Static task
static1
Behavioral task
behavioral1
Sample
f5c698fdba3cbdf262c5fc0f831d89d0f896599d3903fcc093cbf790906da2b4.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f5c698fdba3cbdf262c5fc0f831d89d0f896599d3903fcc093cbf790906da2b4.exe
Resource
win10v2004-20221111-en
General
-
Target
f5c698fdba3cbdf262c5fc0f831d89d0f896599d3903fcc093cbf790906da2b4
-
Size
382KB
-
MD5
1bacf18aa4f3bf018d813db2b9e08910
-
SHA1
c0f5cee26b17d3ee36dd313d98bffd80a68f215b
-
SHA256
f5c698fdba3cbdf262c5fc0f831d89d0f896599d3903fcc093cbf790906da2b4
-
SHA512
fe92ddd80d5620cc9ffe86671bd59dc68bbd382ec69ca7f49daa0425446d1d849192935f5bdc03c4ed14809843a4eae0c12e43d2a382e9b609a3b1911faec0ad
-
SSDEEP
6144:qrgxjtjG2WpkYNBy6RicWpInxmuXs9+8tyi8E1FJkJ/nmI7EdaanSLc:qn2W7WpIQ9+3i8Lnm
Malware Config
Signatures
Files
-
f5c698fdba3cbdf262c5fc0f831d89d0f896599d3903fcc093cbf790906da2b4.exe windows x86
9914994fadd4f3ecf64d61f41aaca6f9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
wininet
InternetCloseHandle
InternetOpenA
InternetSetStatusCallback
InternetSetFilePointer
InternetWriteFile
InternetReadFile
FtpOpenFileA
InternetConnectA
InternetGetLastResponseInfoA
FtpGetCurrentDirectoryA
InternetSetOptionExA
InternetQueryDataAvailable
FtpCreateDirectoryA
FtpSetCurrentDirectoryA
kernel32
GetOEMCP
SetErrorMode
GetFileAttributesA
GetFileSizeEx
GetFileTime
WritePrivateProfileStringA
RtlUnwind
GetSystemTimeAsFileTime
GetTimeFormatA
GetDateFormatA
HeapFree
RaiseException
Sleep
ExitProcess
GetCommandLineA
GetStartupInfoA
HeapAlloc
VirtualAlloc
HeapReAlloc
ExitThread
CreateThread
HeapSize
SetStdHandle
TerminateProcess
GetCPInfo
SetUnhandledExceptionFilter
IsDebuggerPresent
GetACP
IsValidCodePage
GetTimeZoneInformation
LCMapStringA
LCMapStringW
HeapCreate
VirtualFree
GetStringTypeA
GetStringTypeW
GetStdHandle
InitializeCriticalSectionAndSpinCount
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
QueryPerformanceCounter
GetConsoleCP
GetConsoleMode
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CompareStringW
SetEnvironmentVariableA
GlobalFlags
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
GlobalHandle
GlobalReAlloc
TlsGetValue
InterlockedIncrement
GetModuleHandleW
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesA
InterlockedExchange
lstrcmpA
LocalAlloc
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
FileTimeToLocalFileTime
GetFullPathNameA
GetVolumeInformationA
FindFirstFileA
FindClose
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SuspendThread
InterlockedDecrement
GetModuleFileNameW
GetCurrentProcessId
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
CompareStringA
lstrcmpW
GetVersionExA
FreeResource
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageA
LocalFree
GetLocalTime
SystemTimeToFileTime
UnmapViewOfFile
GetCurrentProcess
DuplicateHandle
CreateFileMappingA
MapViewOfFile
GetFileType
GetFileInformationByHandle
SetFilePointer
FileTimeToDosDateTime
FileTimeToSystemTime
WinExec
GetModuleHandleA
GetProcAddress
GetLastError
SetLastError
WriteFile
lstrlenA
WaitForSingleObject
CreateEventA
MultiByteToWideChar
GetTickCount
SetEvent
lstrcpynA
lstrcpyA
GetLocaleInfoA
GetNumberFormatA
MulDiv
GetSystemDirectoryA
GetTempPathA
ResumeThread
SetThreadPriority
GetWindowsDirectoryA
LoadLibraryA
FreeLibrary
DeleteFileA
GetPrivateProfileStringA
GetModuleFileNameA
CreateFileA
GetFileSize
ReadFile
CloseHandle
WideCharToMultiByte
LoadResource
LockResource
SizeofResource
FindResourceA
CopyFileA
UnhandledExceptionFilter
user32
CharUpperA
GetMessageA
ValidateRect
GetWindowThreadProcessId
GetCursorPos
WindowFromPoint
EndPaint
BeginPaint
ClientToScreen
ShowWindow
SetWindowTextA
IsDialogMessageA
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
ModifyMenuA
EnableMenuItem
CheckMenuItem
WinHelpA
GetCapture
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassNameA
SetPropA
GetPropA
RemovePropA
SetFocus
GetWindowTextLengthA
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
GetTopWindow
GetMessageTime
MapWindowPoints
GetKeyState
SetMenu
SetForegroundWindow
IsWindowVisible
MessageBoxA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
CopyRect
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
GetMenu
SetWindowPos
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindow
GetDesktopWindow
GetActiveWindow
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
GetWindowLongA
GetDlgItem
IsWindowEnabled
GetNextDlgTabItem
EndDialog
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
UpdateWindow
DrawEdge
GetFocus
RegisterWindowMessageA
GetParent
UnregisterClassA
DestroyMenu
GetSysColorBrush
UnhookWindowsHookEx
KillTimer
ReleaseDC
GetDC
MessageBeep
SetWindowLongA
InvalidateRect
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
InflateRect
RedrawWindow
GetClientRect
DrawIcon
FillRect
GetSystemMetrics
GetSysColor
IsWindow
PostMessageA
MsgWaitForMultipleObjects
GetAsyncKeyState
PeekMessageA
TranslateMessage
DispatchMessageA
wsprintfA
LoadIconA
SetTimer
ScreenToClient
PtInRect
LoadCursorA
CopyIcon
GetMessagePos
SetCursor
DestroyCursor
EnableWindow
LockWindowUpdate
GetWindowRect
SendMessageA
PostQuitMessage
CreateWindowExA
SendDlgItemMessageA
gdi32
SetWindowOrgEx
SetWindowExtEx
ScaleWindowExtEx
ScaleViewportExtEx
OffsetViewportOrgEx
CreatePen
SetViewportExtEx
SetViewportOrgEx
SelectObject
SelectClipRgn
DeleteObject
GetObjectA
CreateFontIndirectA
MoveToEx
LineTo
SetMapMode
SetBkMode
RestoreDC
SaveDC
CreateBitmap
SetBkColor
SetTextColor
GetClipBox
CreateRectRgn
CreateSolidBrush
GetCurrentObject
Escape
GetTextExtentPoint32A
ExtTextOutA
TextOutA
BitBlt
RectVisible
PtVisible
GetBkColor
CreateCompatibleDC
CreateCompatibleBitmap
GetStockObject
CreateDCA
GetDeviceCaps
DeleteDC
comdlg32
GetFileTitleA
winspool.drv
DocumentPropertiesA
OpenPrinterA
ClosePrinter
advapi32
RegSetValueExA
RegCreateKeyExA
RegEnumKeyA
RegDeleteKeyA
RegOpenKeyA
RegQueryValueA
RegQueryInfoKeyA
RegEnumValueA
RegEnumKeyExA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
shell32
SHGetFileInfoA
ExtractIconA
ShellExecuteExA
ShellExecuteA
shlwapi
PathStripToRootA
PathIsUNCA
PathFindFileNameA
PathFindExtensionA
ole32
ProgIDFromCLSID
CoTaskMemFree
StringFromGUID2
oleaut32
SysAllocStringByteLen
SysStringByteLen
SysFreeString
SysAllocString
SysStringLen
VariantClear
VariantChangeType
VariantInit
rpcrt4
UuidCreate
UuidFromStringA
UuidCompare
UuidHash
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
Sections
.text Size: 265KB - Virtual size: 265KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 58KB - Virtual size: 58KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 48KB - Virtual size: 50KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
zcquoli Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE