Static task
static1
Behavioral task
behavioral1
Sample
318167bdfbbf95c7c5ed65beea73d942b9264e204b76ff314518b92c5c9bb088.exe
Resource
win7-20220901-en
General
-
Target
318167bdfbbf95c7c5ed65beea73d942b9264e204b76ff314518b92c5c9bb088
-
Size
560KB
-
MD5
078fb185619836bcddcd5ea739fe2890
-
SHA1
3e900273b39a41a5703f59d13ad9ae955ddfdab7
-
SHA256
318167bdfbbf95c7c5ed65beea73d942b9264e204b76ff314518b92c5c9bb088
-
SHA512
52f5580d1a819c013cc4ba25b845a560b973cdabbc0a242490eab1a1eb39654d9df4fd3213eafc43026fb99097b56e89dabc669d742b18183f79a83e6ae7c30f
-
SSDEEP
12288:iPaexWmkWv8svSaoLuceMoh4vt4ZlUmuobnkAT8S4LORMeovTYmr:Qckh4F4Duo7kI8S6eMeok
Malware Config
Signatures
Files
-
318167bdfbbf95c7c5ed65beea73d942b9264e204b76ff314518b92c5c9bb088.exe windows x86
74ae848f9f65bfdd08d59126408f2747
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalReAlloc
GlobalHandle
TlsAlloc
TlsSetValue
LocalReAlloc
TlsFree
GlobalFlags
DeleteFileA
FlushFileBuffers
LockFile
UnlockFile
SetEndOfFile
GetThreadLocale
GetVolumeInformationA
GetFullPathNameA
GetCPInfo
GetOEMCP
SetErrorMode
FileTimeToLocalFileTime
GetFileTime
VirtualQuery
HeapReAlloc
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetSystemTimeAsFileTime
DeleteFileW
RemoveDirectoryA
CreateThread
GetCommandLineA
GetStartupInfoA
TlsGetValue
RtlUnwind
HeapSize
HeapDestroy
HeapCreate
GetStdHandle
GetACP
GetConsoleCP
GetConsoleMode
SetHandleCount
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
SetStdHandle
GetTimeZoneInformation
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEnvironmentVariableA
SetThreadContext
FlushInstructionCache
LocalAlloc
GlobalGetAtomNameA
GlobalFindAtomA
lstrcmpW
GetVersionExA
GetModuleFileNameW
SuspendThread
ResumeThread
FreeResource
GlobalAddAtomA
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
lstrcmpA
GlobalDeleteAtom
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
LocalFree
MulDiv
SetLastError
CreateFileW
SetFileAttributesW
GetFileAttributesW
CreateDirectoryW
GetCurrentThread
ExitProcess
VirtualProtect
VirtualAlloc
VirtualFree
FileTimeToSystemTime
GetFileSize
DuplicateHandle
GetFileType
CreateDirectoryA
ReadFile
WriteFile
SetFileTime
SystemTimeToFileTime
SetFilePointer
CreateFileA
DosDateTimeToFileTime
GetTickCount
ResetEvent
ExitThread
TerminateThread
FormatMessageA
ReleaseSemaphore
GetCurrentThreadId
GetSystemInfo
CreateFileMappingA
CreateEventA
SetEvent
InterlockedCompareExchange
InterlockedDecrement
InterlockedIncrement
UnmapViewOfFile
MapViewOfFile
GetLocalTime
WritePrivateProfileStringA
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
GetCurrentDirectoryA
GetModuleFileNameA
SetCurrentDirectoryA
FindNextFileA
FindClose
FindFirstFileA
GetCurrentProcessId
GetProcessId
LockResource
SizeofResource
LoadResource
FindResourceA
GetProcessHeap
HeapFree
GetCurrentProcess
HeapAlloc
CreateSemaphoreA
Sleep
WaitForSingleObject
CloseHandle
CreateToolhelp32Snapshot
GetModuleHandleA
ProcessIdToSessionId
Process32Next
OpenProcess
Process32First
LoadLibraryA
GetProcAddress
FreeLibrary
GetVersion
CompareStringA
GetTempFileNameA
SetFileAttributesA
CopyFileA
GetLastError
InterlockedExchange
GetThreadContext
MultiByteToWideChar
CompareStringW
GetFileAttributesA
WideCharToMultiByte
MoveFileExA
lstrlenA
RaiseException
user32
GetPropA
RemovePropA
GetWindowTextA
GetForegroundWindow
GetTopWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetForegroundWindow
UpdateWindow
GetMenu
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
EqualRect
PtInRect
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
SetWindowLongA
OffsetRect
IntersectRect
GetWindowPlacement
GetWindowRect
SystemParametersInfoA
DestroyMenu
CopyRect
UnhookWindowsHookEx
GetSysColor
EndPaint
BeginPaint
GetWindowDC
ReleaseDC
GetDC
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
GetDesktopWindow
SetActiveWindow
SetPropA
DestroyWindow
IsWindow
GetDlgItem
GetNextDlgTabItem
EndDialog
SetWindowsHookExA
CallNextHookEx
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
IsWindowVisible
GetKeyState
PeekMessageA
GetCursorPos
ValidateRect
GetWindow
SetWindowContextHelpId
MapDialogRect
SetWindowPos
GetClassNameA
GetClassLongA
GetCapture
IsChild
GetWindowLongA
GetLastActivePopup
IsWindowEnabled
MessageBoxA
SetCursor
PostMessageA
PostQuitMessage
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
GetFocus
GetParent
ModifyMenuA
EnableMenuItem
CheckMenuItem
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
FindWindowExA
SendMessageTimeoutA
GetWindowThreadProcessId
IsIconic
LoadIconA
GetClientRect
SendMessageA
GetSystemMetrics
EnableWindow
WinHelpA
SendDlgItemMessageA
RegisterWindowMessageA
CharUpperA
PostThreadMessageA
RegisterClipboardFormatA
UnregisterClassA
MessageBeep
GetNextDlgGroupItem
InvalidateRgn
InvalidateRect
SetRect
IsRectEmpty
CopyAcceleratorTableA
CharNextA
ReleaseCapture
SetCapture
LoadCursorA
GetSysColorBrush
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
CreateDialogIndirectParamA
SetFocus
gdi32
TextOutA
ExtTextOutA
Escape
SelectObject
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
ExtSelectClipRgn
DeleteDC
GetStockObject
RectVisible
GetBkColor
GetTextColor
CreateRectRgnIndirect
GetRgnBox
GetMapMode
PtVisible
GetWindowExtEx
GetViewportExtEx
GetObjectA
DeleteObject
GetClipBox
SetMapMode
SetTextColor
SetBkColor
RestoreDC
SaveDC
CreateBitmap
GetDeviceCaps
comdlg32
GetFileTitleA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
AddAce
RegSetValueExA
RegCreateKeyExA
RegQueryValueA
RegEnumKeyA
RegDeleteKeyA
RegOpenKeyExA
RegQueryValueExA
RegOpenKeyA
RegCloseKey
GetSecurityDescriptorDacl
GetLengthSid
IsValidSecurityDescriptor
GetFileSecurityA
SetFileSecurityA
CreateProcessAsUserA
AddAccessAllowedAce
InitializeAcl
GetAce
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
EqualSid
GetSecurityDescriptorControl
GetAclInformation
SetNamedSecurityInfoA
AdjustTokenPrivileges
DuplicateTokenEx
LookupPrivilegeValueA
SetTokenInformation
GetTokenInformation
OpenProcessToken
shell32
ShellExecuteExA
comctl32
InitCommonControlsEx
shlwapi
PathFindFileNameA
PathStripToRootA
PathFindExtensionA
PathIsUNCA
oledlg
ord8
ole32
CoTaskMemFree
CLSIDFromProgID
CoGetClassObject
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
OleUninitialize
CoFreeUnusedLibraries
OleInitialize
CLSIDFromString
CoTaskMemAlloc
CoRevokeClassObject
OleIsCurrentClipboard
OleFlushClipboard
CoRegisterMessageFilter
StgOpenStorageOnILockBytes
oleaut32
SysStringLen
SysAllocStringLen
SysFreeString
VariantClear
VariantChangeType
VariantInit
OleCreateFontIndirect
VariantTimeToSystemTime
SystemTimeToVariantTime
SafeArrayDestroy
SysAllocString
VariantCopy
SysAllocStringByteLen
ws2_32
WSAStartup
WSACleanup
WSACloseEvent
connect
inet_ntoa
recvfrom
inet_addr
WSAGetLastError
WSAEnumNetworkEvents
htons
WSAEventSelect
ntohs
getsockname
setsockopt
sendto
recv
socket
WSACreateEvent
closesocket
send
WSAWaitForMultipleEvents
gethostbyname
wtsapi32
WTSQueryUserToken
userenv
DestroyEnvironmentBlock
CreateEnvironmentBlock
Sections
.text Size: 372KB - Virtual size: 371KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 80KB - Virtual size: 79KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rmnet Size: 60KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE