Static task
static1
Behavioral task
behavioral1
Sample
960663d614868ca17fd27a62c2a52044f258ce15773bbb6ef07c51ccf5831c6a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
960663d614868ca17fd27a62c2a52044f258ce15773bbb6ef07c51ccf5831c6a.exe
Resource
win10v2004-20220901-en
General
-
Target
960663d614868ca17fd27a62c2a52044f258ce15773bbb6ef07c51ccf5831c6a
-
Size
332KB
-
MD5
305648b3750413bc24c1f317b50d86c4
-
SHA1
656f828e8bb31d44ed5112fef0f6068c6c1f00ac
-
SHA256
960663d614868ca17fd27a62c2a52044f258ce15773bbb6ef07c51ccf5831c6a
-
SHA512
112f31a2a6c9ea8c1807be88ac0a2c5bcc6ffecca18d2ba807b640ca755f35ee6ac297fb08f981df43bb2bb328129724a096c1aaa7423f18baad9dbcf8ad236b
-
SSDEEP
6144:VlVWkJG+KUnnS8oy1+LFwSfWLZfe26xBQoOIdUiF5Nl9+G6c:lWkcl0poe+LOSUp96xBQSUcn9+G6c
Malware Config
Signatures
Files
-
960663d614868ca17fd27a62c2a52044f258ce15773bbb6ef07c51ccf5831c6a.exe windows x86
163df062a314ddbce9d13d328e543a72
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
version
GetFileVersionInfoSizeA
VerQueryValueA
GetFileVersionInfoA
kernel32
SetErrorMode
WriteFile
SetFilePointer
FlushFileBuffers
GetCPInfo
GetOEMCP
GetCurrentProcess
RtlUnwind
GetStartupInfoA
ExitProcess
HeapAlloc
HeapFree
TerminateProcess
RaiseException
GetProcessVersion
GlobalGetAtomNameA
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetEnvironmentVariableA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
SetUnhandledExceptionFilter
IsBadReadPtr
IsBadCodePtr
SetStdHandle
FreeLibrary
GetVersionExA
FindFirstFileA
FindNextFileA
FindClose
lstrlenA
GetVersion
GetModuleHandleA
GlobalAddAtomA
GlobalFindAtomA
WritePrivateProfileStringA
lstrcatA
GlobalFlags
LocalReAlloc
TlsGetValue
GlobalReAlloc
TlsSetValue
EnterCriticalSection
GlobalHandle
LeaveCriticalSection
TlsFree
DeleteCriticalSection
GlobalUnlock
GlobalFree
LocalAlloc
TlsAlloc
InitializeCriticalSection
MultiByteToWideChar
lstrcpynA
lstrcpyA
SetLastError
InterlockedIncrement
WideCharToMultiByte
InterlockedDecrement
CloseHandle
GlobalDeleteAtom
GlobalLock
GlobalAlloc
GetCurrentThread
lstrcmpA
lstrcmpiA
GetLastError
GetCurrentThreadId
LoadLibraryA
LocalFree
GetDriveTypeA
GetProcAddress
GetVolumeInformationA
GetSystemDirectoryA
CreateProcessA
WaitForSingleObject
CopyFileA
GetModuleFileNameA
GetShortPathNameA
GetCommandLineA
HeapReAlloc
HeapSize
GetACP
user32
GetClassLongA
GetSystemMetrics
GetWindowPlacement
IsIconic
SystemParametersInfoA
RegisterWindowMessageA
SetForegroundWindow
GetForegroundWindow
GetMessagePos
GetMessageTime
RemovePropA
CallWindowProcA
GetPropA
ShowWindow
SetFocus
CreateWindowExA
DestroyWindow
DefWindowProcA
GetMenuItemID
GetSubMenu
GetMenu
RegisterClassA
GetClassInfoA
WinHelpA
GetTopWindow
SetPropA
CopyRect
GetClientRect
AdjustWindowRectEx
GetSysColor
MapWindowPoints
LoadIconA
GetSysColorBrush
DestroyMenu
SetWindowLongA
SetWindowPos
GetDlgItem
GrayStringA
DrawTextA
TabbedTextOutA
ReleaseDC
GetDC
GetMenuItemCount
GetWindowTextA
SetWindowTextA
GetWindow
GetDlgCtrlID
GetWindowRect
PtInRect
GetClassNameA
ClientToScreen
LoadCursorA
GetCapture
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
GetKeyState
CallNextHookEx
ValidateRect
IsWindowVisible
PeekMessageA
GetCursorPos
SetWindowsHookExA
GetParent
GetLastActivePopup
IsWindowEnabled
GetWindowLongA
MessageBoxA
EnableWindow
SetCursor
SendMessageA
PostQuitMessage
PostMessageA
wsprintfA
UnhookWindowsHookEx
LoadStringA
UnregisterClassA
gdi32
SaveDC
GetStockObject
SelectObject
SetBkColor
SetTextColor
SetViewportOrgEx
OffsetViewportOrgEx
SetMapMode
ScaleViewportExtEx
SetViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
GetClipBox
DeleteDC
DeleteObject
GetDeviceCaps
RectVisible
TextOutA
PtVisible
Escape
ExtTextOutA
GetObjectA
CreateBitmap
RestoreDC
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
advapi32
RegCreateKeyExA
RegQueryValueExA
RegEnumKeyExA
RegSetValueExA
RegOpenKeyExA
RegEnumValueA
RegDeleteKeyA
RegCloseKey
comctl32
ord17
Sections
.text Size: 76KB - Virtual size: 72KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 20KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 16KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 112KB - Virtual size: 112KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ogsqmka Size: 100KB - Virtual size: 100KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
eqnbfjf Size: 72KB - Virtual size: 100KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
gqnrgux Size: 4KB - Virtual size: 72KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE