Static task
static1
Behavioral task
behavioral1
Sample
ca002f992481483b545a3059f8959f9c330d5a3c79ce967699f7e1748c3926c7.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
ca002f992481483b545a3059f8959f9c330d5a3c79ce967699f7e1748c3926c7.exe
Resource
win10v2004-20220812-en
General
-
Target
ca002f992481483b545a3059f8959f9c330d5a3c79ce967699f7e1748c3926c7
-
Size
8.0MB
-
MD5
102c424205df9c79387ade49dc99073d
-
SHA1
131943d900b3b540d7d712517bddaaa6b81d3cf0
-
SHA256
ca002f992481483b545a3059f8959f9c330d5a3c79ce967699f7e1748c3926c7
-
SHA512
c3361173d63d31f90de8ca551c6632fde12b88f6de3971222117cc28c3c3fd81a25429d3b3e93fe53d97988a0f1d977d605ea0068649ad86719cd69fda9f0d34
-
SSDEEP
98304:aVaYllbWX9T9spX5F7TTwOQcxEnYeKwxri6fIl14stJrpeVqOKYeN0cXfciRF:aVZl9WvM5NdknVi6fs4s+qOKVn
Malware Config
Signatures
Files
-
ca002f992481483b545a3059f8959f9c330d5a3c79ce967699f7e1748c3926c7.exe windows x86
f7e95cd2a033f7af7faae897bb44d7ab
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
RtlUnwind
ExitProcess
ExitThread
CreateThread
VirtualProtect
VirtualAlloc
GetSystemInfo
GetStartupInfoA
HeapReAlloc
HeapSize
QueryPerformanceCounter
SetUnhandledExceptionFilter
LCMapStringA
LCMapStringW
HeapDestroy
HeapCreate
VirtualFree
IsBadWritePtr
GetStringTypeA
GetStringTypeW
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetTimeZoneInformation
IsBadReadPtr
IsBadCodePtr
SetStdHandle
SetEnvironmentVariableA
GetTickCount
GetFileAttributesA
GetModuleHandleA
FileTimeToLocalFileTime
SetErrorMode
WritePrivateProfileStringA
FileTimeToSystemTime
GetOEMCP
GetCPInfo
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
TlsGetValue
GlobalHandle
GlobalReAlloc
LocalAlloc
GlobalFlags
GetFullPathNameA
DuplicateHandle
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetThreadPriority
GetCurrentThread
lstrcmpA
ConvertDefaultLocale
EnumResourceLanguagesA
InterlockedIncrement
SetLastError
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
LoadLibraryA
lstrcmpW
GetProcAddress
FreeResource
lstrcpynA
HeapFree
GetProcessHeap
HeapAlloc
GetDriveTypeA
GetVolumeInformationA
FormatMessageA
GetTempFileNameA
GetFileSize
InterlockedDecrement
GetFileTime
lstrcpyA
VirtualQuery
ReleaseMutex
LocalFree
GetExitCodeProcess
FreeLibrary
CompareStringW
CompareStringA
GetVersion
MultiByteToWideChar
CopyFileA
CreateDirectoryA
DeleteFileA
CreatePipe
PeekNamedPipe
ReadFile
CreateProcessA
OpenMutexA
GlobalLock
GlobalUnlock
MulDiv
GlobalFree
GlobalAlloc
CreateRemoteThread
OpenProcess
Thread32First
OpenThread
ResumeThread
SuspendThread
Thread32Next
GetSystemTimeAsFileTime
lstrcmpiA
GetTempPathA
CreateToolhelp32Snapshot
Process32First
Process32Next
FindFirstFileA
FindClose
GetLocalTime
GetCurrentThreadId
lstrcatA
GetCurrentProcessId
CreateFileA
SetFilePointer
WriteFile
TryEnterCriticalSection
LeaveCriticalSection
EnterCriticalSection
GetCommandLineA
ResetEvent
WaitForSingleObject
SetEvent
Sleep
GetCurrentProcess
TerminateProcess
CloseHandle
CreateEventA
CreateMutexA
GetModuleFileNameA
DeleteCriticalSection
InitializeCriticalSection
RaiseException
lstrlenA
GetLastError
lstrcmpiW
WideCharToMultiByte
FindResourceA
LoadResource
LockResource
SizeofResource
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
UnhandledExceptionFilter
user32
RegisterClipboardFormatA
MessageBeep
GetNextDlgGroupItem
ReleaseCapture
SetCapture
InvalidateRgn
CopyAcceleratorTableA
IsRectEmpty
DestroyMenu
GetSysColorBrush
WindowFromPoint
SetWindowContextHelpId
MapDialogRect
GetCursorPos
ValidateRect
PostQuitMessage
GetWindowDC
ClientToScreen
DrawTextExA
TabbedTextOutA
CharNextA
SetMenuItemBitmaps
ModifyMenuA
GetMenuState
EnableMenuItem
CheckMenuItem
GetMenuCheckMarkDimensions
LoadBitmapA
SetWindowTextA
IsDialogMessageA
RegisterWindowMessageA
WinHelpA
GetCapture
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassInfoExA
GetClassNameA
SendDlgItemMessageA
IsChild
GetWindowTextLengthA
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
GetParent
EnableWindow
PostMessageA
DestroyWindow
ReleaseDC
FillRect
GetDC
GetWindowRect
GetDesktopWindow
EndPaint
GetClientRect
BeginPaint
DefWindowProcA
UpdateWindow
MapWindowPoints
GetKeyState
GetMenu
GetSubMenu
GetMenuItemID
GetMenuItemCount
AdjustWindowRectEx
ScreenToClient
EqualRect
GetClassInfoA
CallWindowProcA
SetWindowLongA
IntersectRect
SystemParametersInfoA
GetWindowPlacement
PtInRect
GetWindow
GetActiveWindow
SetActiveWindow
CreateDialogIndirectParamA
IsWindow
GetWindowLongA
GetDlgItem
GetNextDlgTabItem
EndDialog
RegisterClassA
IsWindowVisible
PostThreadMessageA
GetFocus
FindWindowA
GetMessageA
TranslateMessage
DispatchMessageA
RemovePropA
GetPropA
IsWindowEnabled
SetPropA
PeekMessageA
ShowWindow
CreateWindowExA
GetSystemMetrics
RegisterClassExA
LoadCursorA
DrawTextA
SendMessageA
LoadIconA
UnregisterClassA
wsprintfW
MessageBoxA
DrawIcon
IsIconic
RedrawWindow
wsprintfA
SetTimer
KillTimer
ShowCursor
LoadImageA
GetSysColor
CopyRect
InvalidateRect
SetRect
CharUpperA
OffsetRect
SetCursor
SetFocus
SetForegroundWindow
MoveWindow
SetWindowRgn
SetWindowPos
GetDlgCtrlID
GrayStringA
gdi32
GetViewportExtEx
GetRgnBox
CreateRectRgnIndirect
ExtSelectClipRgn
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
Escape
ExtTextOutA
RectVisible
PtVisible
GetWindowExtEx
CreateFontIndirectA
SetTextAlign
RestoreDC
SaveDC
GetTextColor
GetBkColor
GetClipBox
DPtoLP
GetMapMode
SetMapMode
CreateBitmap
ExtCreateRegion
GetViewportOrgEx
SetViewportOrgEx
Rectangle
GetObjectA
GetDeviceCaps
CreateFontA
GetPixel
SetBkColor
TextOutA
SetBkMode
SetTextColor
DeleteObject
DeleteDC
BitBlt
CreateSolidBrush
SelectObject
CreateCompatibleBitmap
CreateCompatibleDC
GetStockObject
msimg32
AlphaBlend
TransparentBlt
comdlg32
GetFileTitleA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
RegDeleteValueA
RegOpenKeyExA
RegSetValueExA
RegCloseKey
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
RegQueryValueExA
RegEnumKeyExA
InitiateSystemShutdownA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegQueryValueA
RegEnumKeyA
RegDeleteKeyA
RegOpenKeyA
RegCreateKeyExA
CryptAcquireContextA
CryptCreateHash
CryptHashData
CryptGetHashParam
CryptDestroyHash
CryptReleaseContext
GetUserNameA
shell32
SHGetSpecialFolderPathA
SHFileOperationA
ShellExecuteA
comctl32
_TrackMouseEvent
ord17
shlwapi
SHDeleteValueA
SHDeleteKeyA
SHRegGetUSValueA
SHRegSetUSValueA
PathFindExtensionA
PathFindFileNameA
PathStripToRootA
PathIsUNCA
oledlg
ord8
ole32
CoCreateInstance
CoInitialize
OleFlushClipboard
CoTaskMemFree
CoTaskMemAlloc
CLSIDFromProgID
CLSIDFromString
CoGetClassObject
StgOpenStorageOnILockBytes
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
OleUninitialize
CoFreeUnusedLibraries
OleInitialize
CoRevokeClassObject
OleIsCurrentClipboard
CoRegisterMessageFilter
CreateStreamOnHGlobal
oleaut32
VariantCopy
VariantClear
SysAllocString
VariantInit
SysFreeString
OleLoadPicture
VariantChangeType
SysAllocStringLen
SysStringLen
SysAllocStringByteLen
OleCreateFontIndirect
SafeArrayDestroy
SystemTimeToVariantTime
urlmon
URLDownloadToCacheFileA
wininet
InternetCloseHandle
InternetReadFile
HttpSendRequestA
HttpOpenRequestA
InternetConnectA
InternetOpenA
InternetQueryOptionA
InternetOpenUrlA
ws2_32
gethostbyname
WSAStartup
winmm
PlaySoundA
psapi
GetModuleBaseNameA
GetModuleFileNameExA
EnumProcessModules
EnumProcesses
Sections
.text Size: 224KB - Virtual size: 224KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 66KB - Virtual size: 66KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3.1MB - Virtual size: 3.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4.5MB - Virtual size: 4.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ