Static task
static1
Behavioral task
behavioral1
Sample
7bcbcdfa1eb3ace8d37d576276f48a0e42af04359da7555c7be329337a4d9acc.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
7bcbcdfa1eb3ace8d37d576276f48a0e42af04359da7555c7be329337a4d9acc.exe
Resource
win10v2004-20220901-en
General
-
Target
7bcbcdfa1eb3ace8d37d576276f48a0e42af04359da7555c7be329337a4d9acc
-
Size
9.4MB
-
MD5
8614b002f0496d524fa62ef67da4cc1e
-
SHA1
6a0c08ff59905f19a8997cae683d613e8d1579a8
-
SHA256
7bcbcdfa1eb3ace8d37d576276f48a0e42af04359da7555c7be329337a4d9acc
-
SHA512
30e313008eef7d3f8850942003030614e3bb1b62ec11852d0e13bb9e6d8f287aca425f5da0b8b1323a604995f56e343c3dd0d389609baf4a0a1b22bb3aa854b2
-
SSDEEP
196608:DWPgw6WP3wNeeDoS/pXM7C1qT7fY9ZNsGdHMB4:Dk6R8eDoS/7qT7w9sGdHMS
Malware Config
Signatures
Files
-
7bcbcdfa1eb3ace8d37d576276f48a0e42af04359da7555c7be329337a4d9acc.exe windows x86
24c757fea768c35afeb87e40ad041060
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalUnlock
GetModuleFileNameW
InterlockedIncrement
InterlockedDecrement
CompareStringW
GetDriveTypeW
lstrcmpiW
lstrlenW
FreeLibrary
LoadLibraryW
CreateDirectoryW
GetCurrentProcessId
GetExitCodeThread
SetEvent
CreateEventW
GlobalLock
GlobalAlloc
lstrcmpW
GetFileSize
SetStdHandle
WriteConsoleW
WriteConsoleA
GetModuleHandleA
InitializeCriticalSectionAndSpinCount
GetStringTypeA
IsValidLocale
EnumSystemLocalesA
GetUserDefaultLCID
GetConsoleMode
GetConsoleCP
GetTickCount
QueryPerformanceCounter
GetStartupInfoA
SetLastError
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
IsValidCodePage
GetOEMCP
GetACP
HeapCreate
ReadFile
LCMapStringA
GetCPInfo
RtlUnwind
ExitProcess
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetStartupInfoW
GetSystemTimeAsFileTime
IsDebuggerPresent
UnhandledExceptionFilter
HeapSize
HeapReAlloc
HeapDestroy
VirtualAlloc
VirtualFree
IsProcessorFeaturePresent
HeapAlloc
GetProcessHeap
HeapFree
InterlockedCompareExchange
PeekNamedPipe
OpenEventW
TerminateProcess
OpenProcess
SearchPathW
GetLocaleInfoA
GetStringTypeW
ConnectNamedPipe
CreateNamedPipeW
ResetEvent
MoveFileW
TerminateThread
GetSystemDirectoryW
GetLocalTime
OutputDebugStringW
GlobalMemoryStatus
GetVersion
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
GetWindowsDirectoryW
GlobalFree
GetTempPathW
GetTempPathA
GetSystemTime
GetTempFileNameW
DeleteFileW
GetTempFileNameA
DeleteFileA
FindFirstFileW
RemoveDirectoryW
FindNextFileW
GetLogicalDriveStringsW
GetFileAttributesW
CreateFileA
SetFileAttributesW
WaitForMultipleObjects
GetSystemInfo
InterlockedExchange
WideCharToMultiByte
LoadLibraryExW
MultiByteToWideChar
FindClose
CopyFileW
LCMapStringW
GetDiskFreeSpaceExW
Sleep
GetLastError
GetCurrentThreadId
MulDiv
WaitForSingleObject
lstrcpynW
FindResourceExW
FindResourceW
LoadResource
LockResource
SizeofResource
GetUserDefaultLangID
GetSystemDefaultLangID
GetLocaleInfoW
EnumResourceLanguagesW
SetEndOfFile
SetCurrentDirectoryW
GetCommandLineW
UnlockFile
LockFile
GetExitCodeProcess
CreateProcessA
LeaveCriticalSection
CreateProcessW
DuplicateHandle
GetModuleFileNameA
FlushFileBuffers
SetFilePointer
GetConsoleOutputCP
GetConsoleScreenBufferInfo
GetStdHandle
SetConsoleTextAttribute
GetFullPathNameW
InitializeCriticalSection
EnterCriticalSection
DeleteCriticalSection
GetModuleHandleW
GetProcAddress
RaiseException
FlushInstructionCache
GetCurrentProcess
CloseHandle
WriteFile
GetFileType
CreateFileW
LocalAlloc
LocalFree
LoadLibraryA
GetShortPathNameW
GetCurrentThread
GetEnvironmentVariableW
FormatMessageW
CreateThread
SetUnhandledExceptionFilter
GetVersionExW
user32
CallWindowProcW
GetClientRect
SetWindowLongW
GetParent
GetWindow
GetWindowLongW
GetWindowTextW
GetWindowTextLengthW
FillRect
IsWindow
ShowWindow
GetWindowRect
UnionRect
IsWindowVisible
BeginPaint
EndPaint
SendMessageW
DefWindowProcW
ReleaseDC
GetWindowDC
SetWindowPos
MapWindowPoints
SetCursor
DrawFrameControl
RegisterWindowMessageW
InvalidateRgn
GetDesktopWindow
GetKeyState
DrawStateW
DrawTextExW
DrawFocusRect
ValidateRect
DestroyMenu
AppendMenuW
CreatePopupMenu
TrackPopupMenu
InflateRect
LoadBitmapW
MessageBeep
CharNextW
GetClassNameW
ReleaseCapture
SetCapture
UpdateWindow
DestroyIcon
GetDlgCtrlID
GetCapture
SetScrollInfo
GetScrollPos
GetClassInfoExW
RegisterClassExW
DrawEdge
SetScrollPos
SetRect
MoveWindow
GetScrollInfo
GetMessagePos
SystemParametersInfoW
GetActiveWindow
TrackMouseEvent
GetAsyncKeyState
DestroyCursor
GetWindowRgn
CopyRect
IsZoomed
SetWindowRgn
GetComboBoxInfo
DestroyAcceleratorTable
CreateAcceleratorTableW
TranslateAcceleratorW
CreateDialogParamW
EndDialog
DialogBoxParamW
InvalidateRect
GetNextDlgTabItem
SetFocus
GetDC
MonitorFromWindow
GetMonitorInfoW
LoadImageW
IsDialogMessageW
IsChild
PostQuitMessage
PostMessageW
SetForegroundWindow
SetCursorPos
GetCursorPos
PeekMessageW
GetMessageW
TranslateMessage
DispatchMessageW
LoadCursorW
LoadStringW
LoadIconW
DialogBoxIndirectParamW
GetForegroundWindow
EnumWindows
GetWindowThreadProcessId
GetPropW
GetSystemMenu
EnableMenuItem
MsgWaitForMultipleObjects
ModifyMenuW
FindWindowW
ExitWindowsEx
GetScrollRange
SetPropW
RemovePropW
LoadMenuW
GetSubMenu
OpenClipboard
CloseClipboard
EmptyClipboard
SetClipboardData
GetIconInfo
SendMessageTimeoutW
UnregisterClassA
MessageBoxW
GetFocus
RedrawWindow
IsWindowEnabled
EnableWindow
DestroyWindow
DrawTextW
DrawIconEx
GetSystemMetrics
ClientToScreen
OffsetRect
SetRectEmpty
PtInRect
GetSysColorBrush
IntersectRect
IsRectEmpty
SendMessageA
GetSysColor
CreateWindowExW
GetDlgItem
SetWindowTextW
EqualRect
SetTimer
KillTimer
ScreenToClient
gdi32
GetLayout
GetBrushOrgEx
CreateFontIndirectW
CreateSolidBrush
Rectangle
CreatePen
ExtTextOutW
SetBkColor
GetRgnBox
EqualRgn
CreatePolygonRgn
CreateRectRgnIndirect
GetStockObject
CreateFontW
ExcludeClipRect
SetBkMode
GetBitmapBits
SetBrushOrgEx
CreatePatternBrush
FillRgn
SelectClipRgn
CombineRgn
CreateRectRgn
GetObjectW
GetDeviceCaps
BitBlt
SetViewportOrgEx
CreateCompatibleBitmap
CreateCompatibleDC
DeleteObject
SelectObject
DeleteDC
CreateDIBSection
CreateBitmapIndirect
SetTextColor
advapi32
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
SetEntriesInAclW
GetSecurityDescriptorDacl
AdjustTokenPrivileges
LookupPrivilegeValueW
StartServiceW
QueryServiceStatus
OpenServiceW
RegDeleteValueA
RegDeleteValueW
RegCreateKeyExW
RegSetValueExW
RegEnumKeyExW
RegQueryInfoKeyW
RegDeleteKeyW
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
RegQueryValueExA
OpenSCManagerW
LockServiceDatabase
UnlockServiceDatabase
CloseServiceHandle
RegOpenKeyExA
RegEnumValueA
LookupAccountSidW
OpenProcessToken
GetTokenInformation
AllocateAndInitializeSid
EqualSid
FreeSid
GetUserNameW
RegDeleteKeyA
RegCreateKeyA
RegSetValueExA
RegOpenKeyA
shell32
ShellExecuteW
ShellExecuteExW
SHGetFolderPathW
SHGetFileInfoW
SHGetSpecialFolderLocation
SHGetMalloc
SHGetPathFromIDListW
SHBrowseForFolderW
ole32
CLSIDFromString
OleInitialize
CoInitializeEx
CoTaskMemFree
CLSIDFromProgID
CoGetClassObject
CoCreateInstance
CreateStreamOnHGlobal
OleLockRunning
CoTaskMemAlloc
OleUninitialize
CoCreateGuid
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
CoUninitialize
CoTaskMemRealloc
CoInitialize
StringFromGUID2
oleaut32
OleLoadPicture
SysStringByteLen
SysAllocStringByteLen
SysAllocStringLen
LoadTypeLi
LoadRegTypeLi
SysStringLen
VarDateFromStr
VariantCopy
VariantInit
VariantClear
SysAllocString
SysFreeString
VarUI4FromStr
OleCreateFontIndirect
dbghelp
SymSetSearchPath
SymCleanup
SymInitialize
SymSetOptions
SymFunctionTableAccess
SymGetModuleBase
StackWalk
SymGetLineFromAddr
shlwapi
PathIsUNCW
PathFileExistsW
PathIsDirectoryW
PathAddBackslashW
comctl32
ImageList_Add
DestroyPropertySheetPage
InitCommonControlsEx
ImageList_LoadImageW
ImageList_GetIcon
ImageList_AddMasked
ImageList_SetBkColor
ImageList_ReplaceIcon
ImageList_Destroy
_TrackMouseEvent
ImageList_Create
PropertySheetW
CreatePropertySheetPageW
msimg32
TransparentBlt
AlphaBlend
version
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
netapi32
NetUserGetLocalGroups
comdlg32
GetOpenFileNameW
GetSaveFileNameW
Sections
.text Size: 1004KB - Virtual size: 1003KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 245KB - Virtual size: 244KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 212KB - Virtual size: 212KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 94KB - Virtual size: 94KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.text Size: 272KB - Virtual size: 276KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE