createInstance
Static task
static1
Behavioral task
behavioral1
Sample
553cd047a75b33a5b8794796b36de2ce0c864f39cf27dd200578ef64761cf720.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
553cd047a75b33a5b8794796b36de2ce0c864f39cf27dd200578ef64761cf720.exe
Resource
win10v2004-20221111-en
General
-
Target
553cd047a75b33a5b8794796b36de2ce0c864f39cf27dd200578ef64761cf720
-
Size
834KB
-
MD5
abd5771f5fd22bce6b171b0c3c27a0f9
-
SHA1
1eb9a31420c989e9773a04e2bd2e4cff1f468029
-
SHA256
553cd047a75b33a5b8794796b36de2ce0c864f39cf27dd200578ef64761cf720
-
SHA512
01c33002b1bd136ee07ed330ee873c1acbc8cea296f8569003e503b6df7a51934cb20d10681f7d177c4a1f49f977191ed1c468518286f36f9603c5932fec2954
-
SSDEEP
24576:uSExxIAAxo9DZZXImmnK+0Y3ZVoXm3x0:uAJiEjbOR
Malware Config
Signatures
Files
-
553cd047a75b33a5b8794796b36de2ce0c864f39cf27dd200578ef64761cf720.exe windows x86
32533286508ba30af3236610276ca78f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
winmm
sndPlaySoundA
mciSendCommandA
mpr
WNetConnectionDialog
WNetGetUserA
kernel32
OutputDebugStringA
GetFileSize
MulDiv
GetTimeZoneInformation
DeleteFileA
WaitForSingleObject
SetEvent
FormatMessageA
CreateEventA
CreateThread
GetVersion
SetErrorMode
GetDiskFreeSpaceA
DeviceIoControl
FreeLibrary
GetProcAddress
LoadLibraryA
GetTempPathA
lstrcmpA
GetFullPathNameW
MapViewOfFile
UnmapViewOfFile
QueryDosDeviceA
lstrcpynW
CreateFileW
lstrlenW
SetLastError
DefineDosDeviceA
CreateFileMappingA
GetSystemInfo
lstrcatW
lstrcpyW
GetFullPathNameA
SetUnhandledExceptionFilter
GetCurrentProcess
GetModuleFileNameA
GetCurrentThreadId
GetCurrentProcessId
FindResourceA
SetPriorityClass
FreeResource
LoadResource
QueryPerformanceCounter
GetTimeFormatA
GetCurrentThread
GetWindowsDirectoryA
GetDateFormatA
SizeofResource
CreateProcessA
SetThreadPriority
LockResource
GetModuleHandleA
ResumeThread
GetLocaleInfoA
GetNumberFormatA
GetUserDefaultLangID
LoadLibraryExA
GetOverlappedResult
lstrcpynA
GlobalMemoryStatus
RemoveDirectoryA
SetFileAttributesA
WideCharToMultiByte
WritePrivateProfileStringA
GetProfileStringA
WinExec
SetEndOfFile
CreateMutexA
ReleaseMutex
RtlUnwind
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
UnhandledExceptionFilter
RaiseException
LCMapStringW
LCMapStringA
GetStdHandle
IsBadWritePtr
VirtualFree
HeapCreate
HeapDestroy
VirtualQuery
VirtualAlloc
VirtualProtect
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
TlsGetValue
TlsSetValue
TlsFree
TlsAlloc
HeapSize
TerminateProcess
ExitProcess
GetVersionExA
GetCommandLineA
GetStartupInfoA
IsBadReadPtr
HeapReAlloc
CreateDirectoryA
HeapAlloc
HeapFree
SetEnvironmentVariableA
SetCurrentDirectoryA
GetCurrentDirectoryA
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
GetACP
GetOEMCP
InitializeCriticalSection
LocalFileTimeToFileTime
FileTimeToLocalFileTime
GetFileTime
MultiByteToWideChar
ReadFile
IsDBCSLeadByte
FileTimeToSystemTime
SetFileTime
SetFilePointer
DosDateTimeToFileTime
GetSystemTimeAsFileTime
SetStdHandle
FlushFileBuffers
IsBadCodePtr
GetLocaleInfoW
FileTimeToDosDateTime
GetCPInfo
GlobalSize
GetSystemTime
GetTickCount
SystemTimeToFileTime
GetVolumeInformationA
GetDriveTypeA
GetLogicalDrives
CloseHandle
lstrcmpiA
GetLastError
WriteFile
CreateFileA
lstrcpyA
GlobalReAlloc
FindNextFileA
GlobalHandle
FindClose
GlobalFree
FindFirstFileA
GlobalUnlock
lstrcatA
GlobalAlloc
GlobalLock
lstrlenA
InterlockedExchange
GetStringTypeA
GetStringTypeW
CompareStringA
CompareStringW
InterlockedDecrement
InterlockedIncrement
GetPrivateProfileStringA
user32
GetIconInfo
CreateIconIndirect
LoadIconA
MoveWindow
SetMenuItemInfoA
GetMenuState
TrackPopupMenuEx
SetDlgItemInt
CallNextHookEx
GetSubMenu
WinHelpA
GetWindow
CheckMenuItem
SetMessageQueue
SystemParametersInfoA
UnhookWindowsHookEx
EnumChildWindows
LoadAcceleratorsA
SetWindowsHookExA
TranslateAcceleratorA
DrawIcon
SetForegroundWindow
IsZoomed
GetTopWindow
GetWindowDC
PostQuitMessage
SetMenu
CreatePopupMenu
AppendMenuA
DestroyMenu
ClientToScreen
CreateDialogParamA
LoadStringA
DialogBoxParamW
GetMenuStringW
SetWindowLongA
DestroyIcon
GetMenuStringA
CreateDialogParamW
InsertMenuW
InsertMenuA
RemoveMenu
EndPaint
GetClassNameA
SetTimer
KillTimer
DrawTextA
GetFocus
GetClientRect
BeginPaint
UnionRect
UnregisterClassA
CreateWindowExA
DefWindowProcA
GetSysColorBrush
IsWindowVisible
RegisterClassA
GetActiveWindow
ScreenToClient
WindowFromPoint
GetMessagePos
TranslateMessage
GetAsyncKeyState
DestroyCursor
GetCursorPos
IsWindow
DispatchMessageA
GetDesktopWindow
DialogBoxParamA
MessageBoxA
CharNextA
OemToCharA
CharToOemA
GetClipboardFormatNameA
DrawTextW
PeekMessageA
IsWindowEnabled
RegisterClassExA
SetClassLongA
UpdateWindow
LoadStringW
GetDlgCtrlID
RegisterClipboardFormatA
CharUpperA
DestroyWindow
GetSystemMenu
IsIconic
MessageBeep
EnableMenuItem
FillRect
GetScrollRange
GetDC
DrawFocusRect
SetRect
InvalidateRect
CharLowerA
ReleaseDC
GetSysColor
SetCursor
GetDlgItemInt
GetWindowRect
SendDlgItemMessageA
SetCapture
GetParent
wsprintfA
CharPrevA
SetFocus
GetWindowTextLengthA
SendMessageA
PtInRect
GetWindowTextA
GetWindowLongA
GetDlgItem
EndDialog
SetWindowPos
CheckDlgButton
ShowWindow
IsDlgButtonChecked
PostMessageA
CheckRadioButton
ReleaseCapture
GetSystemMetrics
SetWindowTextA
EnableWindow
CallWindowProcA
LoadCursorA
GetDlgItemTextA
SetDlgItemTextA
LoadMenuA
IsDialogMessageA
GetMenu
GetMessageA
gdi32
GetStockObject
GetTextExtentPointA
CreateBrushIndirect
SetBkMode
CreateFontIndirectA
GetDeviceCaps
LineTo
PatBlt
BitBlt
MoveToEx
TextOutA
SetTextColor
GetBkColor
GetTextExtentPoint32A
CreatePen
EndDoc
StartDocA
SetMapMode
SetAbortProc
StretchBlt
StartPage
EndPage
DeleteDC
SetBkColor
DeleteObject
SelectObject
CreateCompatibleDC
CreateCompatibleBitmap
GetTextMetricsA
GetObjectA
CreateDIBitmap
CreateSolidBrush
ExtTextOutA
comdlg32
GetSaveFileNameA
GetOpenFileNameA
PrintDlgA
ChooseFontA
advapi32
RegSetValueExA
RegSetValueA
RegQueryValueA
RegEnumKeyExA
RegDeleteKeyA
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
RegCreateKeyExA
shell32
SHGetFileInfoA
DragFinish
DragQueryFileA
ShellExecuteA
FindExecutableA
SHGetDesktopFolder
DragAcceptFiles
ole32
OleInitialize
OleUninitialize
DoDragDrop
CoGetMalloc
CoTaskMemFree
Exports
Exports
Sections
.text Size: 455KB - Virtual size: 454KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 69KB - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 301KB - Virtual size: 300KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ