Static task
static1
Behavioral task
behavioral1
Sample
4be75ab3133900a14763d39fdbd6e3b1555330492ae3accf17ca46dcaf5745e6.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
4be75ab3133900a14763d39fdbd6e3b1555330492ae3accf17ca46dcaf5745e6.exe
Resource
win10v2004-20220901-en
General
-
Target
4be75ab3133900a14763d39fdbd6e3b1555330492ae3accf17ca46dcaf5745e6
-
Size
927KB
-
MD5
138cc98d032de296cac267721969e580
-
SHA1
d8babacb1c4c5c2ca6ae515789fc89c85f537024
-
SHA256
4be75ab3133900a14763d39fdbd6e3b1555330492ae3accf17ca46dcaf5745e6
-
SHA512
ad09c0e8f2dd174a202939f2c0edda0cf45f5dd8f39098aeb8eef9a25d410f64c1e8867318ebab8927be0ad3ea78ab184eaae3dbdee9f1c8e113782fbe728b6c
-
SSDEEP
24576:DWbwS8k1lPw7UuamrpfCZXap0ABWAsT7BTuN3GS:m8k/Pw11wZqOQOhM
Malware Config
Signatures
Files
-
4be75ab3133900a14763d39fdbd6e3b1555330492ae3accf17ca46dcaf5745e6.exe windows x86
d4d812a56b78d38330998cf86ac74da8
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
psapi
EnumProcesses
EnumProcessModules
GetModuleFileNameExW
GetModuleBaseNameW
msi
ord70
userenv
CreateEnvironmentBlock
DestroyEnvironmentBlock
UnloadUserProfile
kernel32
WriteFile
SetFilePointer
FlushFileBuffers
LockFile
UnlockFile
SetEndOfFile
GetFileSize
DuplicateHandle
GetVolumeInformationW
GetFullPathNameW
GetModuleFileNameW
GetProcAddress
GetModuleHandleW
InterlockedDecrement
FreeLibrary
lstrlenA
ReadFile
GetCurrentProcessId
LeaveCriticalSection
TlsGetValue
EnterCriticalSection
GlobalReAlloc
GlobalHandle
InitializeCriticalSection
TlsAlloc
TlsSetValue
LocalReAlloc
DeleteCriticalSection
TlsFree
InterlockedIncrement
CompareStringW
GetFileSizeEx
GetFileTime
GlobalFlags
GetCurrentThreadId
GlobalAddAtomW
GetModuleHandleA
GetVersionExA
LoadLibraryA
GlobalDeleteAtom
GlobalFindAtomW
CompareStringA
GetSystemTimeAsFileTime
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetStartupInfoW
HeapReAlloc
RtlUnwind
RaiseException
SetStdHandle
GetFileType
HeapSize
ExitProcess
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
HeapCreate
VirtualFree
VirtualAlloc
GetStdHandle
GetModuleFileNameA
LCMapStringW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetStartupInfoA
QueryPerformanceCounter
GetTickCount
GetTimeZoneInformation
InitializeCriticalSectionAndSpinCount
GetConsoleCP
GetConsoleMode
LCMapStringA
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
GetCurrentDirectoryA
GetDriveTypeA
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CreateFileA
SetEnvironmentVariableA
LoadLibraryW
FileTimeToLocalFileTime
FileTimeToSystemTime
FindNextFileW
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
WideCharToMultiByte
DeleteFileW
MoveFileW
LocalAlloc
FindClose
lstrcmpW
FindFirstFileW
lstrcmpA
SetFileAttributesW
CreateFileW
CopyFileW
CreateThread
LocalFree
CloseHandle
CreateToolhelp32Snapshot
Process32NextW
LockResource
Process32FirstW
GetLocalTime
SetLastError
GetLongPathNameW
GetLastError
GetTempPathW
lstrlenW
MultiByteToWideChar
GetFileAttributesW
GetExitCodeProcess
GetVersionExW
FormatMessageW
SizeofResource
Sleep
OpenProcess
GetPrivateProfileStringW
GetProcessHeap
GetCurrentThread
WaitForSingleObject
HeapFree
GetCurrentProcess
HeapAlloc
CreateProcessW
LoadResource
FindResourceW
user32
EnableMenuItem
ModifyMenuW
LoadBitmapW
GetMenuCheckMarkDimensions
SetMenuItemBitmaps
PostQuitMessage
DestroyMenu
DestroyWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetMenu
SetForegroundWindow
GetClientRect
PostMessageW
CreateWindowExW
GetClassInfoExW
GetClassInfoW
RegisterClassW
AdjustWindowRectEx
DefWindowProcW
CallWindowProcW
CopyRect
GetMenu
CheckMenuItem
SystemParametersInfoA
IsIconic
GetWindowPlacement
GrayStringW
DrawTextExW
DrawTextW
TabbedTextOutW
SetWindowsHookExW
CallNextHookEx
DispatchMessageW
GetKeyState
PeekMessageW
ValidateRect
SetWindowPos
SetWindowLongW
IsWindow
ClientToScreen
GetWindow
GetDlgCtrlID
GetWindowRect
GetClassNameW
PtInRect
LoadCursorW
GetDC
ReleaseDC
GetSysColor
GetSysColorBrush
GetWindowThreadProcessId
SendMessageW
GetParent
MessageBoxW
GetForegroundWindow
SetWindowTextW
GetDlgItem
GetWindowLongW
GetLastActivePopup
IsWindowEnabled
EnableWindow
GetWindowTextW
RegisterWindowMessageW
LoadIconW
WinHelpW
FindWindowW
GetCapture
GetClassLongW
SetPropW
GetPropW
RemovePropW
GetTopWindow
GetSubMenu
GetMenuItemCount
UnhookWindowsHookEx
CharUpperW
GetSystemMetrics
GetMenuState
GetMenuItemID
GetFocus
advapi32
GetSidLengthRequired
CryptHashData
ConvertSidToStringSidW
CryptDestroyHash
CryptCreateHash
GetNamedSecurityInfoW
SetNamedSecurityInfoW
RegDeleteKeyW
CryptReleaseContext
CryptAcquireContextW
CryptGetHashParam
RegSetValueExW
RegCloseKey
CheckTokenMembership
GetLengthSid
InitializeSid
RegOpenKeyExW
IsValidSid
RegEnumValueW
RegDeleteValueW
DuplicateTokenEx
LookupAccountSidW
RegQueryInfoKeyW
DuplicateToken
CreateProcessAsUserW
RegQueryValueExW
RegCreateKeyExW
CopySid
GetTokenInformation
RegCreateKeyW
OpenThreadToken
GetSidSubAuthority
OpenProcessToken
shell32
SHChangeNotify
ShellExecuteW
SHGetFolderPathW
ole32
CoTaskMemFree
CoInitialize
CoCreateInstance
CoUninitialize
shlwapi
PathIsUNCW
PathFindFileNameW
PathStripToRootW
crypt32
CertCloseStore
CertFindCertificateInStore
CertFreeCertificateContext
CertGetNameStringW
CryptQueryObject
CryptDecodeObject
CryptMsgClose
CryptMsgGetParam
wintrust
WinVerifyTrust
oleacc
CreateStdAccessibleObject
LresultFromObject
gdi32
GetStockObject
CreateBitmap
DeleteDC
ScaleWindowExtEx
SetBkColor
RestoreDC
SetMapMode
GetClipBox
SetTextColor
SaveDC
DeleteObject
GetDeviceCaps
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutW
TextOutW
RectVisible
PtVisible
SetWindowExtEx
winspool.drv
DocumentPropertiesW
ClosePrinter
OpenPrinterW
comdlg32
GetFileTitleW
oleaut32
VariantInit
VariantClear
VariantChangeType
Sections
.text Size: 201KB - Virtual size: 200KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 55KB - Virtual size: 55KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 41KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 620KB - Virtual size: 2.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE