Static task
static1
Behavioral task
behavioral1
Sample
db2f5b7f4f5726e9b7d7d23bd234d5911d74f41c31feb4c39c3f2ff54847a35f.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
db2f5b7f4f5726e9b7d7d23bd234d5911d74f41c31feb4c39c3f2ff54847a35f.exe
Resource
win10v2004-20221111-en
General
-
Target
db2f5b7f4f5726e9b7d7d23bd234d5911d74f41c31feb4c39c3f2ff54847a35f
-
Size
1.2MB
-
MD5
3e6c599d00576b448072902fb48bd8cf
-
SHA1
87b9d54c4a6992665d59d545f35da54281359be5
-
SHA256
db2f5b7f4f5726e9b7d7d23bd234d5911d74f41c31feb4c39c3f2ff54847a35f
-
SHA512
d27c8450e58d275f2ee3dfd2f19256f7895c5581ef690f4db02aa51c6a47a0b2877238b57900fdae0b10133cf82bad8730781bdfc08720fd0178ee825f976aee
-
SSDEEP
24576:GE1YV7Ua+wGgharPwGOoZQg64ttgFPExrC+gXMza:GE1YVYhw5aT3I4ttVc+g82
Malware Config
Signatures
Files
-
db2f5b7f4f5726e9b7d7d23bd234d5911d74f41c31feb4c39c3f2ff54847a35f.exe windows x86
cdf7c709d3b3f9ddc96a8e28381d2fbc
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateThread
ExitThread
TerminateProcess
HeapSize
GetEnvironmentVariableA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
FatalAppExitA
LCMapStringA
LCMapStringW
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetACP
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
SetStdHandle
IsValidLocale
IsValidCodePage
EnumSystemLocalesA
GetUserDefaultLCID
SetConsoleCtrlHandler
GetLocaleInfoW
CompareStringA
CompareStringW
SetEnvironmentVariableA
FindNextFileA
GetLocalTime
GetSystemTime
GetProfileStringA
InterlockedExchange
GetTimeZoneInformation
HeapReAlloc
HeapAlloc
RaiseException
ExitProcess
GetCommandLineA
GetStartupInfoA
HeapFree
RtlUnwind
GlobalSize
FindResourceExA
GetShortPathNameA
GetStringTypeExA
GetFullPathNameA
GetVolumeInformationA
MoveFileA
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
DuplicateHandle
SetErrorMode
GetThreadLocale
GetOEMCP
GetCPInfo
GetProcessVersion
TlsGetValue
LocalReAlloc
TlsSetValue
EnterCriticalSection
GlobalReAlloc
LeaveCriticalSection
TlsFree
GlobalHandle
DeleteCriticalSection
TlsAlloc
InitializeCriticalSection
GlobalFlags
VirtualProtect
MulDiv
SetFileTime
GetFileTime
WritePrivateProfileStringA
GetPrivateProfileStringA
GetPrivateProfileIntA
GlobalAlloc
lstrcmpA
SuspendThread
SetThreadPriority
ResumeThread
SetEvent
lstrcpynA
InterlockedDecrement
InterlockedIncrement
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
GlobalLock
GlobalUnlock
GlobalFree
DeviceIoControl
CreateEventA
WaitForSingleObject
GetCurrentDirectoryA
SetCurrentDirectoryA
GetFileSize
Sleep
GlobalMemoryStatus
GetModuleHandleA
GetTickCount
FileTimeToLocalFileTime
FileTimeToSystemTime
LocalFileTimeToFileTime
GetCurrentThread
GetCurrentProcess
LocalAlloc
LocalFree
IsBadWritePtr
GetVersion
GetProcAddress
LockResource
GetLocaleInfoA
GetUserDefaultLangID
GetSystemDefaultLangID
lstrcmpiA
WinExec
GetWindowsDirectoryA
LoadLibraryA
lstrlenW
WideCharToMultiByte
FormatMessageA
FindResourceA
SizeofResource
LoadResource
FreeLibrary
MultiByteToWideChar
CloseHandle
RemoveDirectoryA
DeleteFileA
SetFileAttributesA
WriteFile
ReadFile
CopyFileA
CreateFileA
GetVersionExA
SystemTimeToFileTime
SetLastError
GetLastError
FindFirstFileA
FindClose
GetFileAttributesA
GetDriveTypeA
lstrlenA
CreateDirectoryA
lstrcatA
lstrcpyA
GetModuleFileNameA
GetFileType
user32
CheckMenuItem
EnableMenuItem
IsDialogMessageA
ScrollWindowEx
IsDlgButtonChecked
SetDlgItemTextA
SetDlgItemInt
GetDlgItemTextA
GetDlgItemInt
CheckRadioButton
CheckDlgButton
LoadIconA
UpdateWindow
SendDlgItemMessageA
MapWindowPoints
PeekMessageA
DispatchMessageA
AdjustWindowRectEx
EqualRect
DeferWindowPos
BeginDeferWindowPos
EndDeferWindowPos
ScrollWindow
GetScrollInfo
SetScrollInfo
ShowScrollBar
GetScrollRange
SetScrollRange
GetScrollPos
SetScrollPos
GetTopWindow
GetCapture
wsprintfA
GetClassInfoA
RegisterClassA
GetMenu
GetMenuItemCount
GetSubMenu
GetMenuItemID
TrackPopupMenu
SetWindowPlacement
GetWindowTextLengthA
GetDlgCtrlID
CreateWindowExA
SetWindowsHookExA
CallNextHookEx
GetClassLongA
SetPropA
UnhookWindowsHookEx
GetPropA
CallWindowProcA
RemovePropA
DefWindowProcA
GetMessageTime
GetMessagePos
GetLastActivePopup
GetForegroundWindow
RegisterWindowMessageA
IntersectRect
IsIconic
GetNextDlgTabItem
EndDialog
GetActiveWindow
SetActiveWindow
SetMenuItemBitmaps
DestroyWindow
GetDlgItem
LoadStringA
SetWindowTextA
IsWindowVisible
GetWindowLongA
GetClassNameA
GetWindowTextA
EnumChildWindows
MapDialogRect
GetWindow
GetWindowPlacement
CopyRect
ShowWindow
KillTimer
UnpackDDElParam
MessageBoxA
EnableWindow
SetFocus
UnregisterClassA
HideCaret
ShowCaret
ExcludeUpdateRgn
DrawFocusRect
SetTimer
CopyIcon
InflateRect
SetWindowLongA
SetCursor
PtInRect
RedrawWindow
MessageBeep
DestroyCursor
GetParent
WinHelpA
GetKeyState
SendMessageA
ScreenToClient
IsChild
PostMessageA
ReleaseCapture
GetSysColor
GetClientRect
GetDC
SystemParametersInfoA
SetRect
ReleaseDC
AdjustWindowRect
OffsetRect
InvalidateRect
SetCapture
GetSysColorBrush
GetSystemMetrics
SetWindowPos
BringWindowToTop
ModifyMenuA
GetMenuState
DestroyIcon
PostThreadMessageA
RemoveMenu
AppendMenuA
SetForegroundWindow
GetFocus
LoadCursorA
GetWindowRect
IsWindowEnabled
DefDlgProcA
IsWindowUnicode
IsWindow
GetDesktopWindow
SetMenu
RegisterClipboardFormatA
LoadMenuA
TranslateAcceleratorA
LoadAcceleratorsA
SetRectEmpty
CharUpperA
GetNextDlgGroupItem
CopyAcceleratorTableA
CharNextA
GetMenuStringA
DeleteMenu
InsertMenuA
GetWindowThreadProcessId
WaitMessage
DestroyMenu
GetDialogBaseUnits
WindowFromPoint
GetAsyncKeyState
GrayStringA
DrawTextA
TabbedTextOutA
EndPaint
BeginPaint
GetWindowDC
ClientToScreen
SetWindowContextHelpId
ShowOwnedPopups
PostQuitMessage
GetMessageA
TranslateMessage
ValidateRect
wvsprintfA
OemToCharA
GetCursorPos
ReuseDDElParam
CharToOemA
GetMenuCheckMarkDimensions
CreateDialogIndirectParamA
LoadBitmapA
MoveWindow
gdi32
MoveToEx
LineTo
SetTextAlign
SetTextCharacterExtra
SetMapperFlags
GetCurrentPositionEx
ArcTo
SetArcDirection
PolyDraw
PolylineTo
SetColorAdjustment
PolyBezierTo
DeleteObject
GetClipRgn
CreateRectRgn
SelectClipPath
ExtSelectClipRgn
PlayMetaFileRecord
GetObjectType
EnumMetaFile
PlayMetaFile
GetDeviceCaps
GetViewportExtEx
OffsetClipRgn
CreatePen
ExtCreatePen
CreateSolidBrush
CreateHatchBrush
CreatePatternBrush
CreateDIBPatternBrushPt
PtVisible
RectVisible
ExtTextOutA
Escape
GetMapMode
PatBlt
SetRectRgn
CombineRgn
CreateRectRgnIndirect
DPtoLP
GetTextMetricsA
GetTextColor
GetBkColor
LPtoDP
EnumFontFamiliesExA
CopyMetaFileA
CreateDCA
IntersectClipRect
ExcludeClipRect
SelectClipRgn
ScaleWindowExtEx
SetWindowExtEx
OffsetWindowOrgEx
SetWindowOrgEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
SetStretchBltMode
SetROP2
SetPolyFillMode
SetBkMode
SelectPalette
RestoreDC
SaveDC
StartDocA
DeleteDC
CreateBitmap
SetBkColor
SetTextColor
GetClipBox
GetDCOrgEx
SelectObject
SetTextJustification
TextOutA
GetObjectA
GetStockObject
GetTextFaceA
CreateFontA
GetTextExtentPoint32A
GetWindowExtEx
CreateDIBitmap
GetTextExtentPointA
BitBlt
CreateCompatibleDC
CreateFontIndirectA
comdlg32
GetOpenFileNameA
GetSaveFileNameA
GetFileTitleA
winspool.drv
OpenPrinterA
ClosePrinter
DocumentPropertiesA
advapi32
AllocateAndInitializeSid
RegCloseKey
RegOpenKeyExA
RegQueryValueA
RegCreateKeyA
RegEnumKeyA
RegSetValueA
RegDeleteKeyA
RegOpenKeyA
RegEnumValueA
SetEntriesInAclA
RegDeleteValueA
RegEnumKeyExA
ImpersonateSelf
OpenThreadToken
OpenProcessToken
RegQueryValueExA
InitializeSecurityDescriptor
GetLengthSid
InitializeAcl
AddAccessAllowedAce
SetSecurityDescriptorDacl
SetSecurityDescriptorGroup
SetSecurityDescriptorOwner
IsValidSecurityDescriptor
AccessCheck
RevertToSelf
FreeSid
RegSetValueExA
RegCreateKeyExA
shell32
ExtractIconA
DragQueryFileA
DragFinish
DragAcceptFiles
ShellExecuteA
SHGetFileInfoA
comctl32
PropertySheetA
DestroyPropertySheetPage
ord17
CreatePropertySheetPageA
oledlg
ord8
ole32
OleRegGetUserType
WriteClassStg
WriteFmtUserTypeStg
SetConvertStg
CreateBindCtx
OleDuplicateData
CoFreeUnusedLibraries
OleUninitialize
OleInitialize
CoDisconnectObject
OleRun
ReadFmtUserTypeStg
CoTaskMemFree
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoGetClassObject
CLSIDFromString
CLSIDFromProgID
CoInitializeEx
CoInitialize
ReadClassStg
StringFromCLSID
CoTreatAsClass
ReleaseStgMedium
CoCreateInstance
CoUninitialize
CoRegisterMessageFilter
CoRegisterClassObject
CoRevokeClassObject
OleSetClipboard
OleFlushClipboard
OleIsCurrentClipboard
CreateStreamOnHGlobal
CoTaskMemAlloc
olepro32
ord253
oleaut32
VariantTimeToSystemTime
SysAllocStringLen
SysFreeString
VariantCopy
VariantChangeType
SysReAllocStringLen
SysAllocString
SafeArrayUnaccessData
SafeArrayAccessData
SafeArrayGetUBound
SafeArrayGetLBound
SafeArrayGetElemsize
SafeArrayGetDim
SafeArrayCreate
SafeArrayRedim
SysAllocStringByteLen
SysStringByteLen
VarCyFromStr
VarBstrFromCy
VarDateFromStr
VarBstrFromDate
SafeArrayCopy
SafeArrayAllocData
SafeArrayAllocDescriptor
SafeArrayGetElement
SafeArrayPtrOfIndex
SafeArrayPutElement
SafeArrayLock
SafeArrayUnlock
SafeArrayDestroy
SafeArrayDestroyData
SafeArrayDestroyDescriptor
SysStringLen
LoadTypeLi
VariantClear
shlwapi
SHDeleteKeyA
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
Sections
.text Size: 784KB - Virtual size: 780KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 120KB - Virtual size: 118KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 112KB - Virtual size: 132KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 20KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 136KB - Virtual size: 134KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 52KB - Virtual size: 49KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.rrdata Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE