Static task
static1
Behavioral task
behavioral1
Sample
0c61d1cb5d793cf521e6cf40a7ffcd16f5e20db3f281b244715f8818ee4fdc11.exe
Resource
win7-20220812-en
General
-
Target
0c61d1cb5d793cf521e6cf40a7ffcd16f5e20db3f281b244715f8818ee4fdc11
-
Size
1.2MB
-
MD5
384c9df4d02ad5acc9afd068653b9130
-
SHA1
33338d0a64e659c4f96f214d0804a605dcf2b39d
-
SHA256
0c61d1cb5d793cf521e6cf40a7ffcd16f5e20db3f281b244715f8818ee4fdc11
-
SHA512
c95fb865e24b49907b77e7c52fa1aa62f9fe368ac09da0277e90e8a38017f44902f06346868a4dfdbaf359d1f5ccb86e0c94fecf4b3df1a2b7b66af1c68f28f1
-
SSDEEP
24576:tRlffuhoEl3PK59Pg762YNhoFRI8WxZJds+u5iTPC+at4:tb3u5fm9Y76BoGlTP2
Malware Config
Signatures
Files
-
0c61d1cb5d793cf521e6cf40a7ffcd16f5e20db3f281b244715f8818ee4fdc11.exe windows x86
5eda07ceef98047c2312e128587ac36e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
WaitForSingleObject
GetTickCount
GetCommandLineA
MulDiv
GetDiskFreeSpaceA
GetProcAddress
GetModuleHandleA
GetVolumeInformationA
SetCurrentDirectoryA
SetStdHandle
IsBadCodePtr
IsBadReadPtr
CompareStringW
SetUnhandledExceptionFilter
GetStringTypeW
GetStringTypeA
IsBadWritePtr
LCMapStringW
LCMapStringA
SetEnvironmentVariableA
HeapCreate
HeapDestroy
GetEnvironmentVariableA
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
HeapSize
TerminateProcess
GetSystemTime
GetTimeZoneInformation
GetOEMCP
GetProcessVersion
SetErrorMode
GlobalFlags
GetCurrentThread
GetFileTime
LocalReAlloc
lstrcmpA
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
lstrcmpiA
UnlockFile
LockFile
FlushFileBuffers
DuplicateHandle
SetLastError
FileTimeToSystemTime
GetFileAttributesA
FindClose
FindFirstFileA
GlobalUnlock
GlobalLock
GlobalAlloc
Sleep
ResetEvent
CreateEventA
CreateThread
GetPrivateProfileStringA
WritePrivateProfileStringA
GetVersionExA
lstrlenA
LoadLibraryA
FreeLibrary
GetFullPathNameA
HeapAlloc
GetProcessHeap
HeapReAlloc
HeapFree
GlobalReAlloc
FindNextFileA
lstrcpyA
WinExec
lstrcatA
InitializeCriticalSection
DeleteCriticalSection
GlobalFree
GlobalSize
ExitProcess
GetCurrentThreadId
GetModuleFileNameA
CompareStringA
EnumCalendarInfoA
FileTimeToDosDateTime
FileTimeToLocalFileTime
FormatMessageA
GetACP
GetCPInfo
GetDateFormatA
GetLocalTime
GetStringTypeExA
GlobalHandle
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
GetFileType
GetFileSize
GetStdHandle
RaiseException
RtlUnwind
SetEndOfFile
SetFilePointer
UnhandledExceptionFilter
GetLocaleInfoA
GetStartupInfoA
GetThreadLocale
LoadLibraryExA
lstrcpynA
VirtualQuery
InterlockedIncrement
InterlockedDecrement
GetVersion
LocalAlloc
LocalFree
VirtualAlloc
VirtualFree
WideCharToMultiByte
MultiByteToWideChar
GetCurrentProcess
CreateSemaphoreA
ResumeThread
ReleaseSemaphore
EnterCriticalSection
LeaveCriticalSection
LockResource
LoadResource
FindResourceA
SetEvent
CreateFileA
WaitForMultipleObjects
GetLastError
ReadFile
WriteFile
GetProfileStringA
user32
UnregisterClassA
wsprintfA
CloseClipboard
GetClipboardData
OpenClipboard
SetClipboardData
EmptyClipboard
GetSystemMetrics
GetCursorPos
MessageBoxA
SetWindowPos
SendMessageA
DestroyCursor
SetParent
IsWindow
PostMessageA
GetTopWindow
CharToOemA
CharNextA
LoadStringA
GetKeyboardType
GetForegroundWindow
SystemParametersInfoA
TranslateMessage
LoadIconA
DrawFrameControl
DrawEdge
DrawFocusRect
WindowFromPoint
GetMessageA
DispatchMessageA
SetRectEmpty
RegisterClipboardFormatA
CreateIconFromResourceEx
CreateIconFromResource
DrawIconEx
CreatePopupMenu
AppendMenuA
ModifyMenuA
CreateMenu
CreateAcceleratorTableA
GetDlgCtrlID
GetSubMenu
EnableMenuItem
ClientToScreen
EnumDisplaySettingsA
LoadImageA
ShowWindow
IsWindowEnabled
TranslateAcceleratorA
GetKeyState
CopyAcceleratorTableA
PostQuitMessage
IsZoomed
GetSystemMenu
DeleteMenu
GetClassInfoA
DefWindowProcA
GetMenu
SetMenu
PeekMessageA
IsIconic
SetFocus
GetActiveWindow
GetWindow
DestroyAcceleratorTable
SetWindowRgn
GetMessagePos
ScreenToClient
ChildWindowFromPointEx
CopyRect
LoadBitmapA
WinHelpA
KillTimer
SetTimer
ReleaseCapture
GetCapture
SetCapture
GetScrollRange
SetScrollRange
SetScrollPos
InflateRect
SetRect
IntersectRect
DestroyIcon
PtInRect
OffsetRect
IsWindowVisible
EnableWindow
RedrawWindow
GetWindowLongA
SetWindowLongA
GetSysColor
SetActiveWindow
SetCursorPos
LoadCursorA
SetCursor
GetDC
FillRect
GetWindowTextA
GetWindowTextLengthA
CharUpperA
GetWindowDC
BeginPaint
EndPaint
TabbedTextOutA
DrawTextA
GrayStringA
GetDlgItem
DestroyWindow
CreateDialogIndirectParamA
EndDialog
GetNextDlgTabItem
GetWindowPlacement
RegisterWindowMessageA
GetLastActivePopup
GetMessageTime
RemovePropA
CallWindowProcA
GetPropA
UnhookWindowsHookEx
SetPropA
GetClassLongA
CallNextHookEx
SetWindowsHookExA
CreateWindowExA
GetMenuItemID
GetMenuItemCount
RegisterClassA
GetScrollPos
AdjustWindowRectEx
MapWindowPoints
SendDlgItemMessageA
ScrollWindowEx
IsDialogMessageA
SetWindowTextA
MoveWindow
CheckMenuItem
SetMenuItemBitmaps
GetMenuState
GetMenuCheckMarkDimensions
GetClassNameA
GetDesktopWindow
GetSysColorBrush
IsRectEmpty
ReleaseDC
IsChild
DestroyMenu
SetForegroundWindow
GetWindowRect
EqualRect
UpdateWindow
ValidateRect
InvalidateRect
GetClientRect
GetFocus
GetParent
gdi32
ExtSelectClipRgn
GetViewportExtEx
SetBkMode
RestoreDC
LineTo
MoveToEx
SaveDC
RectVisible
TextOutA
ExtTextOutA
Escape
GetTextMetricsA
SetPolyFillMode
SetROP2
SetTextColor
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowOrgEx
SetWindowExtEx
ScaleWindowExtEx
GetClipBox
PtVisible
GetTextColor
SetBkColor
CreateRectRgnIndirect
SetStretchBltMode
GetClipRgn
CreatePolygonRgn
SelectClipRgn
DeleteObject
CreateDIBitmap
GetSystemPaletteEntries
CreatePalette
StretchBlt
SelectPalette
RealizePalette
GetDIBits
GetWindowExtEx
GetViewportOrgEx
GetWindowOrgEx
BeginPath
EndPath
PathToRegion
CreateEllipticRgn
CreateRoundRectRgn
ExcludeClipRect
GetBkMode
GetBkColor
GetROP2
GetStretchBltMode
GetPolyFillMode
CreateCompatibleBitmap
CreateDCA
CreateBitmap
SelectObject
GetObjectA
CreatePen
PatBlt
FillRgn
CreateRectRgn
CombineRgn
CreateSolidBrush
GetStockObject
CreateFontIndirectA
EndPage
EndDoc
DeleteDC
StartDocA
StartPage
BitBlt
CreateCompatibleDC
Ellipse
Rectangle
LPtoDP
DPtoLP
GetCurrentObject
RoundRect
GetTextExtentPoint32A
GetDeviceCaps
winmm
waveOutWrite
waveOutUnprepareHeader
waveOutPrepareHeader
waveOutPause
waveOutReset
waveOutClose
waveOutGetNumDevs
waveOutOpen
midiOutUnprepareHeader
midiStreamOpen
midiStreamProperty
midiOutPrepareHeader
midiStreamOut
midiStreamStop
midiOutReset
midiStreamClose
midiStreamRestart
winspool.drv
OpenPrinterA
ClosePrinter
DocumentPropertiesA
advapi32
RegCreateKeyExA
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
RegSetValueExA
RegQueryValueA
shell32
SHBrowseForFolderA
SHGetPathFromIDListA
SHGetMalloc
Shell_NotifyIconA
ShellExecuteA
ole32
CLSIDFromString
OleUninitialize
OleInitialize
oleaut32
SysReAllocStringLen
LoadTypeLi
RegisterTypeLi
UnRegisterTypeLi
SafeArrayCreate
SysFreeString
SysAllocStringLen
SafeArrayPtrOfIndex
VariantCopy
VariantClear
VariantChangeType
SafeArrayGetUBound
SafeArrayGetLBound
VariantInit
comctl32
ImageList_GetIcon
ord17
ImageList_Destroy
ImageList_Read
ImageList_Duplicate
ws2_32
closesocket
WSAAsyncSelect
WSACleanup
recvfrom
ioctlsocket
recv
getpeername
accept
inet_ntoa
comdlg32
ChooseColorA
GetFileTitleA
GetSaveFileNameA
GetOpenFileNameA
ChooseFontA
Sections
.text Size: 476KB - Virtual size: 473KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
CODE Size: 332KB - Virtual size: 330KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 84KB - Virtual size: 81KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 68KB - Virtual size: 214KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
DATA Size: 68KB - Virtual size: 67KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: 28KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 44KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rmnet Size: 116KB - Virtual size: 116KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE