Static task
static1
Behavioral task
behavioral1
Sample
47c812778385103d96620953b129855c897b10cbb9bf4f58e5a9e14640014200.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
47c812778385103d96620953b129855c897b10cbb9bf4f58e5a9e14640014200.exe
Resource
win10v2004-20221111-en
General
-
Target
47c812778385103d96620953b129855c897b10cbb9bf4f58e5a9e14640014200
-
Size
963KB
-
MD5
450711dea61397d6a5ea0bb0df6b3370
-
SHA1
36179ac9ce4e57d083ba3618693d0e09bb4e82bd
-
SHA256
47c812778385103d96620953b129855c897b10cbb9bf4f58e5a9e14640014200
-
SHA512
d19a7a381379b305c294cd1ac69e0185650568e2d07e7104fe934290a606fbe5d08802a1eb1494cd6aad4acd29dace962ead4697242554efc884832bcf7afb75
-
SSDEEP
6144:NB+40Gp0yxGU8P1yGRn9PcQaA0qi4DeI9MsqZE:NaEqfyGVPaNLuiE
Malware Config
Signatures
Files
-
47c812778385103d96620953b129855c897b10cbb9bf4f58e5a9e14640014200.exe windows x86
022fecbd9e41f48c67535145e3c4c3b7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegCloseKey
RegDeleteKeyA
RegEnumKeyExA
RegEnumValueA
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
GetSecurityDescriptorSacl
LookupAccountSidW
RegCreateKeyExA
DeregisterEventSource
EqualSid
MakeAbsoluteSD2
OpenThreadToken
RegCreateKeyExW
RegDeleteKeyW
RegEnumKeyExW
RegOpenKeyExW
RegQueryInfoKeyW
RegQueryValueExW
RegSetValueExW
RegisterEventSourceW
ReportEventW
RevertToSelf
GetNamedSecurityInfoExA
NotifyBootConfigStatus
ObjectCloseAuditAlarmW
RegDeleteValueW
GetAclInformation
GetEffectiveRightsFromAclW
GetSecurityInfoExW
ReportEventA
gdi32
BitBlt
CreateCompatibleDC
CreateFontIndirectA
DPtoLP
DeleteDC
DeleteObject
ExtTextOutA
GetDeviceCaps
GetObjectA
GetTextMetricsA
ModifyWorldTransform
PathToRegion
RestoreDC
SaveDC
SelectObject
SetBkColor
SetGraphicsMode
SetTextColor
SetViewportOrgEx
SetWindowOrgEx
CreateSolidBrush
ExtTextOutW
GetNearestColor
GetStockObject
GetTextExtentPointW
SetRelAbs
TranslateCharsetInfo
EnumEnhMetaFile
PolyDraw
ExtCreatePen
GetArcDirection
SetColorAdjustment
CopyMetaFileA
CreatePalette
DeleteEnhMetaFile
DeleteMetaFile
GetBitmapDimensionEx
GetEnhMetaFileBits
GetMetaFileBitsEx
GetWinMetaFileBits
RealizePalette
SelectPalette
SetBitmapDimensionEx
SetMetaFileBitsEx
SetWinMetaFileBits
StretchDIBits
kernel32
AllocConsole
CloseHandle
CreateEventA
CreateNamedPipeW
CreateThread
DisableThreadLibraryCalls
FreeLibrary
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GetProcessHeap
GetSystemDirectoryA
GetTickCount
GetWindowsDirectoryA
InterlockedIncrement
LoadLibraryA
LocalAlloc
LocalFree
SetEvent
lstrcmpA
lstrcmpiA
lstrcpyA
lstrcpynA
lstrlenA
CreateDirectoryW
CreateFileW
DeleteFileW
FileTimeToLocalFileTime
FileTimeToSystemTime
FindClose
FindFirstFileA
FindFirstFileW
FindNextFileW
FormatMessageW
GetCurrentProcess
GetDateFormatW
GetFileAttributesW
GetFileSize
GetFileTime
GetFullPathNameW
GetLocaleInfoW
GetNumberFormatW
GetTimeFormatW
GetVolumeInformationW
GlobalAlloc
GlobalFree
GlobalGetAtomNameA
GlobalReAlloc
GlobalSize
HeapCreate
IsDBCSLeadByte
LoadLibraryW
MultiByteToWideChar
OpenJobObjectA
RemoveDirectoryW
SetFileAttributesW
SetUnhandledExceptionFilter
TerminateProcess
UnhandledExceptionFilter
VirtualQueryEx
WideCharToMultiByte
WritePrivateProfileStringW
lstrcmpW
lstrcmpiW
lstrcpyW
lstrcpynW
lstrlenW
CreateFileA
ExitProcess
FileTimeToDosDateTime
GetCurrentProcessId
GetCurrentThreadId
GetFileAttributesA
GetFileInformationByHandle
GetSystemTimeAsFileTime
GetThreadSelectorEntry
IsBadReadPtr
QueryPerformanceCounter
GetModuleFileNameW
GlobalLock
ReadFile
Sleep
VirtualAlloc
VirtualFree
WriteFile
lstrcatW
DeviceIoControl
DuplicateHandle
GetCurrentThread
GetStartupInfoA
GetTimeFormatA
IsBadStringPtrW
MapViewOfFile
OpenProcess
ReplaceFileW
UnmapViewOfFile
WriteConsoleOutputW
EnumCalendarInfoW
FindResourceA
GetLocalTime
HeapDestroy
LoadLibraryExA
LoadResource
ReleaseMutex
SetFilePointer
SizeofResource
WaitForSingleObject
InterlockedCompareExchange
InterlockedExchange
FindResourceW
LoadLibraryExW
ReadConsoleOutputCharacterW
SetVolumeMountPointA
FreeLibraryAndExitThread
GetStringTypeExW
QueryPerformanceFrequency
SetErrorMode
GetDriveTypeA
GlobalAddAtomA
GlobalDeleteAtom
GlobalFindAtomA
GlobalUnlock
LocalLock
LocalUnlock
MulDiv
OpenFile
WinExec
InterlockedDecrement
GetCPInfo
HeapAlloc
HeapFree
HeapReAlloc
LCMapStringA
GetLastError
LCMapStringW
ExitThread
SetStdHandle
EnterCriticalSection
LeaveCriticalSection
GetFileType
GetConsoleCP
GetConsoleMode
DeleteFileA
GetCommandLineA
GetVersionExA
GetStringTypeA
GetStringTypeW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
IsDebuggerPresent
GetACP
GetOEMCP
IsValidCodePage
GetLocaleInfoA
SetHandleCount
GetStdHandle
DeleteCriticalSection
RaiseException
FatalAppExitA
InitializeCriticalSection
SetConsoleCtrlHandler
HeapSize
SetEndOfFile
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetFullPathNameA
GetCurrentDirectoryA
SetCurrentDirectoryA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetDateFormatA
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
RtlUnwind
GetExitCodeProcess
CreateProcessW
CreateProcessA
GetTimeZoneInformation
FlushFileBuffers
CompareStringA
CompareStringW
SetEnvironmentVariableA
SetEnvironmentVariableW
rpcrt4
I_RpcBCacheAllocate
NdrClientContextMarshall
NdrPointerBufferSize
I_RpcBindingInqDynamicEndpointA
I_RpcBindingInqSecurityContext
I_RpcIfInqTransferSyntaxes
NdrUserMarshalSimpleTypeConvert
RpcBindingFree
RpcBindingFromStringBindingW
RpcBindingSetAuthInfoExW
RpcBindingToStringBindingW
RpcBindingVectorFree
RpcEpUnregister
RpcImpersonateClient
RpcRevertToSelf
RpcServerInqBindings
RpcServerRegisterIfEx
RpcServerUnregisterIf
RpcServerUseProtseqIfW
RpcStringBindingParseW
RpcStringFreeW
NdrProxyErrorHandler
user32
AppendMenuW
CharPrevA
CharUpperA
DestroyIcon
DestroyWindow
DialogBoxIndirectParamA
DialogBoxParamA
DispatchMessageA
DrawTextA
EnableWindow
EndDialog
GetClientRect
GetDC
GetDlgItem
GetSysColor
GetWindowLongA
GetWindowRect
GetWindowTextA
InvalidateRect
IsDialogMessageA
LoadStringA
MessageBoxA
MsgWaitForMultipleObjects
PeekMessageA
ReleaseDC
SendDlgItemMessageA
SendMessageA
SetDlgItemTextA
SetWindowPos
SetWindowTextA
ShowWindow
TranslateMessage
wsprintfA
BeginDeferWindowPos
CallWindowProcW
CharNextW
CharPrevW
CharUpperW
CheckMenuItem
CheckRadioButton
ClientToScreen
CreateDialogParamW
CreateWindowExA
DefDlgProcW
DefWindowProcW
DeferWindowPos
DestroyMenu
DialogBoxParamW
DispatchMessageW
DrawTextW
EndDeferWindowPos
FillRect
GetDesktopWindow
GetKeyState
GetLastActivePopup
GetParent
GetSystemMetrics
GetWindowDC
GetWindowLongW
IsWindow
IsWindowEnabled
LoadCursorW
LoadIconW
LoadStringW
MapWindowPoints
OffsetRect
PostMessageW
RedrawWindow
RegisterClassExW
ScrollWindow
SendMessageW
SetCursor
SetDlgItemTextW
SetFocus
SetForegroundWindow
SetWindowLongA
SetWindowLongW
SetWindowTextW
SwitchToThisWindow
UpdateWindow
WinHelpW
SetUserObjectInformationW
ValidateRect
WindowFromPoint
DlgDirSelectExW
DrawCaption
GetPriorityClipboardFormat
ShowWindowAsync
UnregisterDeviceNotification
wsprintfW
CharNextA
SystemParametersInfoA
GetForegroundWindow
ModifyMenuW
SystemParametersInfoW
CharLowerW
CreateWindowExW
GetMessageW
PostThreadMessageW
RegisterDeviceNotificationW
UnregisterClassW
CharUpperBuffA
DefWindowProcA
EnumThreadWindows
FreeDDElParam
GetClipboardData
GetDlgItemTextA
GetPropA
GetWindowThreadProcessId
IsClipboardFormatAvailable
KillTimer
PostMessageA
RegisterClassA
RegisterClipboardFormatA
RemovePropA
SetClipboardData
SetPropA
SetTimer
UnpackDDElParam
UnregisterClassA
Sections
.text Size: 344KB - Virtual size: 343KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 300KB - Virtual size: 296KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 312KB - Virtual size: 324KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE