Static task
static1
Behavioral task
behavioral1
Sample
81dfe6a0d274edc833c5114fa856bd503256c681bda39de6337e0d0fd4cef6e1.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
81dfe6a0d274edc833c5114fa856bd503256c681bda39de6337e0d0fd4cef6e1.exe
Resource
win10v2004-20221111-en
General
-
Target
81dfe6a0d274edc833c5114fa856bd503256c681bda39de6337e0d0fd4cef6e1
-
Size
1.8MB
-
MD5
66c518b52c4dad0446e55281d55f3885
-
SHA1
7839594d385e071d21667f75a1166354ebef3eef
-
SHA256
81dfe6a0d274edc833c5114fa856bd503256c681bda39de6337e0d0fd4cef6e1
-
SHA512
f1ec0fb1135d9328c5cf9b92b94ca5d05554cc11c62980f7b3affde60d73236fec0eca2ee07e41b8a1a35d96f789dab6c24553c5b4b287f3efe930d4597e44e7
-
SSDEEP
49152:McbVoF4YyQ7yXSc607o5wGp+fTu9LhJwM:McXYybXSH07o5byTqyM
Malware Config
Signatures
Files
-
81dfe6a0d274edc833c5114fa856bd503256c681bda39de6337e0d0fd4cef6e1.exe windows x86
3fad7bfd7958b782a4280a9c092b50bc
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
version
VerQueryValueA
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerLanguageNameA
shell32
SHBrowseForFolderA
SHGetMalloc
SHGetPathFromIDListA
comctl32
ord17
kernel32
InterlockedIncrement
InterlockedDecrement
QueryPerformanceFrequency
WriteFile
CreateEventA
Sleep
lstrcatA
CompareStringA
CompareStringW
GetVersionExA
SetFilePointer
SetFileAttributesA
SetFileTime
LocalFileTimeToFileTime
DosDateTimeToFileTime
FreeLibrary
GetProcAddress
LoadLibraryA
MapViewOfFile
UnmapViewOfFile
WideCharToMultiByte
LockResource
LoadResource
SizeofResource
FindResourceA
CreateProcessA
GetModuleFileNameA
GetSystemDefaultLCID
GlobalHandle
SetCurrentDirectoryA
DeleteFileA
lstrlenW
GetSystemInfo
IsValidCodePage
FlushFileBuffers
LocalFree
FormatMessageA
GetDiskFreeSpaceA
_lclose
OpenFile
GetDriveTypeA
CreateDirectoryA
GetFileAttributesA
RemoveDirectoryA
GetExitCodeProcess
GetCurrentProcess
GetCurrentThread
GetLocaleInfoA
lstrcpyA
GetPrivateProfileStringA
lstrlenA
CreateFileA
GetFileSize
GlobalAlloc
CloseHandle
GlobalLock
ReadFile
GlobalUnlock
GlobalFree
GetLastError
SetLastError
CopyFileA
MultiByteToWideChar
CreateThread
GetExitCodeThread
GetTickCount
lstrcmpiA
lstrcmpA
ExpandEnvironmentStringsA
GetPrivateProfileIntA
GetTempPathA
SetErrorMode
GetWindowsDirectoryA
GetTempFileNameA
WritePrivateProfileStringA
GetPrivateProfileSectionA
WaitForSingleObject
CreateFileMappingA
SetHandleCount
RaiseException
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetOEMCP
GetACP
GetEnvironmentStringsW
GetStdHandle
GetCPInfo
SetUnhandledExceptionFilter
DeleteCriticalSection
InitializeCriticalSection
IsBadWritePtr
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
GetEnvironmentVariableA
TlsGetValue
TlsAlloc
TlsSetValue
GetCurrentThreadId
HeapSize
HeapReAlloc
LeaveCriticalSection
EnterCriticalSection
GetVersion
GetCommandLineA
GetStartupInfoA
GetModuleHandleA
TerminateProcess
ExitProcess
LCMapStringW
HeapAlloc
HeapFree
RtlUnwind
SystemTimeToFileTime
QueryPerformanceCounter
ResetEvent
SetEvent
lstrcpynA
GetShortPathNameA
SearchPathA
FindFirstFileA
VirtualProtect
VirtualQuery
FindClose
IsBadReadPtr
GetStringTypeA
GetStringTypeW
LCMapStringA
SetStdHandle
IsBadCodePtr
GetFileType
user32
MessageBoxA
ReleaseDC
GetDC
DispatchMessageA
TranslateMessage
GetMessageA
CreateWindowExA
RegisterClassA
LoadCursorA
LoadIconA
SetTimer
PostQuitMessage
KillTimer
PostMessageA
DefWindowProcA
PeekMessageA
MsgWaitForMultipleObjects
wsprintfA
GetDesktopWindow
DialogBoxParamA
ShowWindow
GetDlgItem
EndDialog
GetWindowDC
SetWindowPos
ClientToScreen
GetClientRect
SetWindowLongA
EndPaint
BeginPaint
GetWindowLongA
WaitForInputIdle
CreateDialogParamA
CharNextA
SendDlgItemMessageA
ExitWindowsEx
CharPrevA
LoadStringA
wvsprintfA
GetClassInfoA
UpdateWindow
SetCursor
GetDlgItemTextA
EnableWindow
GetParent
GetWindowTextLengthA
GetWindowTextA
MoveWindow
GetWindowPlacement
DestroyIcon
GetDlgCtrlID
SetWindowTextA
FillRect
GetSysColor
GetSysColorBrush
IsDialogMessageA
SendMessageA
SetRect
FindWindowA
IntersectRect
SubtractRect
IsWindow
DestroyWindow
GetSystemMetrics
GetWindowRect
DrawIcon
CharLowerBuffA
gdi32
CreateDIBitmap
SelectPalette
GetDeviceCaps
CreatePalette
GetSystemPaletteEntries
GetStockObject
DeleteObject
DeleteDC
BitBlt
SelectObject
CreateCompatibleDC
CreateSolidBrush
CreateFontIndirectA
GetObjectA
SetTextColor
SetBkMode
GetTextExtentPointA
TranslateCharsetInfo
RealizePalette
advapi32
EqualSid
RegQueryValueA
RegOpenKeyA
RegCloseKey
RegQueryValueExA
OpenThreadToken
GetTokenInformation
AllocateAndInitializeSid
RegCreateKeyExA
FreeSid
RegOpenKeyExA
RegDeleteValueA
RegSetValueExA
RegEnumValueA
RegDeleteKeyA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
ole32
CreateItemMoniker
CoCreateGuid
StringFromCLSID
StgIsStorageFile
StgOpenStorage
CoTaskMemFree
CoCreateInstance
CoUninitialize
CoInitialize
GetRunningObjectTable
oleaut32
SysReAllocStringLen
SysFreeString
SysAllocString
SysAllocStringLen
SysStringLen
VariantClear
VariantChangeType
Sections
.text Size: 128KB - Virtual size: 125KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 48KB - Virtual size: 46KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ