Static task
static1
Behavioral task
behavioral1
Sample
80549334c970850c93636cc5d9d37acab9a1d1d73f16b61f93365741dd5acfab.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
80549334c970850c93636cc5d9d37acab9a1d1d73f16b61f93365741dd5acfab.exe
Resource
win10v2004-20220812-en
General
-
Target
80549334c970850c93636cc5d9d37acab9a1d1d73f16b61f93365741dd5acfab
-
Size
457KB
-
MD5
b64343c013e5605f809bcfcfe5ce6697
-
SHA1
d19894583b8c938c83a30314d249ddf8e9c8c24b
-
SHA256
80549334c970850c93636cc5d9d37acab9a1d1d73f16b61f93365741dd5acfab
-
SHA512
c768ae703c36f48b0107ff1e67d3b649ff9b4a7588b54344f2e2f2009aff3b92adecc117e085915319e2dc45fb153e1d895cb751683101e3bc161aad397f157f
-
SSDEEP
6144:WpjGUJnpmYS3wmIT42GQJ12JhP4gjOa/bJeHpexzB7Sa/R1RR77NvEcjEfTtHk27:WpRfmpAz12v4owHpexVtXRp7NvEcS/z
Malware Config
Signatures
Files
-
80549334c970850c93636cc5d9d37acab9a1d1d73f16b61f93365741dd5acfab.exe windows x86
06a6f5e1661d5377d8cc9dc60f763ae8
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LockFile
UnlockFile
SetEndOfFile
GetFileSize
DuplicateHandle
GetVolumeInformationA
GetFullPathNameA
GetCPInfo
GetOEMCP
GetFileSizeEx
GetFileTime
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
ExitProcess
RtlUnwind
RaiseException
VirtualProtect
VirtualAlloc
GetSystemInfo
HeapReAlloc
HeapSize
SetStdHandle
GetFileType
GetACP
IsValidCodePage
LCMapStringA
GetStdHandle
FlushFileBuffers
InitializeCriticalSectionAndSpinCount
HeapCreate
VirtualFree
GetConsoleCP
GetConsoleMode
CompareStringW
SetHandleCount
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetTimeZoneInformation
GetDriveTypeA
GetStringTypeA
GetStringTypeW
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEnvironmentVariableA
GetThreadLocale
GlobalFlags
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
GlobalHandle
GlobalReAlloc
TlsGetValue
GetModuleHandleW
LocalAlloc
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
GlobalGetAtomNameA
GlobalFindAtomA
lstrcmpW
GetVersionExA
GlobalAddAtomA
FileTimeToLocalFileTime
FileTimeToSystemTime
GetModuleFileNameW
GlobalDeleteAtom
GetCurrentThread
GetCurrentThreadId
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
CompareStringA
InterlockedExchange
SetLastError
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
MulDiv
SetFileTime
GetFileAttributesA
LocalFileTimeToFileTime
SystemTimeToFileTime
SetFilePointer
TerminateThread
CreateThread
WritePrivateProfileStringA
GetPrivateProfileStringA
GetCurrentDirectoryA
FreeResource
InterlockedDecrement
InterlockedIncrement
IsWow64Process
GetCurrentProcess
GetVersion
GetTickCount
WaitForSingleObject
VirtualQuery
GetCurrentProcessId
Module32Next
Module32First
Process32Next
GetExitCodeProcess
TerminateProcess
OpenProcess
Process32First
CreateToolhelp32Snapshot
FindNextFileA
MoveFileA
MultiByteToWideChar
GetModuleFileNameA
FindClose
CreateDirectoryA
FindFirstFileA
LoadLibraryExA
SetErrorMode
FormatMessageA
LocalFree
FreeLibrary
LoadLibraryA
lstrcmpA
lstrlenW
GetCommandLineA
HeapFree
GetProcessHeap
HeapAlloc
ReadFile
CreateProcessA
GetStartupInfoA
CreatePipe
CloseHandle
GetLastError
WriteFile
CreateFileA
DeleteFileA
lstrcatA
GetModuleHandleA
GetProcAddress
GetLocalTime
FindResourceA
LoadResource
LockResource
SizeofResource
CopyFileA
Sleep
WideCharToMultiByte
LCMapStringW
lstrlenA
user32
CharUpperA
UnregisterClassA
MessageBeep
GetNextDlgGroupItem
ReleaseCapture
SetCapture
InvalidateRgn
InvalidateRect
SetRect
IsRectEmpty
CopyAcceleratorTableA
CharNextA
LoadCursorA
GetSysColorBrush
ShowWindow
SetWindowTextA
IsDialogMessageA
EndPaint
BeginPaint
GetWindowDC
ReleaseDC
GetDC
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
SendDlgItemMessageA
WinHelpA
IsChild
GetCapture
GetClassLongA
SetPropA
GetPropA
RemovePropA
SetFocus
GetWindowTextA
GetTopWindow
GetMessageTime
GetMessagePos
DestroyMenu
SetMenu
UpdateWindow
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
GetSysColor
AdjustWindowRectEx
EqualRect
CopyRect
PtInRect
GetDlgCtrlID
DefWindowProcA
MessageBoxA
PostMessageA
LoadIconA
SendMessageA
CallWindowProcA
GetMenu
SetWindowLongA
OffsetRect
IntersectRect
SystemParametersInfoA
GetWindowPlacement
GetLastActivePopup
SetCursor
SetWindowsHookExA
CallNextHookEx
GetMessageA
IsWindowVisible
GetKeyState
GetCursorPos
ValidateRect
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
ModifyMenuA
EnableMenuItem
CheckMenuItem
UnhookWindowsHookEx
GetDesktopWindow
GetActiveWindow
RegisterClipboardFormatA
PostThreadMessageA
MapWindowPoints
SetTimer
KillTimer
IsIconic
GetSystemMetrics
GetClientRect
DrawIcon
EnableWindow
GetWindowRect
GetClassNameA
GetWindowThreadProcessId
GetForegroundWindow
GetFocus
SetForegroundWindow
RegisterWindowMessageA
wsprintfA
EnumWindows
PeekMessageA
TranslateMessage
DispatchMessageA
GetSubMenu
GetMenuItemCount
GetMenuItemID
GetMenuState
PostQuitMessage
SetWindowPos
MapDialogRect
GetParent
SetWindowContextHelpId
GetWindow
EndDialog
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
IsWindow
GetWindowLongA
GetDlgItem
IsWindowEnabled
GetNextDlgTabItem
MoveWindow
gdi32
GetMapMode
GetRgnBox
CreateRectRgnIndirect
GetTextColor
GetBkColor
GetStockObject
DeleteDC
ExtSelectClipRgn
ScaleWindowExtEx
SetWindowExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetWindowExtEx
GetViewportExtEx
DeleteObject
SetMapMode
RestoreDC
SaveDC
GetObjectA
SetBkColor
SetTextColor
GetClipBox
CreateBitmap
GetDeviceCaps
ScaleViewportExtEx
comdlg32
GetFileTitleA
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
advapi32
CryptHashData
RegQueryValueA
RegEnumKeyA
CryptReleaseContext
CryptDestroyHash
CryptGetHashParam
CryptCreateHash
CryptAcquireContextA
RegOpenKeyA
RegEnumKeyExA
RegDeleteValueA
RegSetValueExA
RegCreateKeyExA
RegDeleteKeyA
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
shell32
SHChangeNotify
ShellExecuteA
SHGetFolderPathA
ShellExecuteExA
SHGetSpecialFolderPathA
shlwapi
PathRemoveFileSpecA
PathFindFileNameA
PathFindExtensionA
PathStripToRootA
PathIsUNCA
PathAddBackslashA
PathRemoveBackslashA
oledlg
ord8
ole32
OleInitialize
OleUninitialize
CoTaskMemFree
CoTaskMemAlloc
OleRun
CLSIDFromString
CoGetClassObject
StgOpenStorageOnILockBytes
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
CoFreeUnusedLibraries
CoRevokeClassObject
OleIsCurrentClipboard
OleFlushClipboard
CoRegisterMessageFilter
CoInitialize
CoCreateInstance
CoUninitialize
CLSIDFromProgID
oleaut32
SysStringLen
SysAllocStringByteLen
VariantInit
VariantCopy
VariantChangeType
SysAllocStringLen
SafeArrayDestroy
VariantTimeToSystemTime
SystemTimeToVariantTime
OleCreateFontIndirect
SysAllocString
SysFreeString
GetErrorInfo
VariantClear
urlmon
URLOpenBlockingStreamA
URLDownloadToFileA
wininet
DeleteUrlCacheEntry
netapi32
Netbios
Sections
.text Size: 336KB - Virtual size: 335KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 73KB - Virtual size: 73KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 41KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ