Static task
static1
Behavioral task
behavioral1
Sample
31a732d5dc29d2818d4345d1c45ce6d50871da740dfae5a27dadc6daf421d89e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
31a732d5dc29d2818d4345d1c45ce6d50871da740dfae5a27dadc6daf421d89e.exe
Resource
win10v2004-20220812-en
General
-
Target
31a732d5dc29d2818d4345d1c45ce6d50871da740dfae5a27dadc6daf421d89e
-
Size
1.3MB
-
MD5
545205b3b50b274b20ffb07e42157570
-
SHA1
092e9dfe9d4ed0a28b636d30b3baaafceda9aa9b
-
SHA256
31a732d5dc29d2818d4345d1c45ce6d50871da740dfae5a27dadc6daf421d89e
-
SHA512
3d86a0396bc903764fa9ad917d8e97391b198f0d70dea33d687763103945e2a9a8cb5a1292954d1b2528ec9a18dc222919cadd513666b7ff68df6b5bf5c590bb
-
SSDEEP
24576:Sk1fiXc7AsR00sdCOKTkTedBc30QhIbUatMV2x703:h4s7AO09CHTkTwBc3SbUaiQ+
Malware Config
Signatures
Files
-
31a732d5dc29d2818d4345d1c45ce6d50871da740dfae5a27dadc6daf421d89e.exe windows x86
0bf70f6c00c3371653259e24e0d5c5f1
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ExitProcess
TerminateProcess
GetStartupInfoA
GetCommandLineA
RaiseException
CreateThread
ExitThread
HeapSize
HeapReAlloc
GetACP
GetTimeZoneInformation
GetLocalTime
SetStdHandle
GetFileType
FatalAppExitA
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
SetHandleCount
GetStdHandle
RtlUnwind
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetUnhandledExceptionFilter
LCMapStringA
LCMapStringW
GetDriveTypeA
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
IsValidLocale
IsValidCodePage
GetLocaleInfoA
EnumSystemLocalesA
GetUserDefaultLCID
SetConsoleCtrlHandler
CompareStringA
CompareStringW
SetEnvironmentVariableA
GetLocaleInfoW
CopyFileA
GetProfileStringA
GlobalSize
GetTickCount
lstrlenW
FileTimeToLocalFileTime
FileTimeToSystemTime
GetOEMCP
GetCPInfo
SizeofResource
GetProcessVersion
GetCurrentDirectoryA
WritePrivateProfileStringA
GetPrivateProfileStringA
GetPrivateProfileIntA
SetErrorMode
SetFileAttributesA
SetFileTime
SystemTimeToFileTime
LocalFileTimeToFileTime
GetFileTime
GetFileSize
GetFileAttributesA
TlsGetValue
LocalReAlloc
TlsSetValue
GlobalReAlloc
TlsFree
GlobalHandle
TlsAlloc
GlobalFlags
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
FormatMessageA
LocalFree
LocalAlloc
EnterCriticalSection
FindNextFileA
GetVersion
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
WideCharToMultiByte
InterlockedDecrement
InterlockedIncrement
FreeLibrary
GlobalFree
LockResource
FindResourceA
LoadResource
CreateEventA
SuspendThread
SetThreadPriority
ResumeThread
SetEvent
WaitForSingleObject
GlobalAlloc
GlobalDeleteAtom
lstrcmpA
GetCurrentThread
GetCurrentThreadId
GetModuleFileNameA
GetShortPathNameA
lstrcmpiA
GetThreadLocale
GetStringTypeExA
GetFullPathNameA
lstrcpynA
GetVolumeInformationA
FindFirstFileA
FindClose
lstrcpyA
lstrlenA
MultiByteToWideChar
DeleteFileA
MoveFileA
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
ReadFile
GetCurrentProcess
DuplicateHandle
GetLastError
GlobalLock
GlobalUnlock
MulDiv
GetModuleHandleA
SetLastError
GetWindowsDirectoryA
lstrcatA
GetSystemTime
GetTempPathA
CreateDirectoryA
CreateFileA
WriteFile
CloseHandle
LoadLibraryA
GetProcAddress
Sleep
HeapFree
GetProcessHeap
UnhandledExceptionFilter
HeapAlloc
user32
LoadAcceleratorsA
TranslateAcceleratorA
LoadMenuA
SetMenu
ReuseDDElParam
UnpackDDElParam
InvalidateRect
BringWindowToTop
InflateRect
RegisterClipboardFormatA
AppendMenuA
RemoveMenu
PostThreadMessageA
DestroyIcon
GetMenuItemCount
GetSubMenu
GetMenuItemID
TrackPopupMenu
SetWindowPlacement
CreateWindowExA
GetClassLongA
SetPropA
UnhookWindowsHookEx
GetPropA
CallWindowProcA
RemovePropA
DefWindowProcA
GetMessageTime
GetMessagePos
GetForegroundWindow
SetForegroundWindow
RegisterWindowMessageA
OffsetRect
IntersectRect
SystemParametersInfoA
GetWindowPlacement
GetWindowRect
OemToCharA
CharToOemA
SetTimer
KillTimer
WaitMessage
MapDialogRect
GetWindow
SetWindowContextHelpId
EndDialog
SetActiveWindow
IsWindow
CreateDialogIndirectParamA
DestroyWindow
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
GetMessageA
SetRectEmpty
DispatchMessageA
GetSysColorBrush
GetKeyState
CallNextHookEx
ValidateRect
IsWindowVisible
PeekMessageA
GetCursorPos
SetWindowsHookExA
GetLastActivePopup
MessageBoxA
SetCursor
ShowOwnedPopups
PostMessageA
GetParent
SetFocus
IsWindowEnabled
ShowWindow
GetDialogBaseUnits
MoveWindow
SetWindowLongA
GetDlgCtrlID
GetWindowTextLengthA
GetWindowTextA
SetWindowTextA
GetWindowLongA
IsDialogMessageA
ScrollWindowEx
IsDlgButtonChecked
SetDlgItemTextA
SetDlgItemInt
SendDlgItemMessageA
GetDlgItemTextA
GetDlgItemInt
GetDlgItem
CheckRadioButton
CheckDlgButton
CharUpperA
EndPaint
BeginPaint
GetWindowDC
IsRectEmpty
UnregisterClassA
HideCaret
ShowCaret
ExcludeUpdateRgn
DrawFocusRect
DefDlgProcA
IsWindowUnicode
ClientToScreen
ScreenToClient
LoadIconA
EnableWindow
IsIconic
SendMessageA
DrawIcon
PostQuitMessage
GetSystemMetrics
wsprintfA
ReleaseDC
GetDC
GetClientRect
DestroyMenu
MessageBeep
GetNextDlgGroupItem
SetRect
CopyAcceleratorTableA
TranslateMessage
CharNextA
GrayStringA
DrawTextA
TabbedTextOutA
GetMenuStringA
DeleteMenu
GetMenu
WindowFromPoint
GetWindowThreadProcessId
ReleaseCapture
SetCapture
LoadCursorA
PtInRect
GetClassNameA
GetDesktopWindow
wvsprintfA
UpdateWindow
MapWindowPoints
GetSysColor
AdjustWindowRectEx
EqualRect
DeferWindowPos
BeginDeferWindowPos
CopyRect
EndDeferWindowPos
ScrollWindow
GetScrollInfo
SetScrollInfo
ShowScrollBar
GetScrollRange
SetScrollRange
GetScrollPos
SetScrollPos
GetTopWindow
IsChild
GetCapture
WinHelpA
GetClassInfoA
SetWindowPos
LoadStringA
GetActiveWindow
RegisterClassA
InsertMenuA
gdi32
Escape
DeleteDC
StartDocA
SaveDC
RestoreDC
GetStockObject
SelectPalette
SetBkColor
SetBkMode
SetPolyFillMode
SetROP2
SetStretchBltMode
SetTextColor
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowOrgEx
OffsetWindowOrgEx
SetWindowExtEx
ScaleWindowExtEx
GetClipBox
SelectClipRgn
ExcludeClipRect
IntersectClipRect
OffsetClipRgn
MoveToEx
LineTo
SetTextAlign
SetTextJustification
SetTextCharacterExtra
SetMapperFlags
GetCurrentPositionEx
ArcTo
SetArcDirection
ExtTextOutA
PolylineTo
SetColorAdjustment
PolyBezierTo
GetClipRgn
CreateRectRgn
SelectClipPath
ExtSelectClipRgn
PlayMetaFileRecord
GetObjectType
EnumMetaFile
PlayMetaFile
GetViewportExtEx
GetWindowExtEx
CreatePen
ExtCreatePen
CreateSolidBrush
CreateHatchBrush
CreatePatternBrush
CreateDIBPatternBrushPt
CreateBitmap
GetDCOrgEx
GetTextExtentPoint32A
GetTextMetricsA
CreateFontIndirectA
GetTextColor
GetBkColor
DPtoLP
LPtoDP
GetMapMode
PatBlt
SetRectRgn
CombineRgn
CreateRectRgnIndirect
CopyMetaFileA
CreateDCA
TextOutA
BitBlt
RectVisible
PtVisible
GetDeviceCaps
GetPaletteEntries
CreatePalette
CreateCompatibleDC
SelectObject
SetDIBColorTable
DeleteObject
GetDIBColorTable
GetObjectA
PolyDraw
CreateDIBitmap
GetTextExtentPointA
CreateDIBSection
comdlg32
GetSaveFileNameA
GetFileTitleA
GetOpenFileNameA
winspool.drv
ClosePrinter
OpenPrinterA
DocumentPropertiesA
advapi32
RegDeleteValueA
RegCreateKeyA
RegEnumKeyA
RegQueryValueA
RegSetValueA
RegDeleteKeyA
RegQueryValueExA
RegSetValueExA
RegOpenKeyExA
RegCreateKeyExA
RegOpenKeyA
RegCloseKey
shell32
DragQueryFileA
DragFinish
DragAcceptFiles
SHGetFileInfoA
ShellExecuteA
ExtractIconA
comctl32
ord17
oledlg
ord8
ole32
StgOpenStorageOnILockBytes
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
CoTaskMemFree
CoTaskMemAlloc
CoCreateInstance
OleRun
CoDisconnectObject
OleInitialize
OleUninitialize
CoFreeUnusedLibraries
OleDuplicateData
CreateBindCtx
SetConvertStg
CoGetClassObject
OleRegGetUserType
ReadFmtUserTypeStg
ReadClassStg
StringFromCLSID
CoTreatAsClass
ReleaseStgMedium
CoRegisterMessageFilter
CoRegisterClassObject
CoRevokeClassObject
CLSIDFromString
OleSetClipboard
OleFlushClipboard
OleIsCurrentClipboard
CreateStreamOnHGlobal
CLSIDFromProgID
WriteFmtUserTypeStg
WriteClassStg
olepro32
ord253
oleaut32
SysAllocStringLen
VariantClear
VariantTimeToSystemTime
VariantCopy
VariantChangeType
SysReAllocStringLen
SysAllocString
SafeArrayUnaccessData
SafeArrayAccessData
SafeArrayGetUBound
SafeArrayGetLBound
SafeArrayGetElemsize
SafeArrayGetDim
SafeArrayCreate
SafeArrayRedim
SysAllocStringByteLen
SysStringByteLen
VarCyFromStr
VarBstrFromCy
VarDateFromStr
VarBstrFromDate
SafeArrayCopy
SafeArrayAllocData
SafeArrayAllocDescriptor
SafeArrayGetElement
SafeArrayPtrOfIndex
SafeArrayPutElement
SafeArrayLock
SafeArrayUnlock
SafeArrayDestroy
SafeArrayDestroyData
SafeArrayDestroyDescriptor
SysStringLen
LoadTypeLi
SysFreeString
wsock32
bind
htons
htonl
closesocket
gethostbyname
recv
send
WSAAsyncSelect
inet_ntoa
ioctlsocket
recvfrom
sendto
connect
ntohs
inet_addr
WSAGetLastError
WSASetLastError
WSAStartup
accept
getsockname
socket
getpeername
WSACleanup
wininet
InternetSetCookieA
InternetSetStatusCallback
InternetSetOptionExA
InternetQueryOptionA
InternetGetLastResponseInfoA
GopherFindFirstFileA
InternetFindNextFileA
FtpFindFirstFileA
HttpQueryInfoA
HttpSendRequestExA
HttpEndRequestA
HttpSendRequestA
HttpAddRequestHeadersA
InternetErrorDlg
HttpOpenRequestA
GopherOpenFileA
GopherGetAttributeA
GopherCreateLocatorA
FtpGetFileA
FtpPutFileA
FtpOpenFileA
FtpGetCurrentDirectoryA
FtpSetCurrentDirectoryA
FtpRemoveDirectoryA
FtpCreateDirectoryA
FtpRenameFileA
FtpDeleteFileA
InternetConnectA
InternetQueryDataAvailable
InternetReadFile
InternetWriteFile
InternetSetFilePointer
InternetGetCookieA
InternetCanonicalizeUrlA
InternetCrackUrlA
InternetOpenA
InternetOpenUrlA
InternetCloseHandle
Sections
.text Size: 460KB - Virtual size: 457KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 72KB - Virtual size: 69KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 32KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 20KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 760KB - Virtual size: 760KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ