MapViewOfFile
GetFileType
GetFileInformationByHandle
SetFilePointer
FileTimeToDosDateTime
FileTimeToSystemTime
GetLastError
HeapAlloc
WriteFile
GetFileSize
WaitForSingleObject
GetProcessHeap
HeapFree
MultiByteToWideChar
WideCharToMultiByte
lstrcpyA
CreateFileA
ReadFile
CloseHandle
lstrlenA
lstrcatA
GlobalLock
lstrcpynA
user32
IsWindow
UnregisterClassA
wsprintfA
SetWindowPos
GetActiveWindow
CharNextA
PeekMessageA
GetMessageA
TranslateMessage
DispatchMessageA
LoadImageA
CopyImage
LoadStringA
ReleaseCapture
EndPaint
BeginPaint
SetCapture
GetKeyState
SetWindowRgn
IsWindowEnabled
ClientToScreen
MoveWindow
OffsetRect
DrawIconEx
DrawFrameControl
GetDlgCtrlID
IsWindowVisible
EqualRect
ShowWindow
GetDlgItem
CopyRect
DrawTextA
SetCursor
InflateRect
SetRect
PtInRect
CallWindowProcA
CreateWindowExA
RegisterClassExA
DefWindowProcA
DestroyWindow
PostQuitMessage
LoadIconA
LoadCursorA
GetClassInfoExA
GetParent
MonitorFromWindow
GetMonitorInfoA
MapWindowPoints
GetWindowRect
KillTimer
SetTimer
InvalidateRect
GetWindowTextA
SendMessageA
GetWindowLongA
SetWindowLongA
GetClientRect
GetWindow
GetDesktopWindow
GetDC
ReleaseDC
SetFocus
gdi32
CreateBitmap
CreateCompatibleDC
DeleteDC
SelectObject
GetObjectA
DeleteObject
CreateDIBSection
BitBlt
CreateCompatibleBitmap
CreateRectRgnIndirect
Rectangle
CreateFontIndirectA
GetStockObject
SetBkColor
CreateSolidBrush
SetBkMode
SetTextColor
ExtTextOutA
RectInRegion
SelectClipRgn
RoundRect
CreatePen
CreateRectRgn
GetClipRgn
MoveToEx
LineTo
SaveDC
RestoreDC
TextOutA
GetTextExtentPoint32A
GetPixel
SetRectRgn
OffsetRgn
CombineRgn
StretchBlt
advapi32
RegOpenKeyExA
RegCloseKey
RegQueryValueExA
RegOpenKeyA
RegCreateKeyExA
RegDeleteKeyA
RegDeleteValueA
RegSetValueExA
RegQueryInfoKeyW
RegQueryInfoKeyA
RegEnumKeyExA
shell32
ShellExecuteA
SHBrowseForFolderA
SHGetPathFromIDListA
SHGetSpecialFolderPathA
ole32
CoTaskMemAlloc
CreateStreamOnHGlobal
CoInitializeEx
CoInitializeSecurity
CoUninitialize
CoTaskMemRealloc
CoTaskMemFree
CoCreateInstance
oleaut32
VariantClear
SysAllocString
SysFreeString
VariantInit
VariantCopy
VariantChangeType
SafeArrayGetElement
VarUI4FromStr
OleLoadPicture
SafeArrayDestroy
SafeArrayGetLBound
SafeArrayGetUBound
shlwapi
SHGetValueA
PathRemoveFileSpecA
StrToIntA
PathAddBackslashA
PathFindFileNameA
PathAppendA
PathFileExistsA
msvcp100
?_Xlength_error@std@@YAXPBD@Z
??1_Container_base12@std@@QAE@XZ
?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QAEXH_N@Z
??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UAE@XZ
?_Lock@?$basic_streambuf@DU?$char_traits@D@std@@@std@@UAEXXZ
?_Unlock@?$basic_streambuf@DU?$char_traits@D@std@@@std@@UAEXXZ
?showmanyc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MAE_JXZ
?uflow@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MAEHXZ
?xsgetn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MAE_JPAD_J@Z
?xsputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MAE_JPBD_J@Z
?setbuf@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MAEPAV12@PAD_J@Z
?sync@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MAEHXZ
?imbue@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MAEXABVlocale@2@@Z
?_BADOFF@std@@3_JB
?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV12@XZ
?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEXXZ
?uncaught_exception@std@@YA_NXZ
?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAE_JPBD_J@Z
?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAEHD@Z
??1?$basic_ostream@DU?$char_traits@D@std@@@std@@UAE@XZ
??_7?$basic_ostream@DU?$char_traits@D@std@@@std@@6B@
?_Pninc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IAEPADXZ
??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IAE@XZ
?_Ios_base_dtor@ios_base@std@@CAXPAV12@@Z
??_7ios_base@std@@6B@
??_7?$basic_ios@DU?$char_traits@D@std@@@std@@6B@
??1?$basic_ios@DU?$char_traits@D@std@@@std@@UAE@XZ
??0?$basic_ostream@DU?$char_traits@D@std@@@std@@QAE@PAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV01@H@Z
?setw@std@@YA?AU?$_Smanip@_J@1@_J@Z
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV01@P6AAAVios_base@1@AAV21@@Z@Z
??0?$basic_ios@DU?$char_traits@D@std@@@std@@IAE@XZ
?_Xout_of_range@std@@YAXPBD@Z
msvcr100
sprintf_s
_purecall
_mbsnbcpy
_mbscmp
_mbsstr
_mbschr
_vscprintf
fwrite
_resetstkoflw
_recalloc
calloc
memmove_s
memcpy_s
free
malloc
atof
toupper
vsprintf_s
_vsnprintf_s
_beginthreadex
fgets
fopen
fseek
ftell
fread
fclose
fprintf
sscanf
memchr
strchr
_tzset
_stricmp
_mktime32
_snprintf
atoi
strncmp
strncpy
atol
??_V@YAXPAX@Z
strnlen
_mbsrchr
_mbsnbcpy_s
strpbrk
ferror
isspace
tolower
isalpha
_unlock
__dllonexit
_lock
_onexit
_except_handler4_common
?terminate@@YAXXZ
_amsg_exit
__getmainargs
_cexit
_exit
_XcptFilter
_ismbblead
exit
_acmdln
_initterm
_initterm_e
_configthreadlocale
__setusermatherr
_commode
_fmode
__set_app_type
_crt_debugger_hook
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_invoke_watson
_controlfp_s
isalnum
__CxxFrameHandler3
??0exception@std@@QAE@ABQBD@Z
?what@exception@std@@UBEPBDXZ
??1exception@std@@UAE@XZ
??3@YAXPAX@Z
memcpy
memmove
memset
??2@YAPAXI@Z
_CxxThrowException
??0exception@std@@QAE@ABV01@@Z
sprintf
wininet
HttpSendRequestExA
HttpEndRequestA
HttpOpenRequestA
HttpAddRequestHeadersA
HttpSendRequestA
InternetOpenA
InternetConnectA
InternetAttemptConnect
InternetWriteFile
InternetReadFile
InternetCloseHandle
InternetSetCookieA
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
gdiplus
GdipSetImageAttributesColorKeys
GdipCreateFromHDC
GdipDisposeImageAttributes
GdipDrawImageRectRectI
GdipCreateImageAttributes
GdipLoadImageFromStream
GdipCloneImage
GdiplusShutdown
GdiplusStartup
GdipDrawImageRectI
GdipGetImageHeight
GdipGetImageWidth
GdipDisposeImage
GdipDeleteGraphics
GdipAlloc
GdipFree
comctl32
_TrackMouseEvent
Sections
.text Size: 297KB - Virtual size: 296KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 63KB - Virtual size: 63KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 103KB - Virtual size: 102KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ