Static task
static1
Behavioral task
behavioral1
Sample
6984f35e339a75a071647c4054fdfe160253f352433b5b2b9f969398f4819379.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6984f35e339a75a071647c4054fdfe160253f352433b5b2b9f969398f4819379.exe
Resource
win10v2004-20220812-en
General
-
Target
6984f35e339a75a071647c4054fdfe160253f352433b5b2b9f969398f4819379
-
Size
500KB
-
MD5
5ac5e115222817cd74dd8d0b5e0aa58f
-
SHA1
4a115ef92cfe7f94be74b84808ff3329643a2e84
-
SHA256
6984f35e339a75a071647c4054fdfe160253f352433b5b2b9f969398f4819379
-
SHA512
b24617f70bd22ec52d82ffdc432279cbe74bfd518d7eab024d4791d3ab2e3b71831657abf472a97635ff0c045460f8b7d899f07760d275419d913c77ae1d6443
-
SSDEEP
12288:h/7xNdsx1TTsxBoQfKWzH9lAGjr/gCwWMzvSMG:hjTdMvGoaTrICSzvSMG
Malware Config
Signatures
Files
-
6984f35e339a75a071647c4054fdfe160253f352433b5b2b9f969398f4819379.exe windows x86
d8bd00d1d31c061261e5457b48600592
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
ChangeDisplaySettingsExA
LoadMenuIndirectW
DdeAbandonTransaction
NotifyWinEvent
PeekMessageW
RegisterClassA
GetDialogBaseUnits
CopyAcceleratorTableW
GetDlgItemTextW
SetWindowTextW
TrackPopupMenuEx
GetMenuStringA
TrackMouseEvent
DefWindowProcA
GetDoubleClickTime
ChildWindowFromPoint
DlgDirSelectExA
SetCursor
RegisterClassExA
GetCursor
DdeClientTransaction
EditWndProc
ShowCaret
GetWindowInfo
LockWindowUpdate
GetClassInfoW
GetClassInfoExW
WinHelpW
DdeCreateStringHandleW
SetUserObjectInformationW
EnumWindowStationsA
BlockInput
MapDialogRect
CopyRect
ShowWindow
SendMessageW
DrawStateA
SetWindowWord
RegisterClipboardFormatW
SetClassLongW
IsRectEmpty
ExitWindowsEx
CreateMDIWindowA
SetMenuContextHelpId
GetComboBoxInfo
DlgDirListComboBoxA
DestroyWindow
CreateWindowExA
FindWindowW
FindWindowExA
DestroyMenu
CreateIconFromResourceEx
WaitMessage
TrackPopupMenu
FindWindowA
DlgDirSelectComboBoxExA
MessageBoxA
IsChild
GetScrollPos
DdeConnect
DdeUnaccessData
TranslateAcceleratorW
advapi32
LogonUserA
RegEnumKeyA
RegQueryInfoKeyW
RevertToSelf
LookupPrivilegeDisplayNameA
RegEnumValueA
RegCreateKeyExW
CryptAcquireContextA
LookupPrivilegeValueA
RegQueryValueExW
RegSetValueW
RegReplaceKeyW
RegCreateKeyExA
CreateServiceA
RegEnumKeyExW
RegRestoreKeyA
CryptDuplicateKey
CryptSignHashA
StartServiceW
InitiateSystemShutdownW
RegQueryMultipleValuesA
RegRestoreKeyW
CryptEncrypt
RegEnumKeyExA
comctl32
ImageList_GetImageRect
InitCommonControlsEx
ImageList_Merge
DrawStatusTextA
ImageList_Create
ImageList_LoadImageW
wininet
InternetQueryOptionW
InternetConnectW
InternetConfirmZoneCrossingA
HttpQueryInfoW
InternetDialW
InternetWriteFileExW
kernel32
GetConsoleScreenBufferInfo
GetConsoleCP
ExitProcess
GetCPInfo
OpenWaitableTimerA
GetProcAddress
LeaveCriticalSection
TlsFree
Sleep
GetStringTypeW
GetConsoleMode
HeapSize
WriteConsoleA
VirtualFree
GetOEMCP
GetDateFormatA
WritePrivateProfileStringA
OpenSemaphoreA
GetModuleHandleA
GetConsoleOutputCP
RtlUnwind
HeapAlloc
FlushFileBuffers
TlsAlloc
HeapDestroy
LoadLibraryA
CompareStringW
GetProfileStringW
GetACP
GetCommandLineA
TlsSetValue
EnumSystemLocalesA
LocalFileTimeToFileTime
FoldStringW
GetExitCodeProcess
CreateFileA
QueryPerformanceCounter
MoveFileA
FindFirstFileA
WaitForMultipleObjectsEx
GetStringTypeA
WaitForMultipleObjects
GetCurrentProcess
SetLocaleInfoW
GetSystemTimeAsFileTime
GetLastError
SetEnvironmentVariableA
GetTickCount
GetComputerNameW
EnterCriticalSection
GetProcessHeaps
IsValidLocale
HeapReAlloc
SetUnhandledExceptionFilter
GetCurrentProcessId
LCMapStringW
IsDebuggerPresent
SetFilePointer
CloseHandle
TransactNamedPipe
GetLocaleInfoW
SetSystemTime
AddAtomW
FindResourceW
TerminateProcess
SetConsoleOutputCP
WideCharToMultiByte
GlobalAddAtomA
CreateDirectoryA
GetCurrentThread
SetEnvironmentVariableW
GetTempFileNameW
ReadConsoleOutputW
GetCurrentThreadId
GlobalHandle
SetHandleCount
GetLocaleInfoA
DeleteCriticalSection
UnhandledExceptionFilter
RtlFillMemory
InterlockedIncrement
GetThreadLocale
TlsGetValue
GetTimeZoneInformation
WriteConsoleOutputCharacterW
InterlockedExchange
SetThreadLocale
SetConsoleCtrlHandler
FreeEnvironmentStringsW
CreateDirectoryW
GetStartupInfoW
DeleteFileA
GetUserDefaultLCID
GetThreadSelectorEntry
GetUserDefaultLangID
CompareStringA
SetEvent
MultiByteToWideChar
GetPrivateProfileIntW
FreeLibrary
SetComputerNameA
IsValidCodePage
GetModuleHandleW
GlobalCompact
LocalShrink
LocalSize
GlobalDeleteAtom
FlushConsoleInputBuffer
GetEnvironmentStringsW
CreateThread
GetCommandLineW
WriteConsoleW
GetStartupInfoA
GetStdHandle
LCMapStringA
HeapCreate
LocalFree
InitializeCriticalSectionAndSpinCount
GetFileType
WriteFile
RemoveDirectoryW
CreateMutexA
VirtualAlloc
GetTimeFormatA
WriteConsoleOutputA
HeapFree
SetStdHandle
LocalAlloc
lstrcmpA
ReadFile
WriteProfileSectionW
EnumSystemLocalesW
GetWindowsDirectoryW
OpenMutexA
SetPriorityClass
VirtualQuery
InterlockedDecrement
CreatePipe
GetModuleFileNameA
TerminateThread
GetModuleFileNameW
OpenMutexW
SetLastError
GlobalSize
gdi32
UpdateICMRegKeyA
CreateColorSpaceA
SetICMProfileA
SetWinMetaFileBits
GetGlyphOutlineW
SetICMProfileW
StrokePath
GetKerningPairs
SelectObject
DeleteObject
CreateDCA
GetMapMode
GetPaletteEntries
GetObjectA
EnableEUDC
CancelDC
GetTextMetricsW
SetMapperFlags
GetEnhMetaFileHeader
SetViewportExtEx
DescribePixelFormat
GetTextColor
DeleteDC
CloseMetaFile
EqualRgn
GetViewportExtEx
GetDeviceCaps
Sections
.text Size: 92KB - Virtual size: 91KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 264KB - Virtual size: 261KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 104KB - Virtual size: 130KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 36KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ