Static task
static1
Behavioral task
behavioral1
Sample
1333b2ea3c76011c223163b88bc761969673cec393813d7a84f06b283281653d.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
1333b2ea3c76011c223163b88bc761969673cec393813d7a84f06b283281653d.exe
Resource
win10v2004-20220901-en
General
-
Target
1333b2ea3c76011c223163b88bc761969673cec393813d7a84f06b283281653d
-
Size
164KB
-
MD5
1034f929741855e639d0090a768468a3
-
SHA1
8dc5cb38ed5c25615bffbf2e20f16493665e4986
-
SHA256
1333b2ea3c76011c223163b88bc761969673cec393813d7a84f06b283281653d
-
SHA512
64eb59fa9e40eef9dd6e80ddd44654b45f89de296fc6fcd77c5d3af8caff70ac9a824fde4a26732cfbd22b42bc7d66d45b2efb4e2cd5978937aba06383834eb7
-
SSDEEP
1536:qNtiyAHGX7PI5BzXjMDO/9XEThz4a7+hKMNq5qnDoMfeZmEo7fblnbONDSwW+lpw:utibsPIQDGx+MqmK6q0MsgEb0O+lQ2C
Malware Config
Signatures
Files
-
1333b2ea3c76011c223163b88bc761969673cec393813d7a84f06b283281653d.exe windows x86
c795bd97c39af59a2e1b9651044ab113
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
TlsFree
GlobalReAlloc
TlsSetValue
LocalReAlloc
TlsGetValue
FileTimeToSystemTime
FileTimeToLocalFileTime
GetModuleHandleA
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
GetVersion
GetProcessVersion
GlobalFlags
WritePrivateProfileStringA
GetCPInfo
GetOEMCP
RtlUnwind
GetTimeZoneInformation
GetSystemTime
HeapFree
HeapAlloc
ExitProcess
GetStartupInfoA
GetCommandLineA
RaiseException
SetStdHandle
GetFileType
GetACP
GlobalHandle
HeapSize
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
LCMapStringA
LCMapStringW
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetStringTypeA
GetStringTypeW
SetUnhandledExceptionFilter
GetDriveTypeA
IsBadReadPtr
IsBadCodePtr
CompareStringA
CompareStringW
SetEnvironmentVariableA
GlobalUnlock
GlobalFree
TlsAlloc
lstrcatA
SetErrorMode
GetFileTime
GetFileSize
GetFileAttributesA
GlobalLock
GlobalAlloc
GlobalDeleteAtom
lstrcmpA
GetCurrentThread
GetCurrentThreadId
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
LocalAlloc
FreeLibrary
EnterCriticalSection
SetLastError
GetModuleFileNameA
lstrcmpiA
GetFullPathNameA
lstrcpynA
GetVolumeInformationA
lstrcpyA
LoadLibraryA
GetProcAddress
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
ReadFile
DuplicateHandle
InterlockedDecrement
InterlockedIncrement
FormatMessageA
LocalFree
GetCurrentProcess
CopyFileA
lstrlenA
MultiByteToWideChar
WideCharToMultiByte
GetLastError
FindFirstFileA
FindNextFileA
FindClose
TerminateProcess
GetLocalTime
SystemTimeToFileTime
WaitForSingleObject
GetTempFileNameA
Sleep
GetTempPathA
GetWindowsDirectoryA
GetSystemDirectoryA
GetCurrentDirectoryA
DeleteFileA
CreateFileA
WriteFile
CloseHandle
HeapReAlloc
SetFileAttributesA
user32
AdjustWindowRectEx
SetFocus
GetSysColor
MapWindowPoints
LoadIconA
SetWindowTextA
ShowWindow
LoadCursorA
GetSysColorBrush
ReleaseDC
GetDC
PtInRect
ClientToScreen
TabbedTextOutA
DrawTextA
GrayStringA
DestroyMenu
GetClientRect
CopyRect
GetTopWindow
GetCapture
WinHelpA
GetClassInfoA
RegisterClassA
GetMenu
GetMenuItemCount
GetSubMenu
GetMenuItemID
GetDlgItem
GetDlgCtrlID
DestroyWindow
CreateWindowExA
GetClassLongA
SetPropA
GetPropA
CallWindowProcA
RemovePropA
DefWindowProcA
GetMessageTime
GetMessagePos
GetForegroundWindow
SetWindowLongA
SetWindowPos
RegisterWindowMessageA
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowRect
UnhookWindowsHookEx
LoadStringA
GetMessageA
TranslateMessage
GetActiveWindow
GetKeyState
CallNextHookEx
ValidateRect
IsWindowVisible
PeekMessageA
GetCursorPos
SetWindowsHookExA
GetLastActivePopup
IsWindowEnabled
GetWindowLongA
MessageBoxA
EnableWindow
SetCursor
PostQuitMessage
PostMessageA
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
SendMessageA
EnableMenuItem
GetFocus
GetNextDlgTabItem
GetSystemMetrics
CharUpperA
wsprintfA
SetForegroundWindow
GetWindowTextA
GetClassNameA
GetWindow
GetParent
DispatchMessageA
UnregisterClassA
gdi32
RestoreDC
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
SaveDC
SetWindowExtEx
ScaleWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
GetStockObject
CreateBitmap
DeleteDC
DeleteObject
GetDeviceCaps
GetObjectA
SetBkColor
SetTextColor
GetClipBox
SelectObject
comdlg32
GetFileTitleA
winspool.drv
OpenPrinterA
ClosePrinter
DocumentPropertiesA
advapi32
RegOpenKeyExA
RegSetValueExA
RegCreateKeyExA
RegCloseKey
RegQueryValueExA
shell32
SHGetSpecialFolderPathA
ShellExecuteExA
ShellExecuteA
comctl32
ord17
wininet
InternetReadFile
InternetQueryDataAvailable
InternetCloseHandle
InternetOpenUrlA
InternetOpenA
DeleteUrlCacheEntry
HttpQueryInfoA
InternetCrackUrlA
InternetCanonicalizeUrlA
InternetQueryOptionA
InternetSetStatusCallback
InternetSetFilePointer
InternetWriteFile
InternetGetLastResponseInfoA
iphlpapi
GetAdaptersInfo
Sections
.text Size: 112KB - Virtual size: 108KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ