Static task
static1
Behavioral task
behavioral1
Sample
4c42d488b13b689704bc94ce8fee2dc78a88c09965a2c71fd7a19b002737ad97.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
4c42d488b13b689704bc94ce8fee2dc78a88c09965a2c71fd7a19b002737ad97.exe
Resource
win10v2004-20221111-en
General
-
Target
4c42d488b13b689704bc94ce8fee2dc78a88c09965a2c71fd7a19b002737ad97
-
Size
892KB
-
MD5
82d8d2c5801dc3c23418735b6d33e596
-
SHA1
1700a60d64f64f0d4dc8d92cffe4e9ac9962b3ea
-
SHA256
4c42d488b13b689704bc94ce8fee2dc78a88c09965a2c71fd7a19b002737ad97
-
SHA512
2bec345a0a4d53d40433b8f081121b9c873e816f764a88511a9c99df41977d7b30ddd3d1acf92b5230eb85eab75a61802131ac9654577a8efac294d2b74676ec
-
SSDEEP
12288:cDLxmaghTnUBXovmS/RwscbSihZLyF2A2yToOOuD6f:KUvhzUB3S/RPyI2CToOOuD6f
Malware Config
Signatures
Files
-
4c42d488b13b689704bc94ce8fee2dc78a88c09965a2c71fd7a19b002737ad97.exe windows x86
89e71a30d8f0b0bfa747206db9441900
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
RtlUnwind
HeapFree
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
GetSystemTimeAsFileTime
GetTimeFormatA
GetDateFormatA
TerminateProcess
GetStartupInfoA
HeapReAlloc
ExitThread
CreateThread
SetStdHandle
GetFileType
HeapSize
HeapDestroy
HeapCreate
VirtualFree
IsBadWritePtr
QueryPerformanceCounter
GetCurrentProcessId
SetUnhandledExceptionFilter
GetTimeZoneInformation
ExitProcess
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
SetEnvironmentVariableA
HeapAlloc
Process32Next
SetErrorMode
GetOEMCP
GetCPInfo
GetFileTime
GetFileAttributesA
GlobalFlags
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
TlsGetValue
GlobalHandle
GlobalReAlloc
GetFullPathNameA
GetVolumeInformationA
FindFirstFileA
FindClose
GetCurrentProcess
DuplicateHandle
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
LocalAlloc
FileTimeToLocalFileTime
FileTimeToSystemTime
GlobalMemoryStatus
OpenProcess
VirtualQueryEx
GetProcessHeap
RaiseException
GlobalGetAtomNameA
GlobalFindAtomA
lstrcatA
lstrcmpW
CreateEventA
SuspendThread
SetEvent
ResumeThread
SetThreadPriority
GlobalAddAtomA
FreeResource
WaitForSingleObject
GetCurrentThread
GetCurrentThreadId
FreeLibrary
GlobalDeleteAtom
lstrcmpA
GetModuleHandleA
GetProcAddress
ConvertDefaultLocale
EnumResourceLanguagesA
lstrcpyA
LoadLibraryA
SetLastError
MulDiv
GlobalLock
GlobalUnlock
FormatMessageA
lstrcpynA
LocalFree
WritePrivateProfileStringA
GetLocalTime
InitializeCriticalSection
SizeofResource
GetPrivateProfileStringA
GetPrivateProfileIntA
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
CompareStringW
CompareStringA
lstrlenA
lstrcmpiA
GetVersion
GetLastError
WideCharToMultiByte
MultiByteToWideChar
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
GetFileSize
GlobalAlloc
ReadFile
GlobalFree
FindResourceA
LoadResource
LockResource
InterlockedDecrement
InterlockedIncrement
GetTickCount
GetModuleFileNameA
CreateFileA
WriteFile
GetTempPathA
DeleteFileA
GetCommandLineA
Sleep
CopyFileA
CreateProcessA
CreateToolhelp32Snapshot
Process32First
Module32First
Module32Next
CloseHandle
GetStdHandle
user32
PostThreadMessageA
DestroyMenu
MessageBeep
GetNextDlgGroupItem
InvalidateRgn
InvalidateRect
CopyAcceleratorTableA
SetRect
IsRectEmpty
CharNextA
ReleaseCapture
SetCapture
LoadCursorA
GetSysColorBrush
RegisterClipboardFormatA
RegisterWindowMessageA
WinHelpA
GetCapture
CreateWindowExA
GetClassLongA
GetClassInfoExA
GetClassNameA
SetPropA
GetPropA
RemovePropA
IsChild
GetForegroundWindow
GetTopWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetForegroundWindow
GetMenu
AdjustWindowRectEx
EqualRect
GetClassInfoA
RegisterClassA
UnregisterClassA
CallWindowProcA
OffsetRect
IntersectRect
GetWindowPlacement
PtInRect
UnhookWindowsHookEx
GetWindowTextLengthA
GetWindowTextA
SetFocus
ShowWindow
MoveWindow
SetWindowLongA
GetDlgCtrlID
SetWindowTextA
IsDialogMessageA
SetDlgItemTextA
SetDlgItemInt
SendDlgItemMessageA
GetDlgItemInt
GetWindow
SetWindowContextHelpId
MapDialogRect
SetWindowPos
wsprintfA
SetMenuItemBitmaps
GetFocus
GetProcessWindowStation
GetUserObjectInformationW
ModifyMenuA
EnableMenuItem
CheckMenuItem
GetMenuCheckMarkDimensions
LoadBitmapA
SetWindowsHookExA
CallNextHookEx
GetMessageA
TranslateMessage
DispatchMessageA
GetKeyState
PeekMessageA
GetCursorPos
ValidateRect
GetLastActivePopup
SetCursor
CopyRect
GetDesktopWindow
GetActiveWindow
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
IsWindow
GetWindowLongA
DefWindowProcA
GetDlgItem
IsWindowEnabled
GetParent
GetNextDlgTabItem
EndDialog
GetSysColor
EndPaint
BeginPaint
GetWindowDC
ReleaseDC
GetDC
ClientToScreen
ScreenToClient
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
FillRect
PostQuitMessage
PostMessageA
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
GetSystemMetrics
EnableWindow
LoadIconA
KillTimer
SetTimer
RedrawWindow
IsWindowVisible
UpdateWindow
GetClientRect
GetWindowRect
IsIconic
SendMessageA
DrawIcon
CharUpperA
MessageBoxA
SystemParametersInfoA
gdi32
GetMapMode
GetBkColor
GetTextColor
GetRgnBox
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
SetViewportExtEx
CreateRectRgnIndirect
CreateDIBSection
SetDIBColorTable
CreateSolidBrush
GetStockObject
CreateCompatibleDC
CreateBitmap
DeleteDC
ExtSelectClipRgn
ScaleWindowExtEx
SetWindowExtEx
CreateFontIndirectA
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetPixel
BitBlt
GetWindowExtEx
GetViewportExtEx
GetObjectA
DeleteObject
GetClipBox
SetMapMode
SetTextColor
SetBkColor
RestoreDC
SaveDC
GetDeviceCaps
ScaleViewportExtEx
comdlg32
GetOpenFileNameA
GetFileTitleA
GetSaveFileNameA
winspool.drv
ClosePrinter
OpenPrinterA
DocumentPropertiesA
advapi32
ReportEventA
DeregisterEventSource
RegCloseKey
RegOpenKeyA
RegQueryValueExA
RegOpenKeyExA
RegDeleteKeyA
RegEnumKeyA
RegQueryValueA
RegisterEventSourceA
RegSetValueExA
RegCreateKeyExA
shell32
ShellExecuteA
DragQueryFileA
comctl32
ord17
ImageList_Destroy
shlwapi
PathFindFileNameA
UrlUnescapeA
PathStripToRootA
PathFindExtensionA
PathIsUNCA
oledlg
ord8
ole32
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoGetClassObject
OleInitialize
CoFreeUnusedLibraries
OleUninitialize
CLSIDFromString
CLSIDFromProgID
CoTaskMemAlloc
CoTaskMemFree
CoCreateInstance
OleRun
CreateStreamOnHGlobal
CoRevokeClassObject
OleIsCurrentClipboard
OleFlushClipboard
CoRegisterMessageFilter
oleaut32
SafeArrayCreateVector
GetErrorInfo
OleCreateFontIndirect
SystemTimeToVariantTime
SysAllocStringLen
VariantChangeType
VariantCopy
VariantInit
SysFreeString
SysStringLen
SysStringByteLen
SysAllocStringByteLen
SysAllocString
SafeArrayDestroy
VariantClear
SafeArrayPutElement
SafeArrayCreate
ws2_32
WSAGetLastError
inet_addr
WSACleanup
WSAStartup
htons
socket
closesocket
send
ioctlsocket
connect
select
gethostbyname
shutdown
recv
ntohl
wininet
HttpOpenRequestA
InternetConnectA
HttpSendRequestA
InternetReadFile
InternetWriteFile
InternetSetFilePointer
InternetSetStatusCallback
InternetOpenA
InternetGetLastResponseInfoA
InternetCloseHandle
HttpQueryInfoA
HttpAddRequestHeadersA
InternetQueryDataAvailable
InternetSetOptionExA
InternetCanonicalizeUrlA
InternetCrackUrlA
gdiplus
GdipCloneImage
GdipAlloc
GdipDrawImageI
GdipGetImageGraphicsContext
GdipFree
GdiplusShutdown
GdiplusStartup
GdipGetImageEncoders
GdipGetImageEncodersSize
GdipBitmapUnlockBits
GdipBitmapLockBits
GdipCreateBitmapFromHBITMAP
GdipCreateBitmapFromStreamICM
GdipCreateBitmapFromStream
GdipDeleteGraphics
GdipDisposeImage
GdipSaveImageToStream
GdipGetImageWidth
GdipGetImageHeight
GdipGetImagePixelFormat
GdipGetImagePaletteSize
GdipGetImagePalette
GdipCreateBitmapFromScan0
Sections
.text Size: 348KB - Virtual size: 345KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 96KB - Virtual size: 92KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 48KB - Virtual size: 64KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.res0 Size: 24KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 372KB - Virtual size: 370KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ