Static task
static1
Behavioral task
behavioral1
Sample
43c0d0b5c5cfc1580c12b4ce18ccc6d4d7a24f7f8b9dc87be0a1a7f5df65e2b1.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
43c0d0b5c5cfc1580c12b4ce18ccc6d4d7a24f7f8b9dc87be0a1a7f5df65e2b1.exe
Resource
win10v2004-20220901-en
General
-
Target
43c0d0b5c5cfc1580c12b4ce18ccc6d4d7a24f7f8b9dc87be0a1a7f5df65e2b1
-
Size
294KB
-
MD5
0821d0f1fa81a6fe835b59a67b94c5a6
-
SHA1
b48cc09f0bcdbf642baac072dc51240937661de3
-
SHA256
43c0d0b5c5cfc1580c12b4ce18ccc6d4d7a24f7f8b9dc87be0a1a7f5df65e2b1
-
SHA512
441f7b33402e4df2a588b6e2f0e4e3706646c6f991c4bc6641dcf37bb577c4d02d87246175657ac951cff29e7bd251d753ac066cb83e3982ce4ff9a6716dc6e0
-
SSDEEP
6144:C6K9TBmqHF5PfhfGeF+K2kmHBltsMzj5amf+VrBMS2JAX7Dhlyh+Ib/rexZ98E:C6K9ToqHF59GeFHMH/SOj5aE+Vl4WX7v
Malware Config
Signatures
Files
-
43c0d0b5c5cfc1580c12b4ce18ccc6d4d7a24f7f8b9dc87be0a1a7f5df65e2b1.exe windows x86
f7d6b8c9a047bf737e89207fc4a691d5
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ntdll
RtlUnwind
NtQueryInformationProcess
LdrLoadDll
LdrGetDllHandle
kernel32
CreateEventW
TlsAlloc
TlsFree
lstrcmpiA
lstrcmpiW
VirtualProtect
ReleaseMutex
CreateThread
VirtualQueryEx
ReadProcessMemory
VirtualProtectEx
VirtualAllocEx
WriteProcessMemory
GetCommandLineW
GetDriveTypeW
GetSystemDefaultUILanguage
GetLogicalDrives
GetProcessTimes
GetModuleFileNameW
lstrcmpW
GlobalMemoryStatusEx
GetUserDefaultUILanguage
GetDiskFreeSpaceExW
GetVolumeInformationW
Sleep
TlsGetValue
TlsSetValue
TerminateProcess
ResetEvent
LoadLibraryA
InterlockedIncrement
InterlockedDecrement
QueryPerformanceCounter
ExitProcess
WTSGetActiveConsoleSessionId
FlushFileBuffers
TryEnterCriticalSection
WaitForMultipleObjects
HeapReAlloc
GetProcessHeap
GetExitCodeThread
GetHandleInformation
IsBadReadPtr
OpenMutexW
SetErrorMode
GetComputerNameW
lstrcatW
OpenEventW
DuplicateHandle
GetCurrentProcessId
CreateProcessW
ResumeThread
MoveFileExW
SetEndOfFile
SetFilePointerEx
SetFileTime
GetFileTime
DeleteFileW
GetFileInformationByHandle
UnregisterWait
RegisterWaitForSingleObject
VirtualQuery
GetCurrentProcess
InterlockedCompareExchange
FlushInstructionCache
GetEnvironmentVariableW
OpenProcess
Thread32First
Thread32Next
CreateToolhelp32Snapshot
TerminateThread
CreateRemoteThread
Process32FirstW
Process32NextW
GetVolumeNameForVolumeMountPointW
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetTempFileNameW
FindFirstFileW
CreateDirectoryW
VirtualFree
WriteFile
GetFileAttributesW
ReadFile
CreateFileW
GetTempPathW
GetFileSizeEx
VirtualAlloc
FindClose
RemoveDirectoryW
FindNextFileW
CloseHandle
SetFileAttributesW
ExpandEnvironmentStringsW
lstrlenA
lstrlenW
LocalFree
HeapAlloc
HeapFree
GetModuleHandleW
InitializeCriticalSection
HeapDestroy
HeapCreate
GetLastError
SetFilePointer
OutputDebugStringA
SetLastError
GetProcAddress
DeleteCriticalSection
FileTimeToDosDateTime
CreateFileMappingW
DosDateTimeToFileTime
lstrcmpA
lstrcpynA
FreeLibrary
LoadLibraryW
FileTimeToLocalFileTime
lstrcpyW
lstrcpyA
GetThreadContext
SetThreadContext
VirtualFreeEx
GetProcessId
GlobalLock
GetTickCount
LeaveCriticalSection
GlobalUnlock
EnterCriticalSection
WideCharToMultiByte
MultiByteToWideChar
GetNativeSystemInfo
GetVersionExW
SystemTimeToFileTime
GetTimeZoneInformation
GetLocalTime
GetSystemTime
WaitForSingleObject
GetCurrentThreadId
GetCurrentThread
SetThreadPriority
CreateMutexW
MapViewOfFile
UnmapViewOfFile
SetEvent
user32
SetKeyboardState
GetSubMenu
DefDlgProcW
DefFrameProcA
OpenInputDesktop
OpenDesktopW
MenuItemFromPoint
GetMenu
RegisterClassExW
GetMenuItemRect
TrackPopupMenuEx
GetClassNameW
GetMenuState
DefWindowProcA
DefMDIChildProcW
CloseDesktop
GetProcessWindowStation
CreateWindowStationW
CloseWindowStation
SetProcessWindowStation
CreateDesktopW
GetSystemMetrics
PostMessageW
MapVirtualKeyW
FillRect
GetMenuItemID
CharUpperW
IsRectEmpty
PrintWindow
EqualRect
GetDCEx
IntersectRect
GetUpdateRect
BeginPaint
GetWindowRect
GetParent
GetClassLongW
GetWindowInfo
SetWindowPos
IsWindow
MapWindowPoints
ExitWindowsEx
MsgWaitForMultipleObjects
DispatchMessageW
DrawIcon
GetIconInfo
CharToOemW
GetMessageA
SetCapture
GetCapture
SetCursorPos
GetThreadDesktop
RegisterWindowMessageW
RegisterClassExA
OpenWindowStationW
GetLastInputInfo
SwitchDesktop
GetMenuItemCount
DefDlgProcA
PostThreadMessageW
DefMDIChildProcA
HiliteMenuItem
PeekMessageW
PeekMessageA
GetCursorPos
ReleaseCapture
RegisterClassW
GetUserObjectInformationW
SendMessageW
CallWindowProcA
EndMenu
CallWindowProcW
DefWindowProcW
DefFrameProcW
GetWindowThreadProcessId
RegisterClassA
GetShellWindow
GetTopWindow
LoadImageW
WindowFromPoint
GetDC
GetWindowLongW
ReleaseDC
SetWindowLongW
GetMessagePos
CharLowerW
EndPaint
GetUpdateRgn
GetMessageW
GetWindowDC
SetThreadDesktop
SendMessageTimeoutW
GetWindow
TranslateMessage
GetKeyboardState
GetClipboardData
ToUnicode
CharLowerA
DrawEdge
SystemParametersInfoW
GetAncestor
advapi32
LookupPrivilegeValueW
CryptAcquireContextW
CryptReleaseContext
CryptCreateHash
CryptDestroyHash
CryptHashData
GetTokenInformation
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
ConvertStringSecurityDescriptorToSecurityDescriptorW
GetSecurityDescriptorSacl
SetSecurityDescriptorSacl
CryptVerifySignatureW
CryptGetKeyParam
CryptImportKey
CryptDestroyKey
EqualSid
IsWellKnownSid
GetLengthSid
ConvertSidToStringSidW
RegCreateKeyExW
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
RegSetValueExW
OpenProcessToken
GetSidSubAuthority
InitiateSystemShutdownExW
AdjustTokenPrivileges
CryptGetHashParam
CreateProcessAsUserW
GetSidSubAuthorityCount
OpenThreadToken
shlwapi
PathAddBackslashW
PathIsURLW
ord14
SHDeleteKeyW
SHDeleteValueW
UrlUnescapeA
PathMatchSpecW
PathRemoveExtensionW
PathFindExtensionW
PathQuoteSpacesW
PathGetDriveNumberW
StrCmpNIA
StrChrA
StrCmpNW
StrCmpNIW
StrChrW
StrCmpIW
StrRChrA
StrCmpNA
PathAddExtensionW
PathRemoveFileSpecW
PathIsDirectoryW
PathFindFileNameW
wvnsprintfA
wvnsprintfW
PathUnquoteSpacesW
PathSkipRootW
PathRemoveBackslashW
shell32
ShellExecuteW
CommandLineToArgvW
SHGetFolderPathW
secur32
EncryptMessage
DecryptMessage
DeleteSecurityContext
GetUserNameExW
ole32
CoInitializeEx
CoInitializeSecurity
CoSetProxyBlanket
CoUninitialize
CoCreateInstance
CoTaskMemFree
CreateStreamOnHGlobal
CLSIDFromString
StringFromGUID2
gdi32
SetViewportOrgEx
CreateDCW
GdiFlush
GetDIBits
CreateDIBSection
SetRectRgn
SaveDC
RestoreDC
DeleteDC
DeleteObject
SelectObject
CreateCompatibleDC
CreateCompatibleBitmap
GetDeviceCaps
BitBlt
ws2_32
getaddrinfo
select
shutdown
WSACleanup
recv
bind
socket
freeaddrinfo
WSAStartup
WSACloseEvent
WSAIoctl
WSAAddressToStringW
WSAEnumNetworkEvents
WSAEventSelect
setsockopt
WSACreateEvent
getsockopt
WSAAddressToStringA
WSAStringToAddressW
WSARecv
WSASend
closesocket
send
listen
accept
WSAGetLastError
WSASetLastError
getpeername
sendto
getsockname
recvfrom
WSAGetOverlappedResult
connect
crypt32
CertOpenSystemStoreW
CertDuplicateCertificateContext
PFXExportCertStoreEx
CryptUnprotectData
CertDeleteCertificateFromStore
CertEnumCertificatesInStore
CertCloseStore
PFXImportCertStore
wininet
InternetQueryOptionA
InternetCloseHandle
InternetOpenA
HttpSendRequestA
HttpAddRequestHeadersA
HttpOpenRequestA
InternetSetOptionA
InternetReadFile
InternetConnectA
HttpQueryInfoA
InternetCrackUrlA
oleaut32
VariantInit
SysAllocString
VariantClear
SysFreeString
netapi32
NetUserGetInfo
NetUserEnum
NetApiBufferFree
iphlpapi
GetAdaptersAddresses
msvcrt
_except_handler3
_errno
memcpy
memset
memcmp
_purecall
memmove
strcmp
strtoul
_ultow
memchr
_vsnwprintf
_vsnprintf
abs
version
GetFileVersionInfoSizeW
VerQueryValueW
GetFileVersionInfoW
Sections
.text Size: 275KB - Virtual size: 275KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ