Static task
static1
Behavioral task
behavioral1
Sample
c24622edde82c8850a3baab9b34a05b38ee4c530a869a10dbee3e5def7cfa9d7.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c24622edde82c8850a3baab9b34a05b38ee4c530a869a10dbee3e5def7cfa9d7.exe
Resource
win10v2004-20220812-en
General
-
Target
c24622edde82c8850a3baab9b34a05b38ee4c530a869a10dbee3e5def7cfa9d7
-
Size
986KB
-
MD5
644c8350ef3a229e7a210205c3724825
-
SHA1
9c4f99417cf81c350856c5f226ce79b0af17402b
-
SHA256
c24622edde82c8850a3baab9b34a05b38ee4c530a869a10dbee3e5def7cfa9d7
-
SHA512
3fe10f8f76965f74d954a84bc181cbcf388f83a2d40d45a8bf96a6b3f570200de2186d6fad7108a6e7c186f37cb1f6b04dfb26847a666aad1bd5d693f79b84f9
-
SSDEEP
24576:Yj4Wxc0mdmxpo1ZsFgUsQDhaznvDmQD9p+Bxztdq2k:84Wxc10po4BrharvDmQD/+BM2k
Malware Config
Signatures
Files
-
c24622edde82c8850a3baab9b34a05b38ee4c530a869a10dbee3e5def7cfa9d7.exe windows x86
352901fd84ca3435d9c87671597e04a4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_ISOLATION
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
version
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
psapi
GetModuleInformation
GetModuleFileNameExW
GetMappedFileNameW
wintrust
WTHelperProvDataFromStateData
WinVerifyTrust
crypt32
CertNameToStrW
kernel32
GlobalFlags
LeaveCriticalSection
TlsGetValue
EnterCriticalSection
GlobalReAlloc
GlobalHandle
InitializeCriticalSection
TlsAlloc
TlsSetValue
LocalReAlloc
DeleteCriticalSection
TlsFree
InterlockedIncrement
lstrlenA
FlushFileBuffers
SetErrorMode
GetStartupInfoW
HeapReAlloc
GetCurrentThread
RaiseException
ExitProcess
HeapSize
SetUnhandledExceptionFilter
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetStartupInfoA
HeapCreate
QueryPerformanceCounter
GetSystemTimeAsFileTime
TerminateProcess
UnhandledExceptionFilter
IsDebuggerPresent
GetCPInfo
GetOEMCP
IsValidCodePage
LCMapStringW
LCMapStringA
InitializeCriticalSectionAndSpinCount
GetStringTypeA
GetStringTypeW
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetConsoleCP
GetConsoleMode
SetEnvironmentVariableA
SetEnvironmentVariableW
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CreateFileA
ConvertDefaultLocale
EnumResourceLanguagesW
lstrcmpA
GetLocaleInfoW
InterlockedExchange
GetModuleHandleA
InterlockedDecrement
MulDiv
lstrlenW
GlobalAddAtomW
GlobalFindAtomW
GlobalDeleteAtom
CompareStringW
LoadLibraryA
lstrcmpW
GetVersionExA
FreeResource
TerminateThread
GlobalFree
GlobalAlloc
WideCharToMultiByte
LocalFileTimeToFileTime
SystemTimeToFileTime
WritePrivateProfileStringW
GetComputerNameW
GlobalMemoryStatusEx
GetPrivateProfileStringW
SetCurrentDirectoryW
HeapAlloc
LocalFree
FileTimeToLocalFileTime
GetCurrentThreadId
GetSystemInfo
Module32NextW
Module32FirstW
GetLongPathNameW
FindCloseChangeNotification
FindNextChangeNotification
FindFirstChangeNotificationW
GetExitCodeProcess
GetTempPathW
GetFileAttributesW
CreateProcessW
GetACP
MultiByteToWideChar
GetCurrentDirectoryW
GetLocalTime
FormatMessageW
GlobalUnlock
GlobalLock
GetSystemWindowsDirectoryW
CreateDirectoryW
GetDiskFreeSpaceExW
Sleep
Beep
CopyFileW
VirtualFree
GetDiskFreeSpaceW
VirtualAlloc
DeviceIoControl
ReadProcessMemory
CreateRemoteThread
VirtualFreeEx
WriteProcessMemory
VirtualAllocEx
MoveFileW
Thread32Next
OpenThread
Thread32First
ReadFile
SuspendThread
GetSystemDirectoryW
ResumeThread
SetThreadPriority
OpenProcess
CreateThread
GetCurrentProcess
DuplicateHandle
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
GetCurrentProcessId
VirtualQueryEx
QueryDosDeviceW
WaitForSingleObject
CompareFileTime
GetProcessHeap
HeapFree
SetLastError
VirtualProtect
UnmapViewOfFile
GetProcAddress
MapViewOfFile
CreateFileMappingW
LocalAlloc
SetFilePointer
MoveFileExW
LoadLibraryW
GetCommandLineW
GetModuleFileNameW
GetVersionExW
FreeLibrary
LoadLibraryExW
CreateFileW
GetPrivateProfileIntW
GetTickCount
WriteFile
CloseHandle
GetFileSize
GetModuleHandleW
DeleteFileW
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
GetLastError
FindResourceW
LoadResource
LockResource
SizeofResource
RemoveDirectoryW
SetFileAttributesW
GetVolumeInformationW
GetDriveTypeW
GetLogicalDriveStringsW
FindClose
FindNextFileW
FindFirstFileW
RtlUnwind
user32
WindowFromPoint
GetMessageW
GetCursorPos
ValidateRect
PostQuitMessage
EndPaint
BeginPaint
ClientToScreen
GrayStringW
DrawTextExW
DrawTextW
TabbedTextOutW
ReleaseDC
GetDC
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapW
ModifyMenuW
GetMenuState
CheckMenuItem
SetWindowTextW
IsDlgButtonChecked
CheckDlgButton
RegisterWindowMessageW
LoadIconW
SendDlgItemMessageW
SendDlgItemMessageA
WinHelpW
GetCapture
GetClassLongW
SetPropW
GetPropW
RemovePropW
SetFocus
GetWindowTextLengthW
GetWindowTextW
GetLastActivePopup
GetMessageTime
GetMessagePos
SetMenu
UpdateWindow
GetMenuItemID
GetMenuItemCount
CreateWindowExW
GetClassInfoW
RegisterClassW
AdjustWindowRectEx
ScreenToClient
LoadCursorW
GetDlgCtrlID
DefWindowProcW
CallWindowProcW
CopyRect
GetMenu
SystemParametersInfoA
GetSubMenu
GetActiveWindow
SetActiveWindow
CreateDialogIndirectParamW
DestroyWindow
IsWindowEnabled
GetNextDlgTabItem
EndDialog
GetDesktopWindow
keybd_event
SendInput
OpenInputDesktop
GetSysColor
SetClipboardData
EmptyClipboard
ExitWindowsEx
UnregisterHotKey
EnableMenuItem
BringWindowToTop
ShowWindow
IsIconic
RegisterHotKey
GetSystemMetrics
EnumDisplayMonitors
WaitForInputIdle
EnumWindows
EnumDesktopWindows
EnumChildWindows
GetWindowThreadProcessId
IntersectRect
IsWindow
SetWindowPos
GetWindow
GetClassNameW
GetTopWindow
CloseClipboard
GetClipboardData
OpenClipboard
MessageBoxW
SetCursor
DispatchMessageW
TranslateMessage
IsDialogMessageW
PeekMessageW
GetCursor
CloseDesktop
SwitchDesktop
SetThreadDesktop
CreateDesktopW
OpenDesktopW
SetWindowLongW
GetWindowLongW
GetDlgItem
UnhookWindowsHookEx
IsWindowVisible
UnregisterClassW
GetMonitorInfoW
MonitorFromWindow
RedrawWindow
SetWindowsHookExW
GetForegroundWindow
CallNextHookEx
GetParent
PostMessageW
DestroyMenu
TrackPopupMenu
InsertMenuItemW
CreatePopupMenu
SetForegroundWindow
FindWindowW
MapWindowPoints
GetClientRect
DestroyIcon
LockWindowUpdate
GetFocus
GetKeyState
PtInRect
GetWindowRect
SendMessageW
EnableWindow
GetSysColorBrush
GetWindowPlacement
GetClassInfoExW
gdi32
GetStockObject
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
Escape
ExtTextOutW
TextOutW
RectVisible
PtVisible
BitBlt
CreateDCW
DeleteDC
DeleteObject
StretchBlt
SetBrushOrgEx
SetStretchBltMode
SelectObject
SetDIBits
CreateCompatibleBitmap
CreateCompatibleDC
SetMapMode
RestoreDC
SaveDC
GetDeviceCaps
CreateBitmap
GetObjectW
SetBkColor
SetTextColor
GetClipBox
GetDIBits
winspool.drv
OpenPrinterW
DocumentPropertiesW
ClosePrinter
advapi32
RegCreateKeyExW
RegQueryValueW
RegOpenKeyW
UnlockServiceDatabase
LockServiceDatabase
QueryServiceLockStatusW
CreateProcessAsUserW
OpenSCManagerW
DuplicateTokenEx
ConvertSidToStringSidW
LookupAccountSidW
GetTokenInformation
RegReplaceKeyW
RegRestoreKeyW
RegSaveKeyW
RegLoadKeyW
RegUnLoadKeyW
RegDeleteValueW
RegDeleteKeyW
RegEnumKeyW
RegSetKeySecurity
SetSecurityDescriptorOwner
RegOpenKeyExW
AdjustTokenPrivileges
LookupPrivilegeValueW
OpenProcessToken
ControlService
EnumDependentServicesW
DeleteService
CloseServiceHandle
QueryServiceStatus
StartServiceW
OpenServiceW
SetSecurityDescriptorDacl
InitializeAcl
InitializeSecurityDescriptor
RegSetValueExW
RegQueryValueExW
RegCloseKey
RegEnumValueW
shell32
SHGetFolderPathW
ShellExecuteW
SHGetFileInfoW
comctl32
InitCommonControlsEx
shlwapi
PathFindFileNameW
PathRemoveFileSpecW
PathFindExtensionW
ole32
CoTaskMemFree
CoUninitialize
CoCreateInstance
CoInitializeEx
oleaut32
SystemTimeToVariantTime
VariantTimeToSystemTime
VariantClear
VariantChangeType
VariantInit
ws2_32
ntohs
Sections
.text Size: 722KB - Virtual size: 721KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 124KB - Virtual size: 123KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 52KB - Virtual size: 416KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 86KB - Virtual size: 86KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ