Static task
static1
Behavioral task
behavioral1
Sample
64007f2429f6a82db04936c6ee036a61899012609cb4c0aa8db745453bf026f5.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
64007f2429f6a82db04936c6ee036a61899012609cb4c0aa8db745453bf026f5.exe
Resource
win10v2004-20221111-en
General
-
Target
64007f2429f6a82db04936c6ee036a61899012609cb4c0aa8db745453bf026f5
-
Size
664KB
-
MD5
3b02bff99ee3243b777e601e410accf0
-
SHA1
3929862e2434faca8c36e0fc13e084d28cc28171
-
SHA256
64007f2429f6a82db04936c6ee036a61899012609cb4c0aa8db745453bf026f5
-
SHA512
9699b90000b6dd8907c792498f0d0cf171ccd22c61387d64854d20d4a527d2b14874fbff57e864e540bd200764d3f4b956154d504e11422ab32627af145b19f6
-
SSDEEP
12288:nLlREWqgLqoNaLrUxVxoMQtuJwqujeilj/p4I0ToA1GhVSCaavpdAs/P:nJVqgLq/YxX1eq0FZSozHlbH/
Malware Config
Signatures
Files
-
64007f2429f6a82db04936c6ee036a61899012609cb4c0aa8db745453bf026f5.exe windows x86
c39d9e001d5d8c7fe2556989b2e145a7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comdlg32
PageSetupDlgA
PrintDlgA
GetSaveFileNameW
GetSaveFileNameA
CommDlgExtendedError
ole32
OleSetClipboard
IsAccelerator
CoRegisterClassObject
DoDragDrop
ReadFmtUserTypeStg
WriteFmtUserTypeStg
OleRegGetMiscStatus
OleRegGetUserType
CreateFileMoniker
GetHGlobalFromILockBytes
OleTranslateAccelerator
GetRunningObjectTable
StgCreateDocfileOnILockBytes
OleSetContainedObject
CoFreeUnusedLibraries
OleRegEnumVerbs
StgOpenStorageOnILockBytes
OleLoad
CLSIDFromString
CoGetClassObject
CLSIDFromProgID
StgOpenStorage
StgIsStorageILockBytes
CoRegisterMessageFilter
OleQueryLinkFromData
SetConvertStg
ReadClassStg
WriteClassStg
CoDisconnectObject
OleDestroyMenuDescriptor
OleIsRunning
CreateGenericComposite
OleSaveToStream
GetClassFile
CreateItemMoniker
CoCreateInstance
WriteClassStm
StringFromGUID2
OleLockRunning
OleCreateMenuDescriptor
StgCreateDocfile
CoTreatAsClass
CreateILockBytesOnHGlobal
OleRun
OleInitialize
OleDuplicateData
StringFromCLSID
OleQueryCreateFromData
CoRevokeClassObject
advapi32
SetSecurityDescriptorGroup
FreeSid
RegCreateKeyExA
SetSecurityDescriptorOwner
RegOpenKeyA
SetSecurityDescriptorDacl
comctl32
ImageList_Create
ImageList_DragMove
ImageList_GetIconSize
ImageList_Destroy
ImageList_AddMasked
DestroyPropertySheetPage
ImageList_Draw
PropertySheetA
ImageList_Add
InitCommonControlsEx
ord17
ImageList_GetIcon
ImageList_EndDrag
ImageList_Remove
ImageList_ReplaceIcon
ImageList_LoadImageA
ImageList_GetImageCount
user32
DrawEdge
MessageBoxA
GetActiveWindow
GetDesktopWindow
LoadStringA
ShowScrollBar
CallNextHookEx
IsChild
IsRectEmpty
GetClassLongA
GetScrollInfo
GetCursorPos
GetMessagePos
LockWindowUpdate
CharNextA
CallWindowProcA
CharUpperA
TrackPopupMenuEx
IsClipboardFormatAvailable
GetWindowLongA
DrawFocusRect
BringWindowToTop
LoadBitmapA
RegisterClassA
GetWindowPlacement
GetWindow
ScreenToClient
GetMenuItemID
PtInRect
EndDeferWindowPos
GetMenuState
SetWindowRgn
SetWindowsHookExA
SendDlgItemMessageA
LoadImageA
BeginDeferWindowPos
RemovePropA
GetNextDlgTabItem
RegisterClipboardFormatA
GetWindowTextLengthA
GetKeyState
DrawFrameControl
DestroyCursor
WaitMessage
MessageBeep
GetMenu
ModifyMenuA
FindWindowA
DrawTextA
ShowCaret
GrayStringA
PeekMessageA
TrackPopupMenu
SetCapture
GetNextDlgGroupItem
CreateIconIndirect
DefDlgProcA
CreateWindowExA
GetDCEx
ReleaseDC
SetScrollRange
ClientToScreen
GetUpdateRect
SetRect
DeferWindowPos
SetCursorPos
SetWindowTextA
GetSysColor
OpenClipboard
RegisterClassExA
GetIconInfo
GetMessageA
SetWindowPos
IsDlgButtonChecked
GetWindowThreadProcessId
SetMenuItemBitmaps
GetDlgItemTextA
CreatePopupMenu
GetMessageTime
MapVirtualKeyA
UpdateWindow
ExitWindowsEx
GetFocus
EnableWindow
GetClassInfoA
InvalidateRect
MoveWindow
GetScrollRange
wsprintfA
SetParent
GetWindowDC
GetSystemMenu
IsWindowEnabled
CopyRect
BeginPaint
IsIconic
GetParent
UnhookWindowsHookEx
GetMenuItemCount
KillTimer
EndDialog
GetCapture
IsDialogMessageA
SetTimer
DrawIcon
GetDlgItem
DeleteMenu
SetWindowLongA
DestroyIcon
DestroyMenu
ShowWindow
GetClassInfoExA
GetClassNameA
ShowOwnedPopups
SetActiveWindow
PostThreadMessageA
UnregisterClassA
GetScrollPos
ReleaseCapture
MapWindowPoints
CloseClipboard
DispatchMessageA
SendMessageA
LoadMenuA
GetSubMenu
EnumWindows
GetDlgCtrlID
wvsprintfA
MapDialogRect
GetSystemMetrics
IsMenu
OffsetRect
CreateMenu
TabbedTextOutA
ValidateRect
EnableMenuItem
PostQuitMessage
InsertMenuItemA
PostMessageA
GetLastActivePopup
FillRect
TranslateMessage
GetTopWindow
LoadCursorA
SetCursor
DrawMenuBar
RemoveMenu
LoadIconA
CreateCaret
EqualRect
GetSysColorBrush
SetForegroundWindow
SetDlgItemTextA
CheckMenuItem
EmptyClipboard
GetMenuItemInfoA
InvalidateRgn
DestroyWindow
RegisterWindowMessageA
ScrollWindowEx
SetScrollPos
UnionRect
IsWindowVisible
InflateRect
GetWindowTextA
SetFocus
CopyIcon
GetForegroundWindow
FrameRect
EndPaint
IsWindow
GetClientRect
GetDC
DefWindowProcA
GetWindowRect
ScrollWindow
IntersectRect
WindowFromPoint
AdjustWindowRectEx
LoadAcceleratorsA
winspool.drv
OpenPrinterW
ord204
shell32
ord155
DragFinish
SHGetSpecialFolderLocation
ShellExecuteA
kernel32
EnterCriticalSection
FreeEnvironmentStringsA
GetDateFormatA
LocalAlloc
HeapAlloc
CreateEventA
GetProcessHeap
GetCurrentThread
VirtualQuery
SetFilePointer
LeaveCriticalSection
Sleep
RtlUnwind
SetHandleCount
GetVersionExA
GetLastError
GetWindowsDirectoryA
GetOEMCP
GetEnvironmentStringsW
HeapFree
HeapDestroy
FreeEnvironmentStringsW
GetVersion
LCMapStringW
IsBadWritePtr
SetCurrentDirectoryA
GetCurrentProcess
CreateDirectoryA
GetModuleFileNameA
FlushInstructionCache
SetStdHandle
lstrcpyA
GetDriveTypeA
GetFileTime
QueryPerformanceCounter
GlobalFlags
lstrlenA
SystemTimeToFileTime
GetStartupInfoA
DuplicateHandle
GetVolumeInformationA
GetStdHandle
FindResourceExA
GetCurrentThreadId
SetLastError
InterlockedCompareExchange
TlsAlloc
FlushFileBuffers
GetCurrentProcessId
CreateMutexA
GlobalUnlock
GetSystemTimeAsFileTime
MultiByteToWideChar
LCMapStringA
SetThreadPriority
HeapSize
GetACP
CreateFileMappingA
GetTempPathA
TlsGetValue
WideCharToMultiByte
SetUnhandledExceptionFilter
GetSystemInfo
IsValidLocale
SetErrorMode
LocalFree
GetPrivateProfileStringA
lstrcmpiA
LoadLibraryA
InterlockedExchange
CloseHandle
GetStringTypeExA
CompareStringA
IsBadReadPtr
TlsSetValue
UnhandledExceptionFilter
CompareStringW
GetUserDefaultLCID
ReadFile
SetEnvironmentVariableA
GetTimeFormatA
GlobalSize
GetStringTypeA
GetPrivateProfileSectionA
GlobalHandle
RaiseException
lstrcpynA
FatalAppExitA
GetTimeZoneInformation
DeleteCriticalSection
MulDiv
WriteConsoleA
GlobalFree
IsBadCodePtr
ExitProcess
GetEnvironmentVariableA
InitializeCriticalSection
VirtualFree
WriteFile
GetFileSize
FreeResource
InterlockedIncrement
InterlockedDecrement
GetTickCount
HeapReAlloc
EnumSystemLocalesA
GetSystemTime
GetStringTypeW
DosDateTimeToFileTime
TerminateProcess
GetLocalTime
TlsFree
WaitForSingleObject
lstrlenW
ResumeThread
DeleteFileA
GetCPInfo
FindResourceA
GetFileType
SetConsoleCtrlHandler
LocalFileTimeToFileTime
GetCommandLineA
VirtualAlloc
GetEnvironmentStrings
GetModuleHandleA
GetProcAddress
HeapCreate
CreateThread
SuspendThread
Sections
.text Size: 68KB - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 460KB - Virtual size: 459KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 96KB - Virtual size: 94KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 36KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ