Static task
static1
Behavioral task
behavioral1
Sample
b66336e6dfdf4dd2739267212445a2bce980b67f3f2ccfd4ed56b1f6a4ee89a0.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b66336e6dfdf4dd2739267212445a2bce980b67f3f2ccfd4ed56b1f6a4ee89a0.exe
Resource
win10v2004-20220812-en
General
-
Target
b66336e6dfdf4dd2739267212445a2bce980b67f3f2ccfd4ed56b1f6a4ee89a0
-
Size
2.5MB
-
MD5
0946d4c847139d1ce187a423014d9560
-
SHA1
c6fa8ffc0887488458a2415216296c99aecf6e92
-
SHA256
b66336e6dfdf4dd2739267212445a2bce980b67f3f2ccfd4ed56b1f6a4ee89a0
-
SHA512
eb2530ef3b441ada4693e3507aa50e2965491ab62114a6bed06484c73a44c3220a5448d2da982688829b0ce45558eac260273644b868cb465dfa255ac3ada7b7
-
SSDEEP
49152:EMPSTKJVC0Tk590jxAMAhT0zmkpQb8aPFp0mHzSVCy:GOJVCXaAMFmkO4Lm6
Malware Config
Signatures
Files
-
b66336e6dfdf4dd2739267212445a2bce980b67f3f2ccfd4ed56b1f6a4ee89a0.exe windows x86
ee44f949819a54032a0d9567f0c9dfaa
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
TlsAlloc
TlsSetValue
LocalReAlloc
TlsFree
GetFileAttributesW
SetErrorMode
GetTickCount
GetStartupInfoW
HeapFree
CreateDirectoryW
GetSystemTimeAsFileTime
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapAlloc
RtlUnwind
RaiseException
HeapReAlloc
ExitProcess
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
ExitThread
HeapSize
SetStdHandle
GetFileType
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
TlsGetValue
GetStartupInfoA
HeapCreate
GlobalHandle
QueryPerformanceCounter
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
LCMapStringW
InitializeCriticalSectionAndSpinCount
GetConsoleCP
GetConsoleMode
LCMapStringA
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
GetCurrentDirectoryA
GetDriveTypeA
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEnvironmentVariableA
GlobalFlags
LocalAlloc
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
GetModuleHandleA
FindNextChangeNotification
FindFirstChangeNotificationW
FindCloseChangeNotification
VirtualFree
GlobalReAlloc
GetFullPathNameW
FindFirstFileW
DuplicateHandle
GetFileSize
UnlockFile
LockFile
FlushFileBuffers
GetThreadLocale
SuspendThread
ResumeThread
SetThreadPriority
GetCurrentProcessId
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesW
lstrcmpA
GetLocaleInfoW
LoadLibraryExW
CompareStringA
InterlockedExchange
GetCurrentThreadId
GlobalAddAtomW
GlobalFindAtomW
GlobalDeleteAtom
CompareStringW
lstrcmpW
GetVersionExA
GlobalAlloc
FormatMessageW
LocalFree
MulDiv
GetPrivateProfileStringW
WritePrivateProfileStringW
SetLastError
GlobalLock
GlobalUnlock
GlobalFree
GetTimeZoneInformation
LoadLibraryA
DeviceIoControl
CreateFileA
GetCurrentProcess
CreateFileMappingW
UnmapViewOfFile
MapViewOfFile
GetFileInformationByHandle
WaitForMultipleObjects
ResetEvent
ReleaseMutex
CreateEventW
CreateMutexW
SetWaitableTimer
SleepEx
CancelWaitableTimer
QueueUserAPC
CreateThread
CreateWaitableTimerW
FreeLibrary
GetProcAddress
LoadLibraryW
LocalFileTimeToFileTime
SystemTimeToFileTime
GetSystemTime
WriteFile
ReadFile
CopyFileExW
SetEndOfFile
SetFilePointer
CreateSemaphoreW
ReleaseSemaphore
GetVolumeInformationW
GetFileTime
FileTimeToLocalFileTime
FileTimeToSystemTime
GetVersionExW
FindClose
FindNextFileW
CloseHandle
GetFileSizeEx
CreateFileW
FindFirstFileExW
GetDiskFreeSpaceW
RemoveDirectoryW
GetModuleFileNameW
WaitForSingleObject
SetEvent
InterlockedDecrement
InterlockedIncrement
GetDriveTypeW
GetLogicalDriveStringsW
MoveFileExW
CopyFileW
SetFileTime
GetFileAttributesExW
SetFileAttributesW
Sleep
FreeResource
GetModuleHandleW
WideCharToMultiByte
lstrlenW
DeleteFileW
GetLastError
MultiByteToWideChar
lstrlenA
FindResourceW
LoadResource
LockResource
SetHandleCount
SizeofResource
user32
GetForegroundWindow
GetLastActivePopup
DispatchMessageW
GetTopWindow
GetMessageTime
GetMessagePos
PeekMessageW
MapWindowPoints
GetKeyState
SetMenu
SetForegroundWindow
IsWindowVisible
UpdateWindow
PostMessageW
MessageBoxW
CreateWindowExW
GetClassInfoExW
GetClassInfoW
RegisterClassW
GetSysColor
AdjustWindowRectEx
EqualRect
EnableWindow
LoadIconW
IsDialogMessageW
GetWindowTextW
GetDlgCtrlID
DefWindowProcW
CallWindowProcW
CopyRect
PtInRect
GetMenu
SetWindowLongW
SetWindowPos
OffsetRect
IntersectRect
IsChild
GetWindowPlacement
GetWindowRect
GetWindow
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
UnhookWindowsHookEx
GetDesktopWindow
GetActiveWindow
SetActiveWindow
CreateDialogIndirectParamW
DestroyWindow
WinHelpW
SendDlgItemMessageA
SendDlgItemMessageW
RegisterWindowMessageW
IsWindow
GetWindowLongW
GetWindowTextLengthW
SetFocus
GetFocus
RemovePropW
GetPropW
SetPropW
GetClassNameW
GetClassLongW
CallNextHookEx
SetWindowsHookExW
GetCapture
SetWindowTextW
MoveWindow
ShowWindow
CheckMenuItem
EnableMenuItem
ModifyMenuW
LoadBitmapW
GetMenuCheckMarkDimensions
SetMenuItemBitmaps
PostQuitMessage
GetWindowThreadProcessId
MapDialogRect
SetWindowContextHelpId
ValidateRect
GetCursorPos
TranslateMessage
GetMessageW
SetCursor
CharUpperW
TabbedTextOutW
DrawTextW
DrawTextExW
GrayStringW
ClientToScreen
GetDC
ReleaseDC
GetWindowDC
SystemParametersInfoA
SendMessageW
IsIconic
GetSystemMetrics
GetClientRect
DrawIcon
BeginPaint
EndPaint
PostThreadMessageW
RegisterClipboardFormatW
MessageBeep
GetNextDlgGroupItem
InvalidateRgn
InvalidateRect
SetRect
IsRectEmpty
CopyAcceleratorTableW
CharNextW
ReleaseCapture
SetCapture
DestroyMenu
LoadCursorW
GetSysColorBrush
UnregisterClassW
SetTimer
KillTimer
EndDialog
GetNextDlgTabItem
GetParent
IsWindowEnabled
GetDlgItem
gdi32
TextOutW
ExtTextOutW
Escape
SelectObject
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
ExtSelectClipRgn
DeleteDC
GetStockObject
RectVisible
GetBkColor
GetTextColor
CreateRectRgnIndirect
GetRgnBox
GetMapMode
PtVisible
GetWindowExtEx
GetViewportExtEx
DeleteObject
SetMapMode
RestoreDC
SaveDC
CreateBitmap
GetObjectW
SetBkColor
SetTextColor
GetClipBox
GetDeviceCaps
comdlg32
GetFileTitleW
winspool.drv
DocumentPropertiesW
ClosePrinter
OpenPrinterW
advapi32
CryptDecrypt
CryptDuplicateKey
CryptDeriveKey
CryptDestroyKey
RegQueryValueW
RegEnumKeyW
RegDeleteKeyW
RegOpenKeyExW
RegCreateKeyExW
RegCloseKey
SetFileSecurityW
GetFileSecurityW
RegDeleteValueW
RegSetValueExW
RegQueryValueExW
RegOpenKeyW
CryptGetHashParam
CryptDestroyHash
CryptHashData
CryptReleaseContext
CryptCreateHash
CryptAcquireContextW
ChangeServiceConfigW
ControlService
StartServiceW
DeleteService
OpenServiceW
CreateServiceW
CloseServiceHandle
OpenSCManagerW
CryptEncrypt
shell32
SHGetMalloc
SHGetPathFromIDListW
SHBrowseForFolderW
SHGetSpecialFolderPathW
SHFileOperationW
comctl32
InitCommonControlsEx
shlwapi
PathStripToRootW
PathFindExtensionW
PathFindFileNameW
PathIsDirectoryEmptyW
PathIsUNCW
PathIsNetworkPathW
PathIsRelativeW
oledlg
OleUIBusyW
ole32
OleIsCurrentClipboard
CoRevokeClassObject
OleInitialize
CoFreeUnusedLibraries
OleUninitialize
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoGetClassObject
CLSIDFromString
CLSIDFromProgID
CoTaskMemAlloc
CoTaskMemFree
OleFlushClipboard
CoRegisterMessageFilter
oleaut32
VariantInit
VariantChangeType
SysAllocStringLen
SysFreeString
SysStringLen
VariantCopy
SafeArrayDestroy
VariantTimeToSystemTime
SystemTimeToVariantTime
OleCreateFontIndirect
SysAllocString
VariantClear
wsock32
WSAGetLastError
select
inet_ntoa
closesocket
getsockname
listen
ntohs
inet_addr
connect
htons
WSASetLastError
accept
gethostbyname
socket
recv
send
setsockopt
WSACleanup
WSAStartup
bind
version
GetFileVersionInfoW
GetFileVersionInfoSizeW
VerQueryValueW
ws2_32
WSAEventSelect
WSACreateEvent
WSAEnumNetworkEvents
WSAWaitForMultipleEvents
WSACloseEvent
mpr
WNetAddConnection2W
Sections
.text Size: 443KB - Virtual size: 443KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 94KB - Virtual size: 93KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 17KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2.0MB - Virtual size: 2.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE