Static task
static1
Behavioral task
behavioral1
Sample
8d29f1063e020dddd1dfd562aab964d05d9632b71f4b689c0c73381e51d96fad.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
8d29f1063e020dddd1dfd562aab964d05d9632b71f4b689c0c73381e51d96fad.exe
Resource
win10v2004-20220812-en
General
-
Target
8d29f1063e020dddd1dfd562aab964d05d9632b71f4b689c0c73381e51d96fad
-
Size
257KB
-
MD5
a63419adab0d70f44851d702a432017a
-
SHA1
66cfa0bfc6147cd41eaffec7f2d4dd1c3dec235b
-
SHA256
8d29f1063e020dddd1dfd562aab964d05d9632b71f4b689c0c73381e51d96fad
-
SHA512
0d1ee0101769fe7c82da76cfdc30f9118fbbf5a273b6545c3f17e4e8f73ee019ce9a9dc3412691e355f8ac5b64d821792ddd8ebbe301dc7c2553f79c1f29e1e5
-
SSDEEP
6144:rhPMhPbvrs+3hcHICis1ed00b9/oQoHv1a0weSMb3QGL:KgYoINs1ed0Uo3dZ1j
Malware Config
Signatures
Files
-
8d29f1063e020dddd1dfd562aab964d05d9632b71f4b689c0c73381e51d96fad.exe windows x86
aae7ca1716a138a64f16a8e556834f50
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
urlmon
FindMimeFromData
oleaut32
VariantTimeToSystemTime
SysAllocStringLen
SysFreeString
SystemTimeToVariantTime
SysAllocString
ole32
CoCreateGuid
CLSIDFromString
CoCreateInstance
CoTaskMemFree
StringFromCLSID
kernel32
ExpandEnvironmentStringsA
GetExitCodeThread
GetWindowsDirectoryW
TerminateThread
CreateEventW
FreeLibrary
LocalUnlock
CreateNamedPipeW
FindNextFileW
DisconnectNamedPipe
FlushViewOfFile
MulDiv
SetFilePointer
GetDiskFreeSpaceExW
GlobalLock
WideCharToMultiByte
LeaveCriticalSection
CreateProcessW
CreateIoCompletionPort
lstrcmpiW
SetUnhandledExceptionFilter
LockResource
FindFirstFileW
LocalAlloc
ExitThread
GetPrivateProfileStringW
GetProcessHeap
GetTempPathW
GetUserDefaultLangID
OpenEventW
SizeofResource
GetSystemTimeAsFileTime
GlobalUnlock
ReadFile
MapViewOfFile
LoadResource
GetTempFileNameW
LCMapStringW
FindClose
WaitForSingleObject
SetEndOfFile
GetFileSize
CreateMutexW
DeviceIoControl
SetThreadLocale
UnhandledExceptionFilter
TlsAlloc
CloseHandle
RaiseException
ReleaseMutex
CreateEventA
GetShortPathNameW
HeapAlloc
GetNumberFormatW
UnmapViewOfFile
SetLastError
IsDebuggerPresent
GetTimeFormatW
LocalFree
GetLocalTime
CopyFileW
GetModuleHandleW
WaitForMultipleObjects
OutputDebugStringW
lstrcmpW
GetCurrencyFormatW
EnterCriticalSection
GetSystemDirectoryA
CreateThread
TlsGetValue
ConnectNamedPipe
GlobalAlloc
GetThreadLocale
CreateDirectoryW
ExpandEnvironmentStringsW
FileTimeToSystemTime
GetDateFormatW
WaitNamedPipeW
CreateFileMappingA
Process32FirstW
SetProcessWorkingSetSize
GetUserDefaultLCID
FlushFileBuffers
GetCurrentThreadId
FindResourceW
DeleteCriticalSection
FindResourceA
Process32NextW
CreateFileW
CreateToolhelp32Snapshot
LoadLibraryExW
HeapFree
GetTempPathA
GetQueuedCompletionStatus
GetACP
GetSystemDirectoryW
SystemTimeToFileTime
WriteFile
DeleteFileW
GetTempFileNameA
TlsSetValue
OpenProcess
InitializeCriticalSectionAndSpinCount
VirtualAlloc
version
VerQueryValueW
GetFileVersionInfoSizeW
GetFileVersionInfoW
wininet
InternetGetLastResponseInfoA
InternetOpenA
HttpOpenRequestA
InternetConnectA
InternetCloseHandle
HttpSendRequestA
InternetCanonicalizeUrlW
HttpQueryInfoA
InternetSetOptionA
InternetQueryOptionA
InternetReadFile
InternetCombineUrlA
shlwapi
PathFileExistsW
PathIsDirectoryW
ColorHLSToRGB
PathCompactPathW
ColorRGBToHLS
advapi32
AllocateAndInitializeSid
OpenThreadToken
EqualSid
RegEnumKeyExW
AddAccessAllowedAce
InitializeAcl
RegQueryValueExA
FreeSid
RegQueryValueExW
RegOpenKeyExA
OpenSCManagerW
InitializeSecurityDescriptor
OpenServiceW
RegEnumValueW
GetTokenInformation
RegCloseKey
IsTextUnicode
RegOpenKeyExW
SetSecurityDescriptorDacl
GetLengthSid
OpenProcessToken
RegOpenKeyW
CloseServiceHandle
winmm
timeGetDevCaps
timeGetTime
timeKillEvent
timeSetEvent
PlaySoundA
gdi32
LPtoDP
GetCurrentPositionEx
GetPixel
SetWindowOrgEx
SetBkColor
GetClipBox
DPtoLP
BitBlt
SaveDC
DeleteDC
CreateCompatibleBitmap
SetLayout
SetBrushOrgEx
CreatePatternBrush
GetTextExtentPointW
GetViewportExtEx
GetCurrentObject
GetObjectW
SetTextColor
GetDIBits
IntersectClipRect
CreateFontIndirectW
CreateHatchBrush
CreateDIBPatternBrushPt
SetBkMode
AddFontMemResourceEx
GetDeviceCaps
SetMapMode
SetViewportOrgEx
GetTextAlign
DeleteObject
CreateDIBSection
ExtTextOutW
GetTextExtentPoint32A
Polygon
StretchBlt
GetObjectA
CombineRgn
EnumFontFamiliesExW
SetWindowExtEx
GetWindowOrgEx
SetViewportExtEx
SelectObject
SetTextAlign
RectVisible
PatBlt
CreateRectRgnIndirect
ExtCreatePen
CreateRoundRectRgn
PtVisible
GetTextExtentExPointW
Escape
GetTextMetricsA
Rectangle
CreatePen
CreateSolidBrush
SetStretchBltMode
GetMapMode
ExcludeClipRect
StretchDIBits
CreateCompatibleDC
TextOutA
TextOutW
GetWindowExtEx
RestoreDC
SetPixel
GetStockObject
CreateFontA
EnumFontFamiliesExA
GetTextExtentPoint32W
CreateBitmap
comdlg32
GetOpenFileNameW
oleacc
AccessibleObjectFromWindow
LresultFromObject
CreateStdAccessibleObject
psapi
EnumProcessModules
GetModuleFileNameExW
comctl32
ImageList_GetIconSize
ImageList_Draw
ImageList_DrawEx
ImageList_GetImageInfo
ord17
user32
DrawFrameControl
IsWindow
GetSysColor
ScreenToClient
DestroyWindow
SetForegroundWindow
GetAsyncKeyState
CreateWindowExA
EnableMenuItem
DrawEdge
SwitchDesktop
LoadCursorW
InvalidateRect
IsClipboardFormatAvailable
IsWindowEnabled
SetMenuDefaultItem
SystemParametersInfoA
DestroyIcon
GetDoubleClickTime
SetWindowsHookExA
GetCursorPos
PostMessageW
MapWindowPoints
GetMonitorInfoW
SetParent
DefWindowProcA
GetClassLongA
WindowFromPoint
GetWindowTextLengthW
RegisterClassExW
GetSystemMetrics
IsIconic
SetTimer
FindWindowW
TrackPopupMenu
NotifyWinEvent
GetWindowPlacement
BeginPaint
GetWindowTextW
SetWindowLongW
GetDC
LoadStringW
SetCursor
SetWindowLongA
IsWindowUnicode
SendMessageTimeoutA
ReleaseCapture
IsChild
EndDeferWindowPos
GetMenuItemCount
GetIconInfo
CloseDesktop
SetScrollInfo
CreateCursor
CheckMenuItem
GetWindowLongW
MessageBeep
FillRect
LoadImageW
UnhookWindowsHookEx
ModifyMenuW
AdjustWindowRectEx
SetScrollRange
GetClientRect
SetWindowPos
GetSubMenu
DispatchMessageW
ValidateRect
ReleaseDC
GetDesktopWindow
GetScrollInfo
DeleteMenu
PtInRect
EnableWindow
SendMessageW
RegisterClassA
GrayStringW
SetCapture
CallWindowProcW
InsertMenuW
OpenClipboard
PostMessageA
OffsetRect
SetClipboardData
EndPaint
GetCapture
GetWindowRect
CharUpperBuffW
GetWindowThreadProcessId
UpdateWindow
CreateWindowExW
IsWindowVisible
KillTimer
LoadMenuW
MapVirtualKeyW
DrawTextA
GetMenuItemID
GetActiveWindow
CopyIcon
CountClipboardFormats
SendMessageA
MonitorFromWindow
SetThreadDesktop
GetFocus
DispatchMessageA
RegisterWindowMessageA
LoadCursorFromFileA
DeferWindowPos
GetScrollPos
MoveWindow
TabbedTextOutW
ClientToScreen
SetWindowRgn
SystemParametersInfoW
RegisterClassW
OpenDesktopW
EnumClipboardFormats
CharLowerBuffW
keybd_event
GetCaretBlinkTime
DrawIconEx
RegisterClipboardFormatW
ScrollWindowEx
GetKeyState
RegisterClassExA
CloseClipboard
ScrollDC
wsprintfW
DrawTextExW
InvertRect
TranslateMessage
RegisterWindowMessageW
GetWindowDC
GetMessageA
RedrawWindow
DefWindowProcW
CallNextHookEx
SendNotifyMessageW
PeekMessageA
GetClassNameW
GetParent
GetDlgCtrlID
CopyRect
GetWindow
LoadCursorA
EmptyClipboard
DrawTextW
DrawIcon
MessageBoxW
GetClipboardData
GetWindowLongA
InflateRect
SetScrollPos
CreateIconFromResourceEx
ShowWindow
LoadIconW
SetFocus
CreateDesktopW
GetMessageW
BeginDeferWindowPos
LoadBitmapW
GetSysColorBrush
DrawFocusRect
msimg32
GradientFill
ws2_32
getservbyname
WSAStartup
htonl
htons
WSAGetLastError
WSASetLastError
WSACleanup
getservbyport
ntohs
inet_addr
gethostbyaddr
gethostbyname
inet_ntoa
shell32
SHBrowseForFolderW
ShellExecuteExW
SHGetMalloc
SHGetFileInfoW
ShellExecuteW
SHGetSpecialFolderLocation
SHGetPathFromIDListW
SHGetDesktopFolder
Shell_NotifyIconW
rpcrt4
NdrClientInitializeNew
NdrFreeBuffer
RpcStringFreeW
NdrConformantArrayMarshall
RpcBindingServerFromClient
NdrPointerFree
NdrGetBuffer
UuidCreate
RpcBindingFree
NdrConformantStringMarshall
NdrConformantStringBufferSize
RpcBindingFromStringBindingW
NdrAllocate
I_RpcGetBuffer
NdrConvert
NdrConformantStringUnmarshall
NdrConformantArrayBufferSize
RpcRaiseException
RpcStringBindingParseW
NdrConformantArrayUnmarshall
NdrServerInitializeNew
RpcStringBindingComposeW
NdrSendReceive
RpcBindingToStringBindingW
odbccp32
SQLGetPrivateProfileString
SelectTransDlg
SQLCreateDataSourceExW
SQLConfigDriverW
SQLInstallDriver
SQLLoadDataSourcesListBox
imgutil
DllCanUnloadNow
Sections
.text Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.cFpZjg Size: 1024B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ITj Size: 512B - Virtual size: 412B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.SmUrX Size: 1024B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.Gsu Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.u Size: 1024B - Virtual size: 994B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.GxPy Size: 1024B - Virtual size: 730B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 213KB - Virtual size: 516KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.WwgYlo Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.r Size: 1024B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ