Static task
static1
Behavioral task
behavioral1
Sample
45a50023994263d1b4b5b3eacf5402d5582353e31026733564ba35d2cb72e919.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
45a50023994263d1b4b5b3eacf5402d5582353e31026733564ba35d2cb72e919.exe
Resource
win10v2004-20220812-en
General
-
Target
45a50023994263d1b4b5b3eacf5402d5582353e31026733564ba35d2cb72e919
-
Size
105KB
-
MD5
98c82c84e321b228d9f4134805727dce
-
SHA1
9cf96f5f939db05e4aa9eb56852698c4ecfc5e0e
-
SHA256
45a50023994263d1b4b5b3eacf5402d5582353e31026733564ba35d2cb72e919
-
SHA512
470f64d46ebc8501582ff2d1bc60603a082129df52de0e7607ed5845f157469394360e3fb3d4357a0cfb586edef0d6b32e22dd4cab2b8e4ccbf386950151aaeb
-
SSDEEP
1536:D3tUqq7W3ginVdjO/EMb/+Lik5S+H7O6oad4oM/I4kWDqWSCtB:D3W/IXnLS5r8Sad4oM/lkIqWS6B
Malware Config
Signatures
Files
-
45a50023994263d1b4b5b3eacf5402d5582353e31026733564ba35d2cb72e919.exe windows x86
6835f646dde6fde2a2db6b4bd6d99bef
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
advapi32
FreeSid
RegCloseKey
AllocateAndInitializeSid
GetLengthSid
InitializeAcl
AddAccessAllowedAce
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
RegQueryValueExA
RegisterEventSourceA
ReportEventA
DeregisterEventSource
RegCreateKeyExA
RegDeleteValueA
RegSetValueExA
RegOpenKeyExA
kernel32
CreateSemaphoreA
SetEndOfFile
WaitForMultipleObjectsEx
MapViewOfFile
SetEvent
CreateMutexW
CreateFileW
GetWindowsDirectoryW
GetOverlappedResult
ReadFile
FlushViewOfFile
HeapCreate
HeapAlloc
HeapDestroy
HeapFree
FindNextFileA
FindClose
FindFirstFileA
GetFileAttributesA
GetFileInformationByHandle
CopyFileA
MoveFileA
FlushFileBuffers
MoveFileExA
DeleteFileA
RemoveDirectoryA
CreateDirectoryA
GetDiskFreeSpaceA
WideCharToMultiByte
MultiByteToWideChar
lstrcpyA
lstrlenW
lstrlenA
OutputDebugStringA
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
VirtualAlloc
VirtualFree
LeaveCriticalSection
TlsFree
EnterCriticalSection
TlsSetValue
GetProcAddress
GetModuleHandleA
Sleep
QueryPerformanceFrequency
CloseHandle
CreateMutexA
SetHandleInformation
CreateFileA
ReleaseMutex
WriteFile
SetFilePointer
WaitForSingleObject
LocalFree
LocalAlloc
DuplicateHandle
FreeLibrary
GetModuleFileNameA
VirtualQueryEx
LoadLibraryA
SetThreadAffinityMask
GetProcessAffinityMask
SetThreadIdealProcessor
GetCurrentThread
TlsGetValue
GetSystemDefaultLCID
WaitForSingleObjectEx
ReleaseSemaphore
DeleteCriticalSection
GetVersionExA
GetSystemInfo
InitializeCriticalSection
GetExitCodeThread
TlsAlloc
GlobalMemoryStatus
VirtualQuery
VirtualUnlock
UnmapViewOfFile
MapViewOfFileEx
CreateFileMappingA
GetLastError
SleepEx
ResumeThread
SetThreadPriority
CreateThread
FormatMessageA
CreateEventA
GetSystemPowerStatus
SetConsoleCtrlHandler
GetLocalTime
SetLastError
GetQueuedCompletionStatus
PostQueuedCompletionStatus
CreateIoCompletionPort
GetLocaleInfoA
LCMapStringW
IsValidLocale
GetUserDefaultLCID
GetFileSize
GetCPInfoExW
MapUserPhysicalPages
GetSystemTime
InterlockedExchange
BuildCommDCBA
GetCurrencyFormatW
GetLogicalDriveStringsA
EnumDateFormatsExW
SetWaitableTimer
GetCompressedFileSizeW
ReadConsoleOutputCharacterW
GetFullPathNameA
GetFileAttributesExA
SetCommState
SetCommBreak
SetInformationJobObject
GetCommMask
SetPriorityClass
GetProcessHeaps
GlobalAddAtomW
SetFileApisToOEM
SystemTimeToTzSpecificLocalTime
SetConsoleScreenBufferSize
DeviceIoControl
GetLogicalDriveStringsW
ReadProcessMemory
MoveFileWithProgressA
_llseek
GetNumberOfConsoleMouseButtons
MapUserPhysicalPagesScatter
DeleteTimerQueueEx
ScrollConsoleScreenBufferW
VDMOperationStarted
FillConsoleOutputAttribute
GetVolumePathNamesForVolumeNameW
Process32Next
GetConsoleTitleA
GetProfileIntW
GenerateConsoleCtrlEvent
AddRefActCtx
WriteConsoleW
InitializeCriticalSectionAndSpinCount
RequestDeviceWakeup
GetTempPathW
FreeUserPhysicalPages
RegisterConsoleVDM
Module32First
GetEnvironmentStringsA
GetEnvironmentVariableW
Module32FirstW
GetTempPathA
CreateDirectoryExA
FindFirstVolumeW
SetVolumeLabelA
GlobalMemoryStatusEx
CancelTimerQueueTimer
GetNumberFormatW
UnlockFileEx
GetLargestConsoleWindowSize
_hread
BaseCleanupAppcompatCacheSupport
ExpungeConsoleCommandHistoryW
SwitchToThread
SetLocaleInfoA
GetCurrentDirectoryA
ExitThread
msvcrt
malloc
_initterm
free
_onexit
__dllonexit
wcsrchr
strcspn
_fullpath
_mbsnbicmp
wcscat
time
_mbsicmp
_mbspbrk
_mbsrchr
_mbstok
strpbrk
strtok
_strupr
srand
rand
strtoul
_snprintf
sscanf
_splitpath
_makepath
_mbscspn
_vsnprintf
strncpy
_itow
_strnicmp
swprintf
vsprintf
vprintf
_iob
_itoa
printf
isprint
wcscpy
memmove
fopen
fprintf
fflush
fclose
_ultoa
strchr
_stricmp
wcslen
sprintf
atol
modf
_purecall
user32
MessageBoxA
GetClassLongA
AllowForegroundActivation
SetCursor
RegisterClassW
ImpersonateDdeClientWindow
DialogBoxParamW
CreateWindowExA
GetClassLongW
TileWindows
CharLowerBuffW
GetProcessDefaultLayout
DrawTextExA
IsDlgButtonChecked
GetSystemMenu
SetScrollPos
ReuseDDElParam
GetTitleBarInfo
LoadKeyboardLayoutEx
RecordShutdownReason
CloseClipboard
TranslateMessage
MoveWindow
OpenWindowStationW
DrawTextExW
SendNotifyMessageW
GetMessageTime
IsDialogMessageW
CopyIcon
RegisterMessagePumpHook
DestroyCursor
GetAsyncKeyState
HiliteMenuItem
SetSystemMenu
GetWindowTextLengthW
PostMessageA
GetClipboardSequenceNumber
MapVirtualKeyW
SetTaskmanWindow
SetDlgItemInt
LoadAcceleratorsA
SetClassLongW
ScrollWindow
LoadImageW
DeferWindowPos
SetUserObjectInformationA
DdeReconnect
GetKeyboardLayoutNameW
ChangeMenuA
ResolveDesktopForWOW
GetUserObjectInformationW
LoadStringA
DdeUnaccessData
UnregisterUserApiHook
AdjustWindowRectEx
LockWindowUpdate
ScreenToClient
AppendMenuA
GetClientRect
EnumDisplaySettingsW
WINNLSGetIMEHotkey
GetDialogBaseUnits
ModifyMenuA
SetWindowLongA
GetDesktopWindow
ScrollWindowEx
mouse_event
SetRectEmpty
GetKeyNameTextW
MessageBoxTimeoutW
LoadBitmapA
GetCaretPos
SetShellWindowEx
GetMenuContextHelpId
GetMenuItemInfoW
DdeQueryNextServer
AppendMenuW
RegisterClipboardFormatA
CharToOemBuffW
IsCharUpperA
SwapMouseButton
CallMsgFilterA
InvalidateRgn
SetPropA
GetCursorFrameInfo
CheckDlgButton
DdeAbandonTransaction
SetDeskWallpaper
RegisterClassA
ModifyMenuW
PackDDElParam
OemToCharBuffW
DefMDIChildProcW
DestroyWindow
MonitorFromWindow
KillTimer
GetDlgItemTextW
GrayStringW
ActivateKeyboardLayout
GetScrollRange
GetTopWindow
CreateMenu
GetClipCursor
gdi32
EngGetDriverName
GdiInitializeLanguagePack
GetBoundsRect
CreateRoundRectRgn
GetBkMode
SetEnhMetaFileBits
EngGetPrinterDataFileName
ExtFloodFill
GdiGetBatchLimit
GetGraphicsMode
GdiEntry5
GetRandomRgn
GetRgnBox
Escape
GdiGetLocalFont
SetWindowExtEx
PtVisible
GetCharABCWidthsFloatA
GdiResetDCEMF
DrawEscape
GdiConsoleTextOut
DdEntry19
EngCheckAbort
SetViewportOrgEx
CreateRectRgn
EudcUnloadLinkW
GdiConvertBitmapV5
EngDeleteClip
EnumFontsA
GetClipRgn
StrokeAndFillPath
CreateFontIndirectA
GetNearestColor
GetLayout
BRUSHOBJ_pvAllocRbrush
RoundRect
GetCharABCWidthsW
GdiStartDocEMF
gdiPlaySpoolStream
StretchDIBits
ExtCreatePen
SetStretchBltMode
SetICMProfileW
DdEntry24
GdiConvertAndCheckDC
GetTextExtentPointA
GetObjectA
GdiAddGlsRecord
DeleteMetaFile
CreateSolidBrush
DdEntry21
GetPath
EngAcquireSemaphore
PlgBlt
ModifyWorldTransform
GetTextExtentExPointI
GetETM
SetFontEnumeration
DdEntry34
CreateICW
DdEntry31
GdiAddGlsBounds
bInitSystemAndFontsDirectoriesW
GdiEntry13
GetEnhMetaFileHeader
GdiDeleteSpoolFileHandle
GetCharWidthW
PlayMetaFile
STROBJ_vEnumStart
CreateHalftonePalette
GdiDeleteLocalDC
GdiConvertRegion
Polyline
GdiGetSpoolMessage
SetBoundsRect
GetRelAbs
DdEntry20
DdEntry49
EnumICMProfilesW
ArcTo
GdiAddFontResourceW
GetROP2
ColorMatchToTarget
CreateDIBitmap
EngAssociateSurface
PolylineTo
Sections
.text Size: 22KB - Virtual size: 22KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 58KB - Virtual size: 246KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ