Static task
static1
Behavioral task
behavioral1
Sample
27d731a3a89e79dd89b9a6699bf4f21ca8dabe10b5bc1312f9779161bf91cb7f.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
27d731a3a89e79dd89b9a6699bf4f21ca8dabe10b5bc1312f9779161bf91cb7f.exe
Resource
win10v2004-20220812-en
General
-
Target
27d731a3a89e79dd89b9a6699bf4f21ca8dabe10b5bc1312f9779161bf91cb7f
-
Size
820KB
-
MD5
2a126ecc94374daf36cbb091ce82e5f0
-
SHA1
5459ee92a7e402e010ace91c688f4301b552fcbe
-
SHA256
27d731a3a89e79dd89b9a6699bf4f21ca8dabe10b5bc1312f9779161bf91cb7f
-
SHA512
7c38dd020f8f40d269ba5fcbb516a79bd0a40342d6a12d0ecd16b625b54607f8549eef706f228b69366d65b036514832f8c012d7a934829bd2a5ffac92cadc7d
-
SSDEEP
12288:2xXJ/JajrZV9SlTjxYL0w+Ibd2jABFuzHc1E6OJpkx+pHhBoszaq/W:2z/WFMj4O22aFurcIHfOsz5
Malware Config
Signatures
Files
-
27d731a3a89e79dd89b9a6699bf4f21ca8dabe10b5bc1312f9779161bf91cb7f.exe windows x86
50237c4fbaccdca087d8e717e943479c
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetEndOfFile
HeapCreate
GlobalLock
RaiseException
ConvertDefaultLocale
MulDiv
HeapReAlloc
TlsAlloc
UnhandledExceptionFilter
LocalAlloc
LocalFileTimeToFileTime
RtlUnwind
SetHandleCount
VirtualQuery
GetVersionExA
GetVersion
InitializeCriticalSection
LCMapStringA
SetEnvironmentVariableA
GetCurrentProcessId
FreeResource
GetFileSize
CloseHandle
GetACP
HeapSize
HeapDestroy
GetCurrentThread
QueryPerformanceCounter
GetConsoleOutputCP
lstrcmpA
SizeofResource
TerminateProcess
SystemTimeToFileTime
InterlockedIncrement
FileTimeToLocalFileTime
GetStdHandle
WriteConsoleA
TlsGetValue
GetProcessHeap
GetThreadLocale
FileTimeToSystemTime
GetCommandLineW
FreeLibrary
GetCommandLineA
GetStartupInfoA
GetWindowsDirectoryA
GetTimeZoneInformation
TlsSetValue
CreateFileA
GetConsoleMode
WriteFile
HeapAlloc
GetSystemInfo
GetSystemTimeAsFileTime
GlobalFlags
ReadFile
FlushFileBuffers
GlobalAlloc
GetSystemDirectoryA
GetLocaleInfoA
LeaveCriticalSection
LockFile
LoadResource
EnumResourceLanguagesW
SetErrorMode
GetEnvironmentStrings
GlobalReAlloc
GlobalFree
TlsFree
VirtualAlloc
HeapFree
GetFileType
SetUnhandledExceptionFilter
LocalReAlloc
FindClose
DeleteCriticalSection
GetConsoleCP
InterlockedExchange
FreeEnvironmentStringsA
DuplicateHandle
LockResource
IsDebuggerPresent
VirtualFree
LocalFree
Sleep
SetLastError
GlobalDeleteAtom
SetFilePointer
GetModuleFileNameA
EnterCriticalSection
InterlockedDecrement
GlobalUnlock
GetLastError
GlobalHandle
GetStringTypeA
SetStdHandle
UnlockFile
CompareStringA
GetFileTime
lstrlenA
GetOEMCP
lstrcpyA
GetCurrentThreadId
LoadLibraryExA
GetModuleHandleA
AddAtomA
LoadLibraryA
GetProcAddress
lstrcatA
SetFileTime
ExitProcess
user32
GetForegroundWindow
GetLastActivePopup
GetWindowRgn
GetMessagePos
UnpackDDElParam
TranslateMessage
GetWindow
SetFocus
ReuseDDElParam
GetMenu
PostQuitMessage
GetDlgItem
ShowWindow
EndDialog
CopyRect
GetMenuState
IsZoomed
CheckMenuItem
IntersectRect
IsIconic
GetFocus
RedrawWindow
GetSubMenu
IsRectEmpty
GetCursorPos
GetMenuCheckMarkDimensions
SetWindowPos
GetClientRect
GetSystemMenu
ScreenToClient
GetWindowPlacement
DrawIcon
MapDialogRect
ClientToScreen
UpdateWindow
TrackPopupMenu
SetRect
InvalidateRect
GetCapture
GetWindowThreadProcessId
ShowOwnedPopups
BeginPaint
CreatePopupMenu
GetTopWindow
SetActiveWindow
SetCursor
GetActiveWindow
DestroyMenu
SetRectEmpty
ReleaseCapture
IsChild
LockWindowUpdate
GetDCEx
SetScrollInfo
IsWindow
EqualRect
CallNextHookEx
GetDesktopWindow
SystemParametersInfoA
SetMenuItemBitmaps
GetMenuItemCount
SetScrollRange
DeleteMenu
DestroyWindow
GetDlgCtrlID
ScrollWindow
SetWindowRgn
AdjustWindowRectEx
SetScrollPos
DeferWindowPos
WindowFromPoint
GetNextDlgTabItem
GetNextDlgGroupItem
GetKeyState
SetMenu
SetCapture
GetScrollPos
DestroyIcon
GetWindowRect
SetParent
GetDC
SendDlgItemMessageA
MapWindowPoints
GetWindowDC
GetSysColorBrush
FillRect
IsWindowEnabled
SetWindowContextHelpId
MessageBeep
PtInRect
GetParent
ReleaseDC
GetScrollRange
GetScrollInfo
EnableMenuItem
SetTimer
GetMessageTime
ValidateRect
GetMenuItemID
UnregisterClassA
InflateRect
BringWindowToTop
EndDeferWindowPos
ShowScrollBar
SetForegroundWindow
MoveWindow
InvalidateRgn
OffsetRect
IsWindowVisible
EndPaint
GetSysColor
UnhookWindowsHookEx
BeginDeferWindowPos
GetSystemMetrics
CharLowerA
KillTimer
gdi32
SetMapMode
CreateCompatibleDC
ScaleWindowExtEx
Ellipse
GetTextColor
GetBkColor
GetClipBox
GetStockObject
PtVisible
ExcludeClipRect
SetTextColor
GetMapMode
OffsetViewportOrgEx
CreateBitmap
DeleteDC
SaveDC
SetWindowExtEx
DPtoLP
SelectClipRgn
CreateSolidBrush
DeleteObject
RectVisible
SetBkMode
GetPixel
GetDeviceCaps
RestoreDC
CreateRectRgnIndirect
SetViewportOrgEx
OffsetRgn
StretchDIBits
SetViewportExtEx
SelectObject
ExtSelectClipRgn
GetRgnBox
CreateRectRgn
IntersectClipRect
BitBlt
Escape
CreatePatternBrush
PatBlt
SetRectRgn
ScaleViewportExtEx
SetBkColor
CombineRgn
CreateEllipticRgn
GetWindowExtEx
CreateCompatibleBitmap
advapi32
RegCloseKey
SetFileSecurityW
ole32
OleFlushClipboard
CreateILockBytesOnHGlobal
CoGetClassObject
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoFreeUnusedLibraries
OleIsCurrentClipboard
OleInitialize
CoRevokeClassObject
CoCreateInstance
OleUninitialize
CLSIDFromString
CLSIDFromProgID
oleaut32
SysAllocString
VariantClear
VariantChangeType
VariantCopy
SafeArrayDestroy
VariantInit
SysFreeString
SysAllocStringLen
OleCreateFontIndirect
VariantTimeToSystemTime
OleLoadPicture
SystemTimeToVariantTime
SysStringLen
comctl32
ImageList_LoadImageW
shlwapi
PathFindExtensionW
PathRemoveExtensionW
PathFileExistsW
PathFindFileNameW
PathIsUNCW
PathStripToRootW
snmpapi
SnmpUtilMemAlloc
Sections
.text Size: 555KB - Virtual size: 554KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 86KB - Virtual size: 85KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 153KB - Virtual size: 5.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: - Virtual size: 101B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ