Static task
static1
Behavioral task
behavioral1
Sample
f2bcb6ebe5aaff0c3673a847d2528b3cbdeafb9851bf32dd287ad2abecd0be64.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f2bcb6ebe5aaff0c3673a847d2528b3cbdeafb9851bf32dd287ad2abecd0be64.exe
Resource
win10v2004-20220812-en
General
-
Target
f2bcb6ebe5aaff0c3673a847d2528b3cbdeafb9851bf32dd287ad2abecd0be64
-
Size
147KB
-
MD5
b01cf5c9bd21dd6183c9da5f7081db1e
-
SHA1
2ac024717d625cf03524116321dd7260556979ea
-
SHA256
f2bcb6ebe5aaff0c3673a847d2528b3cbdeafb9851bf32dd287ad2abecd0be64
-
SHA512
cbab82f25bdff7074bc9721f0e206356ed93d39ab9c39dd63b5d155e2ed44902f5a6831691c18af9113828eaa55c77e10a3cc54041e83fd26bd0455dca9cb161
-
SSDEEP
3072:mpfQyvlTZVvYpjb0FGCA26VNt5y+vh6YISRvpMVbJLVFwmxU/vk5:AZ5YpjwUZ26Xtfgs0Xb6/S
Malware Config
Signatures
Files
-
f2bcb6ebe5aaff0c3673a847d2528b3cbdeafb9851bf32dd287ad2abecd0be64.exe windows x86
1d0342617786e471c9930dd979453c5f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
DeferWindowPos
EmptyClipboard
GetMenu
GetMessageExtraInfo
GetDesktopWindow
IsWinEventHookInstalled
IsIconic
SetWindowRgn
SetWindowLongW
ToAsciiEx
DrawFocusRect
IsWindow
CloseDesktop
GetThreadDesktop
GetCapture
VkKeyScanA
IsClipboardFormatAvailable
GetClipboardFormatNameW
GetWindowLongW
GetAsyncKeyState
CreateDialogIndirectParamW
SetWindowsHookExW
GetNextDlgGroupItem
PostQuitMessage
GetFocus
GetTopWindow
GetForegroundWindow
UpdateWindow
DestroyWindow
GetMenuItemCount
RegisterWindowMessageW
PtInRect
SetCursor
IsWindowVisible
SetWindowTextW
CallNextHookEx
DrawTextExW
MessageBeep
UnhookWindowsHookEx
GetWindowTextW
GrayStringW
GetDlgCtrlID
TabbedTextOutW
MoveWindow
IntersectRect
WinHelpW
GetClassInfoW
ModifyMenuW
SetForegroundWindow
RegisterClipboardFormatW
CallWindowProcW
CopyAcceleratorTableW
GetWindow
ReleaseCapture
BeginPaint
GetClassInfoExW
SetFocus
SetWindowPos
SetRect
BringWindowToTop
GetWindowPlacement
GetSysColor
SendDlgItemMessageW
ReleaseDC
DispatchMessageW
SystemParametersInfoW
ValidateRect
GetSysColorBrush
SetWindowContextHelpId
EnableMenuItem
InvalidateRgn
DrawTextW
LoadBitmapW
GetPropW
LoadIconW
PostThreadMessageW
ClientToScreen
GetGUIThreadInfo
SendDlgItemMessageA
ExitWindowsEx
GetKeyState
OffsetRect
GetWindowDC
IsChild
SystemParametersInfoA
DrawStateW
SendMessageW
RegisterClassW
EnableWindow
SetMenuItemBitmaps
GetSystemMetrics
GetSubMenu
GetMenuCheckMarkDimensions
DestroyMenu
GetWindowRect
EndPaint
DefWindowProcW
GetNextDlgTabItem
MapDialogRect
AdjustWindowRectEx
GetWindowThreadProcessId
GetCursorPos
GetMenuItemID
CheckMenuItem
GetDlgItem
InvalidateRect
CharNextW
CreateWindowExW
EqualRect
SetPropW
IsWindowEnabled
LoadStringW
CharUpperW
ShowWindow
EndDialog
GetClassLongW
CopyRect
GetMessagePos
SetActiveWindow
SetCapture
IsRectEmpty
MessageBoxW
MapWindowPoints
PostMessageW
IsDialogMessageW
TranslateMessage
RemovePropW
IsCharLowerW
PrintWindow
GetActiveWindow
ChildWindowFromPointEx
HiliteMenuItem
IsDlgButtonChecked
FrameRect
GetClipboardViewer
MapVirtualKeyA
RedrawWindow
KillTimer
GetMessageTime
GetDialogBaseUnits
MapVirtualKeyExA
IsMenu
GetWindowRgn
comdlg32
GetFileTitleW
shell32
SHGetFolderPathW
ShellExecuteW
oledlg
OleUIBusyW
ole32
OleFlushClipboard
StgCreateDocfileOnILockBytes
OleInitialize
CoGetClassObject
OleIsCurrentClipboard
CLSIDFromProgID
CoFreeUnusedLibraries
StgOpenStorageOnILockBytes
CoTaskMemAlloc
CoRevokeClassObject
CLSIDFromString
CoRegisterMessageFilter
OleUninitialize
CreateILockBytesOnHGlobal
advapi32
RegSetValueExW
AllocateAndInitializeSid
RegDeleteKeyW
RegEnumValueW
RegQueryValueW
RegEnumKeyExW
RegQueryValueExW
LookupPrivilegeValueW
RegCreateKeyExW
OpenProcessToken
AdjustTokenPrivileges
RegDeleteValueW
CheckTokenMembership
FreeSid
RegEnumKeyW
RegOpenKeyW
gdi32
OffsetViewportOrgEx
SetWindowExtEx
SaveDC
SetBkMode
SetTextColor
CreateFontIndirectW
DPtoLP
GetClipBox
GetRgnBox
PtVisible
CreateRectRgnIndirect
ExtTextOutW
GetStockObject
RectVisible
GetObjectW
GetDeviceCaps
TextOutW
Escape
SetBkColor
GetTextColor
GetBkColor
DeleteDC
ScaleViewportExtEx
GetViewportExtEx
SetMapMode
SetViewportExtEx
DeleteObject
ExtSelectClipRgn
GetMapMode
SetViewportOrgEx
GetWindowExtEx
SelectObject
ScaleWindowExtEx
shlwapi
PathAddBackslashW
PathFindExtensionW
PathIsUNCW
PathFindFileNameW
winspool.drv
DocumentPropertiesW
OpenPrinterW
ClosePrinter
kernel32
GetConsoleCP
GetTempPathW
FreeLibrary
GetStringTypeW
GetFileType
RaiseException
GetConsoleOutputCP
SetEnvironmentVariableA
GetVersionExW
GetVersion
GetCommandLineW
TlsAlloc
GetDriveTypeW
SetLastError
GlobalUnlock
GlobalFree
VirtualQuery
MoveFileA
TlsSetValue
GetCurrentDirectoryW
MulDiv
FindFirstFileW
GetSystemTimeAsFileTime
GetModuleHandleA
GetExitCodeThread
RtlUnwind
WriteConsoleA
SetFilePointerEx
FreeResource
LocalAlloc
GetModuleFileNameW
SetEnvironmentVariableW
LoadResource
GetStartupInfoW
GetSystemDirectoryW
CompareStringA
QueryPerformanceCounter
GetVolumeInformationW
ReadFile
GlobalFlags
WriteFile
LocalReAlloc
WaitForSingleObject
LoadLibraryExW
LeaveCriticalSection
ReleaseMutex
GetModuleHandleW
IsDebuggerPresent
FlushFileBuffers
FreeEnvironmentStringsA
GetModuleFileNameA
GetCurrentThread
CreateThread
GetSystemDefaultLCID
GetTimeFormatA
LockResource
EnumResourceLanguagesW
GetEnvironmentStrings
HeapFree
LocalFree
CreateDirectoryW
GetVersionExA
VirtualProtect
WideCharToMultiByte
GetConsoleMode
GetFileAttributesW
SizeofResource
TerminateProcess
SetHandleCount
GetCurrentDirectoryA
InitializeCriticalSection
DeleteFileA
GlobalAddAtomW
GetPrivateProfileStringW
FindResourceW
GetSystemInfo
GetSystemDefaultLangID
GetDriveTypeA
FileTimeToLocalFileTime
ExitProcess
CreateMutexW
SetStdHandle
HeapDestroy
HeapSize
DeleteFileW
GetLocaleInfoW
GetProcessHeap
ConvertDefaultLocale
UnlockFile
lstrcmpW
SetUnhandledExceptionFilter
TlsGetValue
BeginUpdateResourceW
FileTimeToSystemTime
GetLocaleInfoA
LoadLibraryW
CloseHandle
DuplicateHandle
FreeEnvironmentStringsW
GetOEMCP
LCMapStringW
RemoveDirectoryW
GetDiskFreeSpaceExW
WriteConsoleW
MultiByteToWideChar
SetEndOfFile
GetCurrentThreadId
SetCurrentDirectoryW
SetEvent
EnumSystemLocalesA
FindResourceExW
GetStringTypeA
lstrlenA
GetCurrentProcess
CreateEventW
ResetEvent
GlobalReAlloc
GetStdHandle
FindNextFileW
FormatMessageA
Sleep
VirtualFree
EndUpdateResourceW
IsValidCodePage
GetDateFormatA
GetFileSize
FindClose
IsValidLocale
GetWindowsDirectoryW
LCMapStringA
GetThreadLocale
GlobalFindAtomW
GetUserDefaultLCID
GetACP
GetLastError
HeapAlloc
HeapCreate
CopyFileW
GlobalAlloc
GetLogicalDriveStringsW
SetErrorMode
CreateFileA
GetFileAttributesA
GetStartupInfoA
GetProcAddress
TlsFree
InterlockedIncrement
InterlockedDecrement
UnhandledExceptionFilter
GetEnvironmentStringsW
DeleteCriticalSection
GetTickCount
GetCurrentProcessId
EnterCriticalSection
GetCPInfo
InitializeCriticalSectionAndSpinCount
HeapReAlloc
GetFullPathNameW
LoadLibraryA
lstrlenW
QueueUserAPC
SetCommState
GetThreadTimes
FreeUserPhysicalPages
SetFileApisToANSI
VirtualAlloc
FindFirstFileExW
SetSystemTimeAdjustment
CancelIo
RtlCaptureStackBackTrace
IsProcessInJob
GetProcessHandleCount
PurgeComm
OpenProcess
GetExitCodeProcess
GetDevicePowerState
GetWriteWatch
FlushViewOfFile
UpdateResourceW
SetFileApisToOEM
ReadFileScatter
SetFileValidData
LockFile
GetCommandLineA
EscapeCommFunction
GetProcessAffinityMask
SetProcessShutdownParameters
MapUserPhysicalPagesScatter
GetThreadIOPendingFlag
BindIoCompletionCallback
FindVolumeClose
DeactivateActCtx
SetProcessWorkingSetSize
Sections
.text Size: 107KB - Virtual size: 106KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ