Static task
static1
Behavioral task
behavioral1
Sample
69f44d923ca48cd5d87bdbcff45722380cf73913cc3160a9f15d0e80b1f9e281.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
69f44d923ca48cd5d87bdbcff45722380cf73913cc3160a9f15d0e80b1f9e281.exe
Resource
win10v2004-20220812-en
General
-
Target
69f44d923ca48cd5d87bdbcff45722380cf73913cc3160a9f15d0e80b1f9e281
-
Size
8.8MB
-
MD5
0a8311511193437502e9fb51245f8e0f
-
SHA1
101b3b9f728ee183cda3e39521f36b86701a871c
-
SHA256
69f44d923ca48cd5d87bdbcff45722380cf73913cc3160a9f15d0e80b1f9e281
-
SHA512
5ad812125f82de9863a92c6137874e167eb83a5820bef203a57945294b215e8c07db33ec2eaf51df30850355cda0c8a42b3b01f0dc866316c5a60f5510d0d880
-
SSDEEP
196608:syTWAD2a1knX4Y0mUK5hx4w7/vNpsZQCpC2Og7Dmq:3SmWaAnNpsGb4mq
Malware Config
Signatures
Files
-
69f44d923ca48cd5d87bdbcff45722380cf73913cc3160a9f15d0e80b1f9e281.exe windows x86
cb2741bcd0013a7ef9b7dda2958cd242
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
d3dx9_43
D3DXCreateTextureFromFileInMemoryEx
D3DXCreateVolumeTextureFromFileInMemoryEx
D3DXCreateCubeTextureFromFileInMemoryEx
D3DXCreateFontA
D3DXSaveSurfaceToFileA
D3DXGetImageInfoFromFileInMemory
D3DXCreateTextureFromFileInMemory
d3d9
Direct3DCreate9
kernel32
GetFileTime
ReadFile
WriteFile
GetFileSize
CreateFileW
DeleteCriticalSection
GetTimeZoneInformation
GetOEMCP
GetACP
GetTickCount
GetLocalTime
GetSystemTime
SystemTimeToFileTime
SetEnvironmentVariableA
CompareStringW
CompareStringA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
GetStringTypeW
GetStringTypeA
GetLocaleInfoA
GetProcessHeap
SetEndOfFile
FlushFileBuffers
HeapReAlloc
VirtualAlloc
SetStdHandle
VirtualFree
HeapCreate
FormatMessageA
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetConsoleMode
GetConsoleCP
FileTimeToLocalFileTime
CreateThread
CreateFileA
GetFileAttributesA
CreateDirectoryA
SetFileAttributesW
CreateDirectoryW
GetFileAttributesW
SetFilePointer
DeleteFileW
MoveFileW
GetTempPathA
GetTempPathW
GetCurrentDirectoryW
GetFullPathNameW
LocalFree
GetLastError
GetCurrentProcessId
FreeLibrary
ExitProcess
GetModuleHandleA
GetEnvironmentStringsW
GetComputerNameA
InterlockedIncrement
InitializeCriticalSection
SizeofResource
IsValidCodePage
GetStdHandle
SetHandleCount
HeapSize
SetLastError
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetCPInfo
LCMapStringW
LCMapStringA
GetModuleHandleW
GetFileType
HeapAlloc
HeapFree
RaiseException
RtlUnwind
GetStartupInfoA
GetCommandLineA
UnhandledExceptionFilter
ExitThread
GetSystemTimeAsFileTime
InterlockedDecrement
SetUnhandledExceptionFilter
CreateFileMappingA
GetSystemInfo
MapViewOfFile
UnmapViewOfFile
MulDiv
VirtualQuery
DuplicateHandle
GetCurrentThread
TryEnterCriticalSection
InterlockedExchangeAdd
InterlockedExchange
IsDebuggerPresent
InitializeCriticalSectionAndSpinCount
WideCharToMultiByte
QueryPerformanceCounter
QueryPerformanceFrequency
GetCurrentThreadId
LockResource
LoadResource
FindResourceA
SetFileAttributesA
GetProcAddress
MoveFileA
DeleteFileA
SetConsoleTitleA
AllocConsole
Sleep
GlobalAlloc
GlobalUnlock
GlobalLock
GetCurrentProcess
TerminateProcess
GetCurrentDirectoryA
GetFullPathNameA
CreateEventA
SetEvent
OutputDebugStringA
OpenEventA
LeaveCriticalSection
EnterCriticalSection
CloseHandle
TerminateThread
WaitForSingleObject
GetVersionExA
GlobalMemoryStatusEx
CopyFileA
GetModuleFileNameA
MultiByteToWideChar
LoadLibraryA
user32
SetFocus
MessageBoxA
LoadIconA
GetClientRect
ClientToScreen
ShowCursor
PostQuitMessage
RegisterClassA
CreateWindowExA
GetActiveWindow
InvalidateRect
UpdateWindow
BeginPaint
EndPaint
LoadCursorA
LoadStringW
SetRect
AdjustWindowRect
GetWindowLongA
SetWindowPos
ClipCursor
ReleaseCapture
GetCursorPos
GetWindowRect
SetCapture
DefWindowProcA
SendMessageA
SetWindowLongA
SetWindowTextA
ShowWindow
PeekMessageA
GetMessageA
TranslateMessage
DispatchMessageA
GetCaretBlinkTime
GetFocus
GetKeyState
OpenClipboard
GetClipboardData
CloseClipboard
GetAsyncKeyState
SwitchToThisWindow
gdi32
SetTextColor
SetBkColor
DeleteObject
GetTextExtentPoint32A
SetMapMode
CreateDIBSection
SetTextAlign
SelectObject
DeleteDC
GetDeviceCaps
CreateICA
GetStockObject
CreateFontA
CreateCompatibleDC
LineTo
MoveToEx
ExtTextOutA
CreatePen
advapi32
GetUserNameA
RegQueryValueExA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
CryptAcquireContextA
CryptReleaseContext
CryptGenRandom
CryptExportKey
CryptDestroyKey
CryptGetUserKey
CryptEnumProvidersA
CryptGetProvParam
CryptAcquireContextW
RegOpenKeyExA
shell32
ShellExecuteA
SHGetFolderPathA
ole32
CoCreateInstance
CoInitializeEx
CoInitialize
oleaut32
SysAllocString
SysFreeString
iphlpapi
GetAdaptersInfo
dbghelp
MakeSureDirectoryPathExists
MiniDumpWriteDump
ws2_32
setsockopt
ioctlsocket
WSAGetLastError
socket
WSAStartup
ntohs
inet_ntoa
getsockname
gethostbyname
inet_addr
htons
connect
select
__WSAFDIsSet
bind
closesocket
shutdown
send
recv
dinput8
DirectInput8Create
crypt32
CertGetCertificateContextProperty
CryptDecodeObject
CertSetCertificateContextProperty
CertDuplicateCertificateContext
CertNameToStrW
CertFreeCertificateContext
CertCreateCertificateContext
CryptEncryptMessage
CryptEncodeObject
CertEnumCertificatesInStore
CertCloseStore
CertOpenStore
CertGetSubjectCertificateFromStore
CryptMsgControl
CryptMsgGetParam
CryptMsgClose
CryptMsgUpdate
CryptMsgOpenToDecode
CryptDecryptMessage
Sections
.text Size: 1.8MB - Virtual size: 1.8MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 710KB - Virtual size: 710KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 96KB - Virtual size: 784KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6.0MB - Virtual size: 6.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 159KB - Virtual size: 159KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.rmnet Size: 56KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE