Static task
static1
Behavioral task
behavioral1
Sample
c3efdca348854449e98a3d801b60c16a2cfae6206c5d85ec21c1b9eab9852537.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c3efdca348854449e98a3d801b60c16a2cfae6206c5d85ec21c1b9eab9852537.exe
Resource
win10v2004-20221111-en
General
-
Target
c3efdca348854449e98a3d801b60c16a2cfae6206c5d85ec21c1b9eab9852537
-
Size
30.9MB
-
MD5
692d6564694a2a2464b4a4647764ca67
-
SHA1
b581df5e14268a744a955d743362a1c6e7a3fab9
-
SHA256
c3efdca348854449e98a3d801b60c16a2cfae6206c5d85ec21c1b9eab9852537
-
SHA512
02c756cce9f6efd2a9812365f48dc84b89d0d93760d3da69ad7230e506aac4af1d90e9209a3500b3c8954b4dd713afad3727adbfadcbab6808d0bdf2aae7e141
-
SSDEEP
786432:RicGlIPu8g+EBfKAGOn9fr7WcDdl4p1GXBwlNAeDN:0cIIRgVfKADWsdl42XSlWeD
Malware Config
Signatures
Files
-
c3efdca348854449e98a3d801b60c16a2cfae6206c5d85ec21c1b9eab9852537.exe windows x86
416289c939731357baa01e3320e420b6
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
DuplicateIcon
ShellExecuteExW
ExtractIconExW
SHGetFolderPathW
ShellExecuteW
wsock32
WSAStartup
ntohl
htonl
socket
htons
ioctlsocket
gethostbyname
recv
select
connect
send
gdiplus
GdipSetSmoothingMode
GdipSetCompositingQuality
GdipDeleteGraphics
GdipCreateFromHDC
GdipDisposeImage
GdipCreateSolidFill
GdipCloneBrush
GdipLoadImageFromStream
GdipAlloc
GdipFree
GdiplusShutdown
GdiplusStartup
GdipCloneImage
GdipGetImageBounds
GdipDrawImageRectI
GdipDeleteBrush
kernel32
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetConsoleMode
GetConsoleCP
HeapReAlloc
InterlockedDecrement
GetLongPathNameW
lstrlenW
Sleep
GetCurrentProcess
FlushInstructionCache
SetLastError
EnterCriticalSection
LeaveCriticalSection
GetCurrentThreadId
RaiseException
FreeLibrary
GetProcAddress
GetModuleHandleW
lstrcmpiW
GetLastError
MultiByteToWideChar
SizeofResource
LoadResource
FindResourceW
LoadLibraryExW
GetModuleFileNameW
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
InterlockedIncrement
LoadLibraryW
MulDiv
GetCommandLineW
GetTempPathW
GetExitCodeThread
LocalFree
CreateThread
WriteProcessMemory
WaitForSingleObject
CreateRemoteThread
OpenProcess
VirtualFreeEx
GetVersionExW
CreateFileW
VirtualAllocEx
DeviceIoControl
CloseHandle
GetVolumeInformationW
QueryPerformanceCounter
GetFileAttributesW
LockResource
SetHandleCount
GetWindowsDirectoryW
GlobalLock
GlobalAlloc
GlobalUnlock
GlobalFree
GetDateFormatW
SystemTimeToFileTime
FileTimeToSystemTime
FileTimeToLocalFileTime
TlsAlloc
TlsGetValue
TlsFree
GetSystemDirectoryW
GlobalReAlloc
GetSystemTime
WideCharToMultiByte
HeapCreate
GetStdHandle
WriteFile
GetLocaleInfoW
TlsSetValue
IsValidCodePage
GetOEMCP
GetACP
HeapSize
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
LCMapStringW
GetCPInfo
RtlUnwind
GetTimeZoneInformation
FindNextFileW
FindFirstFileExW
GetDriveTypeW
FindClose
DeleteFileW
GetFullPathNameW
RemoveDirectoryW
GetStartupInfoW
HeapSetInformation
CreateDirectoryW
SetCurrentDirectoryW
GetCurrentDirectoryW
SetEnvironmentVariableW
GetSystemTimeAsFileTime
ExitProcess
InitializeCriticalSection
DecodePointer
EncodePointer
GetStringTypeW
InterlockedExchange
InterlockedPopEntrySList
VirtualAlloc
VirtualFree
GetFileType
IsProcessorFeaturePresent
HeapAlloc
GetProcessHeap
HeapFree
InterlockedPushEntrySList
InterlockedCompareExchange
GetTickCount
GetCurrentProcessId
CompareStringW
ReadFile
SetFilePointer
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
WriteConsoleW
SetStdHandle
FlushFileBuffers
SetEndOfFile
SetEnvironmentVariableA
user32
SystemParametersInfoW
UnregisterClassA
SendMessageW
GetDC
GetClientRect
MoveWindow
SetWindowTextW
GetWindowRect
ScreenToClient
EndDialog
CreateWindowExW
DefWindowProcW
SetWindowLongW
GetDialogBaseUnits
SetTimer
HideCaret
EndPaint
BeginPaint
GetSystemMetrics
ClientToScreen
KillTimer
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
EnumWindows
PostMessageW
SetForegroundWindow
DialogBoxParamW
FindWindowW
PostThreadMessageW
DestroyIcon
GetWindowThreadProcessId
CallWindowProcW
LoadCursorW
GetClassInfoExW
RegisterClassExW
RedrawWindow
ReleaseDC
GetWindowDC
FillRect
GetMessageW
DialogBoxIndirectParamW
MessageBoxW
GetActiveWindow
CharNextW
GetWindowTextW
SetFocus
DestroyWindow
CreateDialogParamW
GetWindow
GetWindowLongW
GetClassNameW
GetParent
MapWindowPoints
SetWindowPos
DispatchMessageW
InvalidateRect
ShowWindow
PeekMessageW
UpdateWindow
IsWindow
gdi32
SetBkColor
DeleteObject
DeleteDC
GetTextExtentPoint32W
CreateFontW
GetDeviceCaps
CreateSolidBrush
CreateFontIndirectW
GetStockObject
SelectObject
advapi32
RegDeleteValueW
RegOpenKeyExA
RegQueryValueExW
IsTextUnicode
RegCreateKeyExA
RegQueryValueExA
RegSetValueExA
RegSetValueExW
RegCreateKeyExW
RegOpenKeyExW
RegEnumKeyExW
RegQueryInfoKeyW
RegCloseKey
RegDeleteKeyW
ole32
CoUninitialize
CLSIDFromString
CoCreateInstance
CoTaskMemAlloc
CoInitialize
CLSIDFromProgID
CreateStreamOnHGlobal
CoSetProxyBlanket
CoInitializeSecurity
GetRunningObjectTable
CreateBindCtx
CoTaskMemFree
CoTaskMemRealloc
oleaut32
VariantInit
VariantChangeType
VariantCopy
SysAllocString
SysFreeString
SysStringLen
VarUI4FromStr
SysStringByteLen
SysAllocStringByteLen
OleLoadPicture
CreateErrorInfo
VariantClear
Sections
.text Size: 514KB - Virtual size: 514KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 119KB - Virtual size: 118KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 33KB - Virtual size: 54KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 30.2MB - Virtual size: 30.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 68KB - Virtual size: 67KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ