Static task
static1
Behavioral task
behavioral1
Sample
180e6e42b31d6e6c5a76780fe1bd26ea13bdb4a38b6132b76118c5acfcf84719.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
180e6e42b31d6e6c5a76780fe1bd26ea13bdb4a38b6132b76118c5acfcf84719.exe
Resource
win10v2004-20220812-en
General
-
Target
180e6e42b31d6e6c5a76780fe1bd26ea13bdb4a38b6132b76118c5acfcf84719
-
Size
820KB
-
MD5
6ba9eb55bdca9f7e3cf9ed81bd656110
-
SHA1
f8b6ba951f501f4906b69b76a8a19f49d81b5142
-
SHA256
180e6e42b31d6e6c5a76780fe1bd26ea13bdb4a38b6132b76118c5acfcf84719
-
SHA512
4a812082b6361011334038f71410986700fe7b752710afdebd6bab4c0f311e33a48159d062fb7623d4e34734e6f1c866a270c1a0a6a691e939f306ff4e01a66f
-
SSDEEP
24576:oixScPG85XXxzK8A5/FLTROTATtotBEK:heUHxGXVTitaK
Malware Config
Signatures
Files
-
180e6e42b31d6e6c5a76780fe1bd26ea13bdb4a38b6132b76118c5acfcf84719.exe windows x86
68edb916d1935c559cfc87bcc5cd6ae8
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
UnlockFile
SetEndOfFile
MulDiv
GetLastError
lstrcmpA
WriteFile
InterlockedDecrement
GlobalUnlock
SetUnhandledExceptionFilter
GetCommandLineA
FlushFileBuffers
TlsGetValue
ReadFile
GetACP
SetErrorMode
CloseHandle
RtlUnwind
GetLocaleInfoA
GetConsoleOutputCP
GetFileTime
TerminateProcess
VirtualAlloc
LCMapStringA
GetStdHandle
LeaveCriticalSection
GlobalFree
lstrlenA
GetCommandLineW
FreeEnvironmentStringsA
GetProcessHeap
FreeResource
QueryPerformanceCounter
GetSystemInfo
GetVersionExA
FileTimeToSystemTime
TlsAlloc
CreateFileA
DeleteCriticalSection
SetStdHandle
GetEnvironmentStrings
LocalAlloc
GetThreadLocale
FindClose
ConvertDefaultLocale
Sleep
HeapReAlloc
HeapCreate
HeapSize
HeapFree
InitializeCriticalSection
SetEnvironmentVariableA
GetModuleHandleA
LockFile
WriteConsoleA
LocalFree
FileTimeToLocalFileTime
GlobalHandle
GetOEMCP
HeapDestroy
DuplicateHandle
GetCurrentProcessId
UnhandledExceptionFilter
InterlockedExchange
TlsSetValue
InterlockedIncrement
SystemTimeToFileTime
IsDebuggerPresent
GlobalLock
SetHandleCount
LoadResource
HeapAlloc
GetSystemTimeAsFileTime
GetTimeZoneInformation
LockResource
GetSystemDirectoryA
VirtualFree
GlobalDeleteAtom
GetConsoleCP
GlobalReAlloc
LocalReAlloc
SetFileTime
FreeLibrary
GetStartupInfoA
GetCurrentThread
TlsFree
LocalFileTimeToFileTime
GetWindowsDirectoryA
GetStringTypeA
GlobalFlags
RaiseException
GlobalAlloc
GetConsoleMode
GetVersion
EnumResourceLanguagesW
SizeofResource
VirtualQuery
SetLastError
GetFileType
EnterCriticalSection
CompareStringA
GetFileSize
SetFilePointer
lstrcpyA
GetCurrentThreadId
LoadLibraryA
GetProcAddress
lstrcatA
GetModuleFileNameA
ExitProcess
user32
PtInRect
DestroyIcon
GetLastActivePopup
GetWindowRect
GetDC
GetWindow
InflateRect
IsWindow
ValidateRect
BeginDeferWindowPos
AdjustWindowRectEx
GetNextDlgTabItem
GetTopWindow
MessageBeep
SetCursor
SetRectEmpty
EnableMenuItem
GetScrollPos
SetActiveWindow
GetWindowRgn
GetWindowPlacement
EqualRect
LockWindowUpdate
CreatePopupMenu
GetForegroundWindow
WindowFromPoint
IsZoomed
UnpackDDElParam
GetWindowDC
GetScrollRange
SetParent
GetSystemMenu
TrackPopupMenu
ReleaseDC
GetMenuCheckMarkDimensions
GetParent
ScreenToClient
FillRect
GetMenuState
SetCapture
SetScrollInfo
DeferWindowPos
SendDlgItemMessageA
GetDCEx
InvalidateRect
SetFocus
SetTimer
KillTimer
CheckMenuItem
SetScrollRange
DestroyMenu
GetSysColor
TranslateMessage
GetCursorPos
PostQuitMessage
ShowOwnedPopups
ClientToScreen
UpdateWindow
SetWindowRgn
SetRect
GetMessagePos
CopyRect
GetKeyState
IsWindowVisible
SetWindowContextHelpId
GetNextDlgGroupItem
DestroyWindow
GetClientRect
BeginPaint
ReuseDDElParam
SetWindowPos
DrawIcon
DeleteMenu
IsChild
MapWindowPoints
ScrollWindow
IntersectRect
SetMenuItemBitmaps
GetMenu
GetSysColorBrush
GetWindowThreadProcessId
EndPaint
SetForegroundWindow
MoveWindow
ShowScrollBar
CallNextHookEx
IsIconic
RedrawWindow
OffsetRect
GetActiveWindow
GetDesktopWindow
GetCapture
EndDeferWindowPos
GetDlgItem
GetScrollInfo
SetMenu
UnregisterClassA
GetSystemMetrics
MapDialogRect
GetMessageTime
GetMenuItemCount
IsRectEmpty
EndDialog
BringWindowToTop
InvalidateRgn
ReleaseCapture
ShowWindow
GetSubMenu
SetScrollPos
GetFocus
GetDlgCtrlID
UnhookWindowsHookEx
GetMenuItemID
IsWindowEnabled
CharUpperA
SystemParametersInfoA
gdi32
SelectClipRgn
Ellipse
SetViewportOrgEx
PtVisible
CreatePatternBrush
GetPixel
Escape
CreateBitmap
StretchDIBits
PatBlt
DeleteDC
ScaleViewportExtEx
SetViewportExtEx
GetRgnBox
SetRectRgn
GetDeviceCaps
GetMapMode
SetTextColor
ScaleWindowExtEx
CreateRectRgnIndirect
ExcludeClipRect
CombineRgn
IntersectClipRect
CreateEllipticRgn
CreateSolidBrush
GetBkColor
DeleteObject
SetBkMode
CreateCompatibleBitmap
RestoreDC
GetStockObject
SetBkColor
GetTextColor
RectVisible
GetClipBox
SelectObject
SetMapMode
OffsetRgn
CreateCompatibleDC
OffsetViewportOrgEx
DPtoLP
GetWindowExtEx
SetWindowExtEx
SaveDC
BitBlt
CreateRectRgn
ExtSelectClipRgn
advapi32
SetFileSecurityW
RegCloseKey
ole32
CoGetClassObject
CoCreateInstance
OleUninitialize
CLSIDFromProgID
OleIsCurrentClipboard
CLSIDFromString
StgOpenStorageOnILockBytes
CoFreeUnusedLibraries
CreateStreamOnHGlobal
OleInitialize
CoRegisterMessageFilter
StgCreateDocfileOnILockBytes
OleFlushClipboard
CreateILockBytesOnHGlobal
CoRevokeClassObject
oleaut32
SystemTimeToVariantTime
VariantChangeType
SysStringLen
VariantCopy
VariantClear
SysAllocString
SysFreeString
VariantInit
SysAllocStringLen
VariantTimeToSystemTime
OleCreateFontIndirect
OleLoadPicture
SafeArrayDestroy
comctl32
ImageList_LoadImageW
shlwapi
PathRemoveExtensionW
PathFindExtensionW
PathStripToRootW
PathIsUNCW
PathFileExistsW
PathFindFileNameW
snmpapi
SnmpUtilMemAlloc
SnmpUtilMemFree
Sections
.text Size: 555KB - Virtual size: 554KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 85KB - Virtual size: 85KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 153KB - Virtual size: 5.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: - Virtual size: 101B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ