Static task
static1
Behavioral task
behavioral1
Sample
660d33a04f9d71205283599a9113b59f9d3fa4dd7e639aa8fac40d54c8eae513.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
660d33a04f9d71205283599a9113b59f9d3fa4dd7e639aa8fac40d54c8eae513.exe
Resource
win10v2004-20220812-en
General
-
Target
660d33a04f9d71205283599a9113b59f9d3fa4dd7e639aa8fac40d54c8eae513
-
Size
2.0MB
-
MD5
53bf8738e19731152f7b35687634f2af
-
SHA1
3da8aad477516896ab5f0b37e485e2b78fc93750
-
SHA256
660d33a04f9d71205283599a9113b59f9d3fa4dd7e639aa8fac40d54c8eae513
-
SHA512
7df160f56c116c7917ef70e832eea09dc48fa745bdb3ce3f376a129fe7b13312f54a3b2f37a5abb05b666bc417e0ba09bb7517f8a69017224007a2fb44a29c1b
-
SSDEEP
24576:VJhxeQ5ZbMQ5GqrPBrKVR+hRXkGPGDehrW3TiCNk/XAUA/JpC:VJhxecbrDr35PdhWTiCNkPAUA/J8
Malware Config
Signatures
Files
-
660d33a04f9d71205283599a9113b59f9d3fa4dd7e639aa8fac40d54c8eae513.exe windows x64
1168270755186f6352a33c2729f70583
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
ws2_32
gethostname
inet_ntoa
select
accept
getpeername
WSAIoctl
connect
WSAStartup
inet_addr
htonl
gethostbyname
WSAGetLastError
htons
getsockname
shutdown
setsockopt
WSACleanup
recv
bind
socket
__WSAFDIsSet
closesocket
send
getsockopt
listen
version
VerQueryValueA
GetFileVersionInfoA
GetFileVersionInfoSizeA
userenv
CreateEnvironmentBlock
ExpandEnvironmentStringsForUserA
DestroyEnvironmentBlock
kernel32
WriteFile
GetSystemDirectoryW
LoadLibraryW
CreateEventA
GetExitCodeProcess
ReadFile
CreateFileW
Process32Next
WaitForMultipleObjects
lstrcatW
CreateToolhelp32Snapshot
OutputDebugStringA
GetCurrentProcessId
GetEnvironmentVariableA
SetCurrentDirectoryA
SetFileAttributesA
ResumeThread
ResetEvent
CreateFileA
GetFileSize
CompareFileTime
GetFileTime
GetExitCodeThread
SetFilePointer
MoveFileExA
SetEndOfFile
SetErrorMode
SystemTimeToFileTime
SetFileTime
GetDriveTypeA
GetFileAttributesA
FileTimeToSystemTime
FlushFileBuffers
CreateDirectoryA
GetLogicalDriveStringsA
MoveFileA
GetSystemTime
SetThreadExecutionState
VirtualFreeEx
ReadProcessMemory
TerminateProcess
VirtualAllocEx
TerminateThread
FindResourceA
LoadResource
SizeofResource
LockResource
CreateMutexA
ReleaseMutex
AllocConsole
FormatMessageA
Process32First
WriteConsoleA
GlobalDeleteAtom
WaitNamedPipeW
GetModuleHandleW
GlobalAddAtomA
GetVolumeInformationA
SetProcessShutdownParameters
GetCurrentDirectoryW
GetFileType
PeekNamedPipe
GetFileInformationByHandle
GetFullPathNameA
InitializeCriticalSectionAndSpinCount
HeapCreate
GetVersion
HeapSetInformation
GetStringTypeW
LCMapStringW
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
FlsAlloc
FlsFree
FlsSetValue
FlsGetValue
RtlUnwindEx
HeapSize
GetLocaleInfoW
GetModuleFileNameW
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlPcToFileHeader
RaiseException
ExitThread
GetStartupInfoW
GetCommandLineA
ExitProcess
FindFirstFileExA
FileTimeToLocalFileTime
EncodePointer
DecodePointer
TlsFree
TlsAlloc
DuplicateHandle
ReleaseSemaphore
SetThreadPriority
CreateSemaphoreA
TlsSetValue
GetCurrentThread
TlsGetValue
GlobalGetAtomNameA
WaitForSingleObject
GetEnvironmentStringsW
QueryPerformanceCounter
HeapReAlloc
GetConsoleCP
SetLastError
VerifyVersionInfoW
VerSetConditionMask
CreateFileMappingA
GetPrivateProfileStructA
FreeEnvironmentStringsW
WritePrivateProfileStringA
GetPrivateProfileStringA
GetPrivateProfileIntA
WritePrivateProfileSectionA
WritePrivateProfileStructA
WinExec
GetComputerNameA
GetSystemInfo
GetSystemDirectoryA
GetProcessHeap
HeapFree
HeapAlloc
lstrlenA
OpenFileMappingA
UnmapViewOfFile
MapViewOfFile
DeleteFileA
GetTempPathA
FindNextFileA
FindClose
FindFirstFileA
FreeLibrary
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetProcessTimes
InitializeCriticalSection
GetSystemTimeAsFileTime
GetCurrentProcess
GetVersionExA
OpenEventA
GetLastError
OpenProcess
SetEvent
CreateThread
CloseHandle
Sleep
GetCurrentThreadId
GetModuleHandleA
GetModuleFileNameA
LoadLibraryA
GetProcAddress
GetTickCount
GlobalFree
GlobalUnlock
MultiByteToWideChar
WideCharToMultiByte
GlobalAlloc
GlobalLock
GlobalSize
GetConsoleMode
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
SetStdHandle
GetDriveTypeW
GetTimeZoneInformation
WriteConsoleW
CompareStringW
SetEnvironmentVariableA
lstrcatA
lstrcpyA
DosDateTimeToFileTime
LocalFileTimeToFileTime
lstrcpynA
lstrcmpiA
SetVolumeLabelA
GetLocalTime
SetHandleCount
GetCurrentDirectoryA
SetEnvironmentVariableW
GetStdHandle
RemoveDirectoryA
user32
IsDlgButtonChecked
TrackPopupMenu
GetMenuItemID
GetSubMenu
LoadMenuA
EnableMenuItem
RemoveMenu
SetMenuDefaultItem
DestroyMenu
EnableWindow
SendInput
ToAscii
GetAsyncKeyState
MapVirtualKeyA
VkKeyScanA
DestroyWindow
PostThreadMessageA
SendNotifyMessageA
WaitMessage
PeekMessageA
ChangeClipboardChain
SetClipboardViewer
GetClipboardOwner
EnumDesktopWindows
GetClassNameA
OpenDesktopA
FillRect
DrawTextA
FindWindowExA
CheckDlgButton
RegisterWindowMessageA
GetIconInfo
SetRect
IsWindowVisible
EndPaint
DrawIconEx
BeginPaint
GetUpdateRect
IntersectRect
DestroyIcon
PtInRect
GetKeyboardState
SetActiveWindow
MessageBeep
FlashWindow
ChangeDisplaySettingsExA
EnumDisplayDevicesA
keybd_event
GetKeyState
EnumDisplaySettingsA
ScreenToClient
GetWindowRect
SendDlgItemMessageA
SetForegroundWindow
GetClientRect
SetFocus
GetScrollInfo
InvalidateRect
SetDlgItemInt
GetDlgItemInt
GetProcessWindowStation
WindowFromPoint
GetDlgItem
EndDialog
GetCursorPos
SetWindowTextA
GetDlgItemTextA
DialogBoxParamA
SetDlgItemTextA
MoveWindow
ExitWindowsEx
wsprintfA
GetWindowThreadProcessId
SystemParametersInfoA
MessageBoxA
GetForegroundWindow
GetDesktopWindow
SendMessageA
PostMessageA
FindWindowA
mouse_event
GetMessageA
GetUserObjectInformationA
SetTimer
GetWindowLongPtrA
RegisterClassExA
PostQuitMessage
GetThreadDesktop
KillTimer
LoadIconA
OpenInputDesktop
CloseDesktop
TranslateMessage
CreateWindowExA
DefWindowProcA
SetWindowPos
ShowWindow
SetThreadDesktop
SetWindowLongPtrA
DispatchMessageA
GetSystemMetrics
LoadImageA
AdjustWindowRect
LoadCursorA
IsRectEmpty
GetDC
ReleaseDC
CloseClipboard
IsClipboardFormatAvailable
RegisterClipboardFormatA
GetClipboardData
EmptyClipboard
OpenClipboard
SetClipboardData
wvsprintfA
OemToCharA
CharToOemA
LoadStringA
gdi32
GetBitmapBits
SetTextColor
SetBkColor
GdiFlush
CreatePalette
RealizePalette
SelectPalette
CreateFontIndirectA
GetObjectA
ExtEscape
GetSystemPaletteEntries
GetRgnBox
GetRegionData
SetRectRgn
PtInRegion
CombineRgn
OffsetRgn
CreateRectRgn
PatBlt
StretchBlt
CreateDCA
SetBkMode
GetClipBox
GetPixel
CreateCompatibleBitmap
CreateCompatibleDC
SelectObject
DeleteObject
GetDIBits
GetDeviceCaps
CreateDIBSection
DeleteDC
BitBlt
SetDIBColorTable
GetStockObject
CreateSolidBrush
advapi32
LookupAccountSidA
RegCreateKeyA
GetSecurityDescriptorDacl
GetSecurityDescriptorGroup
IsValidSecurityDescriptor
IsValidSid
GetSecurityDescriptorOwner
SetKernelObjectSecurity
GetSecurityDescriptorControl
IsValidAcl
GetSecurityDescriptorLength
GetKernelObjectSecurity
SetSecurityDescriptorSacl
ConvertStringSecurityDescriptorToSecurityDescriptorA
GetSecurityDescriptorSacl
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
SetServiceStatus
QueryServiceStatus
RegDeleteKeyA
CreateServiceA
RegisterServiceCtrlHandlerA
DeleteService
StartServiceCtrlDispatcherA
AdjustTokenPrivileges
DuplicateTokenEx
LookupPrivilegeValueA
SetTokenInformation
FreeSid
RevertToSelf
AllocateAndInitializeSid
ImpersonateLoggedOnUser
EqualSid
GetTokenInformation
QueryServiceConfigA
OpenSCManagerA
EnumServicesStatusA
CloseServiceHandle
OpenServiceA
RegCloseKey
RegDeleteValueA
RegOpenKeyExA
RegCreateKeyExA
GetUserNameA
RegQueryValueExA
RegSetValueExA
OpenProcessToken
CreateProcessAsUserA
shell32
SHGetPathFromIDListA
SHGetMalloc
SHGetSpecialFolderLocation
SHFileOperationA
ShellExecuteExA
ShellExecuteA
Shell_NotifyIconA
ole32
CoUninitialize
CoInitialize
CoCreateInstance
imm32
ImmGetDefaultIMEWnd
Sections
.text Size: 914KB - Virtual size: 913KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 412KB - Virtual size: 411KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 638KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 34KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 681KB - Virtual size: 681KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ