Static task
static1
Behavioral task
behavioral1
Sample
9f6347c0e756c53dfb7cd79c565f19bb7c0817b8cfab5fec82333e6e9dafe172.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
9f6347c0e756c53dfb7cd79c565f19bb7c0817b8cfab5fec82333e6e9dafe172.exe
Resource
win10v2004-20220812-en
General
-
Target
9f6347c0e756c53dfb7cd79c565f19bb7c0817b8cfab5fec82333e6e9dafe172
-
Size
480KB
-
MD5
ca3126eed262944545133ba8a23b90d4
-
SHA1
55f72d643dd435c748373e7ed79c9c0d87ddc77b
-
SHA256
9f6347c0e756c53dfb7cd79c565f19bb7c0817b8cfab5fec82333e6e9dafe172
-
SHA512
5dab9c035e687e370dfef29301cdfcdb6670258ff3e8025d1ae28d93c69d81b473817cef001868ae2addd9071ce156732a024e4de4db92d49821f31b8009692b
-
SSDEEP
12288:hDzdM4DMvbNc5jS1r/IRHlgJ1tICFnuR3+g:pzdM4TlSRQNlg3txut
Malware Config
Signatures
Files
-
9f6347c0e756c53dfb7cd79c565f19bb7c0817b8cfab5fec82333e6e9dafe172.exe windows x86
a4a68e2520ef3936dfdf51f30ee13601
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
ImageList_Write
DestroyPropertySheetPage
ImageList_Remove
ImageList_Draw
ImageList_ReplaceIcon
ImageList_SetBkColor
ImageList_LoadImageA
_TrackMouseEvent
ImageList_Read
ImageList_Destroy
ImageList_GetBkColor
ImageList_DragEnter
ImageList_DragShowNolock
ord17
CreatePropertySheetPageA
ImageList_Create
ImageList_DragMove
ImageList_GetImageInfo
ImageList_GetIcon
ImageList_DragLeave
ImageList_EndDrag
ImageList_Replace
ImageList_Add
PropertySheetA
ImageList_GetImageCount
ImageList_AddMasked
ImageList_BeginDrag
user32
GetWindow
SetRectEmpty
DrawMenuBar
GetWindowThreadProcessId
ShowWindow
MapWindowPoints
GetDlgItem
SetWindowPos
PostQuitMessage
CheckMenuItem
SendMessageA
SystemParametersInfoW
GetActiveWindow
GetMenuItemID
GetWindowLongW
SetParent
SetWindowsHookExW
CreateWindowExW
MessageBeep
GetClientRect
EndDeferWindowPos
ModifyMenuW
GetSystemMetrics
SendDlgItemMessageA
DestroyAcceleratorTable
TranslateMessage
GetWindowPlacement
FrameRect
DefMDIChildProcW
ClientToScreen
EnableMenuItem
CloseClipboard
DrawFrameControl
UnregisterClassW
EndPaint
WindowFromPoint
GetKeyState
GetSubMenu
RegisterClassExW
ScrollWindow
DestroyWindow
DestroyIcon
SetMenu
InflateRect
GetMessagePos
LoadIconW
RegisterWindowMessageW
SendDlgItemMessageW
DefWindowProcW
IsDialogMessageW
CallNextHookEx
GetWindowRect
GetDlgItemInt
WaitMessage
IsWindowEnabled
ReleaseCapture
UnhookWindowsHookEx
UnpackDDElParam
SetWindowLongW
GetDesktopWindow
OpenClipboard
GetWindowTextW
LoadCursorW
GetForegroundWindow
GetMenu
GetCursorPos
PostThreadMessageW
IsWindow
SetWindowRgn
CopyAcceleratorTableW
MoveWindow
ShowScrollBar
DrawFocusRect
DestroyMenu
DeferWindowPos
GetWindowDC
InvalidateRect
DrawTextW
IsMenu
CreatePopupMenu
BeginDeferWindowPos
FindWindowW
TrackPopupMenu
IsWindowVisible
GetDCEx
SetForegroundWindow
ScreenToClient
PtInRect
PeekMessageW
SetCapture
ReleaseDC
RegisterClassW
GetDlgCtrlID
GetWindowLongA
GetDC
LoadBitmapW
LockWindowUpdate
GetScrollInfo
MessageBoxW
wsprintfW
DispatchMessageW
RedrawWindow
GetMenuItemCount
GetSysColor
SetCursor
DrawIconEx
GetMenuCheckMarkDimensions
CheckDlgButton
CreateDialogIndirectParamW
KillTimer
SetScrollInfo
GetScrollPos
IsClipboardFormatAvailable
CharUpperW
GetUpdateRect
EmptyClipboard
IsRectEmpty
SetDlgItemInt
SetActiveWindow
SystemParametersInfoA
DefWindowProcA
SetFocus
SetClipboardData
UpdateWindow
LoadStringW
EnableWindow
DrawEdge
GetParent
BeginPaint
SetDlgItemTextW
SetMenuItemBitmaps
SetMenuDefaultItem
GetFocus
gdi32
PatBlt
CreateHalftonePalette
DeleteDC
IntersectClipRect
GetTextAlign
GetClipBox
AbortDoc
CreateCompatibleDC
GetStockObject
DeleteObject
OffsetClipRgn
StartDocA
GetWindowOrgEx
RoundRect
GetDeviceCaps
LPtoDP
Polyline
TextOutA
StrokePath
GetTextExtentPoint32A
ExtSelectClipRgn
GetPixel
SelectObject
GetDCOrgEx
CreateEllipticRgn
ExtTextOutA
Ellipse
SetPolyFillMode
FloodFill
GetNearestPaletteIndex
PtInRegion
advapi32
RegOpenKeyExA
ControlService
RegDeleteKeyA
InitializeSecurityDescriptor
RegEnumValueA
RegCreateKeyExA
RegSetValueExA
RegEnumKeyExA
RegQueryValueA
RegQueryValueExA
RegCreateKeyA
RegCloseKey
LookupPrivilegeValueA
OpenProcessToken
RegEnumKeyA
shell32
SHGetPathFromIDListA
SHFileOperationA
ShellExecuteExA
ShellExecuteA
oleaut32
LoadTypeLi
kernel32
RaiseException
GetModuleHandleA
SetFilePointer
LeaveCriticalSection
HeapDestroy
GetCurrentProcess
GetStartupInfoA
GetVersionExA
TlsGetValue
GetTickCount
SetUnhandledExceptionFilter
FindNextFileW
GetConsoleOutputCP
GetCurrentDirectoryA
GetOEMCP
EnterCriticalSection
FreeLibrary
ConvertDefaultLocale
QueryPerformanceCounter
DeleteCriticalSection
GetCommandLineA
GetLocaleInfoA
TlsFree
GetConsoleMode
GetCurrentThreadId
LoadResource
GetACP
WriteConsoleA
LoadLibraryA
GetModuleFileNameW
GetCurrentProcessId
SuspendThread
SetStdHandle
ReadFile
MulDiv
GetCommandLineW
LocalFree
VirtualFree
GetFileType
FreeEnvironmentStringsA
SetHandleCount
LoadLibraryW
GetModuleHandleW
GetLastError
GetConsoleCP
InterlockedIncrement
GetStringTypeW
FlushFileBuffers
HeapAlloc
CloseHandle
GetTimeFormatA
SetEnvironmentVariableA
HeapFree
lstrlenW
MultiByteToWideChar
ExitProcess
GetLocaleInfoW
CreateMutexW
CompareStringW
Sleep
VirtualAlloc
SetLastError
GlobalLock
FreeEnvironmentStringsW
GetSystemTimeAsFileTime
GetEnvironmentStrings
MapViewOfFile
WriteFile
GetModuleFileNameA
HeapSize
WriteConsoleW
GetVersionExW
LocalReAlloc
IsDebuggerPresent
FindClose
GetCPInfo
CompareStringA
InitializeCriticalSection
GetFullPathNameW
TlsAlloc
GetEnvironmentStringsW
LCMapStringA
IsValidCodePage
WideCharToMultiByte
GetShortPathNameW
GetProcAddress
DeleteFileA
GlobalReAlloc
HeapReAlloc
InterlockedExchange
UnhandledExceptionFilter
GetStdHandle
CreateFileA
GetStringTypeA
TlsSetValue
FileTimeToSystemTime
TerminateProcess
GetTimeZoneInformation
FileTimeToLocalFileTime
GetProcessHeap
VirtualQuery
RtlUnwind
GetDateFormatA
HeapCreate
InterlockedDecrement
GetStartupInfoW
VirtualProtect
ResumeThread
LCMapStringW
Sections
.text Size: 108KB - Virtual size: 106KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 272KB - Virtual size: 269KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 76KB - Virtual size: 106KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ