Static task
static1
Behavioral task
behavioral1
Sample
85026cc5124286097a9be73b6c2a90d95d66a5e08c3ba43ca30d635d2255c79a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
85026cc5124286097a9be73b6c2a90d95d66a5e08c3ba43ca30d635d2255c79a.exe
Resource
win10v2004-20220812-en
General
-
Target
85026cc5124286097a9be73b6c2a90d95d66a5e08c3ba43ca30d635d2255c79a
-
Size
1.6MB
-
MD5
53e65815084124076f417372e5b940c1
-
SHA1
153e0251f1b7d81483417c8f4d6d2898ec6bb178
-
SHA256
85026cc5124286097a9be73b6c2a90d95d66a5e08c3ba43ca30d635d2255c79a
-
SHA512
1e726162580177f3cfe3e0e137698ce5311750ac8488a48dcbdcc3cb6ea562922ad46488cef6f64c987fc9afbb5898e85277b62cfdc82c8a2ec575f7af08bde2
-
SSDEEP
24576:qHtvhttttttttttttttttttttttttttttttttttttttttttttttORRRRRRRRRRRb:qHVA
Malware Config
Signatures
Files
-
85026cc5124286097a9be73b6c2a90d95d66a5e08c3ba43ca30d635d2255c79a.exe windows x86
80328c883ac058227ac74d3c77284dd4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
CreateWindowExA
PostQuitMessage
ClientToScreen
SetWindowRgn
DispatchMessageA
GetClientRect
GetClassNameA
TrackPopupMenu
SetDlgItemTextW
GetSysColorBrush
ReleaseCapture
SetCursor
SendMessageW
CharPrevW
CharPrevA
PostMessageA
GetMessageA
GetKeyState
SendMessageA
DrawTextW
DialogBoxParamW
SetWindowLongW
CallNextHookEx
FillRect
GetDlgItem
GetDC
MapWindowPoints
CheckDlgButton
GetAsyncKeyState
CharLowerW
LoadCursorW
WinHelpW
IsRectEmpty
GetWindowLongW
GetClassNameW
ShowWindow
SystemParametersInfoW
UnregisterClassA
IntersectRect
CheckRadioButton
MsgWaitForMultipleObjects
GetMessagePos
GetDlgCtrlID
SetDlgItemTextA
LoadBitmapA
CreatePopupMenu
MoveWindow
msvcrt
_commit
_access
_rotr
_chsize
_rotl
rand
_stat
__p__osver
_ftol
shlwapi
StrStrIA
PathStripToRootW
StrToIntExW
StrCpyW
StrRetToBufW
PathRemoveBackslashW
PathFindExtensionA
PathFileExistsW
StrToIntW
AssocQueryStringW
StrChrW
UrlUnescapeW
PathIsRelativeW
StrCmpNW
StrTrimW
SHGetValueW
PathStripToRootA
PathAppendA
PathIsUNCW
SHStrDupW
PathAppendW
PathCombineW
PathRemoveBlanksW
SHDeleteKeyW
SHDeleteValueW
StrChrIW
SHDeleteValueA
PathGetDriveNumberW
StrDupW
wnsprintfW
PathFindFileNameA
PathFindFileNameW
PathRemoveFileSpecW
PathRemoveFileSpecA
SHDeleteKeyA
PathIsDirectoryW
PathAddBackslashW
StrCmpNIW
StrCmpNIA
StrCmpW
PathSkipRootW
wnsprintfA
gdi32
GetTextExtentPoint32W
CreateFontIndirectW
IntersectClipRect
CreateRectRgnIndirect
GetPaletteEntries
GetGlyphOutlineA
GetClipBox
SetROP2
SetBrushOrgEx
ExcludeClipRect
SetTextAlign
GetBitmapBits
SetWindowOrgEx
GetDIBits
GetWindowExtEx
StartPage
DeleteMetaFile
CloseMetaFile
PlayMetaFile
LineTo
GetTextMetricsA
CombineRgn
CreateHalftonePalette
SaveDC
CreateDCA
LPtoDP
GetMapMode
GetTextExtentPointA
GetTextAlign
RestoreDC
GetCurrentObject
MoveToEx
SetViewportOrgEx
FillRgn
GetObjectA
CreatePalette
GetStockObject
GetPixel
Escape
UnrealizeObject
CreateDIBitmap
CreateBrushIndirect
SetStretchBltMode
CreateMetaFileA
PatBlt
SetMapMode
OffsetViewportOrgEx
SetBkMode
GetSystemPaletteEntries
SetWindowExtEx
EnumFontFamiliesExW
GetBkMode
GetTextMetricsW
DeleteObject
CreateCompatibleBitmap
ScaleViewportExtEx
CreateDIBSection
EndPage
CreateMetaFileW
GetClipRgn
CreatePen
SetTextColor
ExtTextOutA
SetBkColor
StretchDIBits
Rectangle
ExtTextOutW
GetTextExtentPointW
SetViewportExtEx
GetObjectW
Polyline
Ellipse
GetTextColor
CreateBitmap
GetDeviceCaps
GetTextExtentPoint32A
SelectPalette
SelectObject
ExtSelectClipRgn
GetNearestColor
CreateRectRgn
StretchBlt
GetObjectType
CreateFontIndirectA
OffsetRgn
CreateDCW
RectVisible
ScaleWindowExtEx
GetViewportExtEx
ntdll
RtlExtendedLargeIntegerDivide
NtReadFile
wcschr
RtlUnicodeStringToInteger
RtlValidSid
RtlGetVersion
NtCreateEvent
_wcsnicmp
RtlSubAuthoritySid
NtSetEvent
RtlFreeHeap
RtlUpcaseUnicodeString
RtlCopyLuid
NtOpenFile
RtlTimeToSecondsSince1970
_strnicmp
RtlAdjustPrivilege
NtCreateSection
NtQueryInformationProcess
RtlStringFromGUID
RtlGetDaclSecurityDescriptor
RtlAddAccessAllowedAce
NtSetInformationFile
RtlAppendUnicodeStringToString
NtConnectPort
RtlPrefixUnicodeString
NtQueryValueKey
RtlAcquireResourceShared
RtlValidSecurityDescriptor
RtlValidRelativeSecurityDescriptor
RtlInitializeCriticalSection
RtlAddAce
NtQueryVirtualMemory
RtlCopySid
rpcrt4
NdrStubCall2
UuidCreate
NdrCStdStubBuffer_Release
CStdStubBuffer_Invoke
RpcServerRegisterIfEx
NdrOleFree
RpcRaiseException
NdrDllRegisterProxy
RpcStringBindingComposeW
RpcStringFreeA
UuidFromStringW
RpcStringBindingParseW
RpcServerUseProtseqEpW
CStdStubBuffer_CountRefs
CStdStubBuffer_QueryInterface
RpcBindingVectorFree
RpcServerUnregisterIf
CStdStubBuffer_Connect
RpcServerInqBindings
NdrCStdStubBuffer2_Release
RpcBindingToStringBindingW
RpcServerRegisterAuthInfoW
RpcBindingFromStringBindingW
RpcRevertToSelf
NdrDllUnregisterProxy
IUnknown_QueryInterface_Proxy
RpcBindingFree
NdrDllGetClassObject
CStdStubBuffer_IsIIDSupported
RpcStringFreeW
NdrClientCall2
CStdStubBuffer_AddRef
RpcBindingSetAuthInfoW
UuidToStringW
IUnknown_Release_Proxy
CStdStubBuffer_DebugServerQueryInterface
NdrOleAllocate
RpcImpersonateClient
IUnknown_AddRef_Proxy
UuidToStringA
RpcBindingSetAuthInfoExW
RpcEpResolveBinding
NdrServerCall2
CStdStubBuffer_Disconnect
version
VerFindFileW
VerQueryValueA
GetFileVersionInfoW
GetFileVersionInfoSizeA
GetFileVersionInfoA
GetFileVersionInfoSizeW
VerQueryValueW
VerLanguageNameA
shell32
SHGetSpecialFolderPathW
SHGetFolderPathW
ShellExecuteA
ShellExecuteW
DragQueryFileW
SHBindToParent
SHGetSpecialFolderLocation
SHGetPathFromIDListW
SHGetFileInfoW
DragQueryFileA
SHGetPathFromIDListA
SHBrowseForFolderA
SHFileOperationW
SHBrowseForFolderW
kernel32
OpenMutexA
TlsFree
GetVersion
GlobalUnlock
GetCurrentThreadId
GetLocaleInfoA
GetStringTypeA
GetCurrentProcess
GetDriveTypeA
GetConsoleMode
CreateEventA
ReleaseSemaphore
QueryPerformanceCounter
lstrcatW
WaitForSingleObject
GetDriveTypeW
ExitProcess
ResumeThread
GetSystemTimeAsFileTime
OpenMutexW
FindResourceW
FindFirstFileA
CreateFileMappingW
HeapAlloc
GetCommandLineW
IsBadWritePtr
MultiByteToWideChar
CreateProcessW
CreateProcessA
GetModuleHandleW
GlobalAlloc
VirtualAlloc
GlobalFree
Sleep
Sections
.idata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.code Size: 53KB - Virtual size: 53KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
DATA Size: 1KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
DATA Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 487B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ