Static task
static1
Behavioral task
behavioral1
Sample
671dbdcacb3611a1733e59c1b0ffb6b42e121c4cae9385707a1f9a02284b2c34.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
671dbdcacb3611a1733e59c1b0ffb6b42e121c4cae9385707a1f9a02284b2c34.exe
Resource
win10v2004-20221111-en
General
-
Target
671dbdcacb3611a1733e59c1b0ffb6b42e121c4cae9385707a1f9a02284b2c34
-
Size
252KB
-
MD5
c0caac6670f173e9e7881e5500d8572b
-
SHA1
25aa99f04e41d25643845053387eecdc27fb8e38
-
SHA256
671dbdcacb3611a1733e59c1b0ffb6b42e121c4cae9385707a1f9a02284b2c34
-
SHA512
2a7889f9bf20d37677bbae94b761ae0567e5c1e7a6122b4013d370b1391fd08b52faad9e3753870103cf9b68ae2ac13ffa4e6dd902bd1d2f5676dde48bd0d89e
-
SSDEEP
6144:u3ZjFifGOycycYoCF53+QpGcbAD9G4UvFdJhr2rT:u3ZJL3pP0ZG4IF3M
Malware Config
Signatures
Files
-
671dbdcacb3611a1733e59c1b0ffb6b42e121c4cae9385707a1f9a02284b2c34.exe windows x86
aa72e093aa1136aff986b4531eb07c46
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
wininet
InternetCloseHandle
HttpQueryInfoA
HttpSendRequestW
HttpOpenRequestW
InternetConnectW
InternetOpenW
InternetReadFile
InternetOpenUrlW
HttpQueryInfoW
kernel32
TlsFree
FileTimeToSystemTime
WritePrivateProfileStringW
GlobalFlags
CompareStringW
GetModuleHandleA
GetVersionExA
LoadLibraryA
GlobalFindAtomW
SetErrorMode
FileTimeToLocalFileTime
GetFileAttributesW
GetFileTime
HeapFree
HeapAlloc
GetProcessHeap
GetStartupInfoW
RtlUnwind
GetSystemTimeAsFileTime
RaiseException
HeapReAlloc
ExitProcess
HeapSize
DeleteCriticalSection
GetModuleFileNameA
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
SetHandleCount
GetFileType
GetStartupInfoA
HeapDestroy
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
TerminateProcess
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCPInfo
GetACP
GetOEMCP
VirtualAlloc
GetTimeZoneInformation
GetConsoleCP
GetConsoleMode
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CreateFileA
SetEnvironmentVariableA
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
InterlockedDecrement
InterlockedIncrement
GetFullPathNameW
GetVolumeInformationW
FindFirstFileW
FindClose
GetCurrentProcess
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
GetThreadLocale
GetCurrentProcessId
GlobalAddAtomW
GetCurrentThread
GetCurrentThreadId
ConvertDefaultLocale
GetVersion
EnumResourceLanguagesW
GetLocaleInfoW
LoadLibraryW
CompareStringA
InterlockedExchange
lstrcmpW
FreeLibrary
GlobalDeleteAtom
GetModuleHandleW
GetProcAddress
WideCharToMultiByte
MultiByteToWideChar
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageW
LocalFree
lstrlenW
LoadResource
LockResource
SizeofResource
FindResourceW
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
CreateProcessW
GetVersionExW
SetLastError
lstrcmpiW
GetCommandLineW
GetModuleFileNameW
CreateDirectoryW
CopyFileW
DeleteFileW
Sleep
CreateMutexW
GetLastError
ReleaseMutex
GetTempPathW
CreateFileW
ReadFile
CloseHandle
GetStdHandle
user32
RegisterWindowMessageW
LoadIconW
WinHelpW
GetCapture
GetClassLongW
SetPropW
GetPropW
RemovePropW
IsWindow
GetForegroundWindow
GetDlgItem
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetForegroundWindow
GetClientRect
GetMenu
CreateWindowExW
GetClassInfoExW
GetClassInfoW
RegisterClassW
AdjustWindowRectEx
CopyRect
DefWindowProcW
SetWindowLongW
UnregisterClassA
SystemParametersInfoA
IsIconic
GetWindowPlacement
GrayStringW
DrawTextExW
DrawTextW
TabbedTextOutW
ClientToScreen
GetWindow
GetWindowRect
GetClassNameW
PtInRect
SetWindowTextW
GetWindowTextW
UnhookWindowsHookEx
LoadCursorW
GetDC
ReleaseDC
GetSysColor
GetSysColorBrush
CharUpperW
GetSystemMetrics
GetWindowThreadProcessId
GetWindowLongW
GetLastActivePopup
IsWindowEnabled
EnableWindow
MessageBoxW
SetCursor
SetWindowsHookExW
CallNextHookEx
GetMessageW
TranslateMessage
DispatchMessageW
GetActiveWindow
IsWindowVisible
GetKeyState
PeekMessageW
DestroyMenu
UnregisterClassW
ShowWindow
CallWindowProcW
GetCursorPos
ValidateRect
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapW
GetFocus
GetParent
SendMessageW
ModifyMenuW
EnableMenuItem
CheckMenuItem
PostMessageW
PostQuitMessage
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
GetDlgCtrlID
SetWindowPos
gdi32
Escape
SelectObject
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
DeleteDC
GetStockObject
ExtTextOutW
TextOutW
RectVisible
PtVisible
SetBkColor
RestoreDC
SaveDC
DeleteObject
CreateBitmap
GetDeviceCaps
GetClipBox
SetMapMode
SetTextColor
comdlg32
GetFileTitleW
winspool.drv
DocumentPropertiesW
OpenPrinterW
ClosePrinter
advapi32
RegSetValueExW
RegCreateKeyExW
RegQueryValueW
RegEnumKeyW
RegDeleteKeyW
RegOpenKeyW
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
SetNamedSecurityInfoW
shell32
SHGetSpecialFolderPathW
ShellExecuteW
shlwapi
SHSetValueW
StrStrW
PathAppendW
PathFindExtensionW
PathRemoveFileSpecW
PathFileExistsW
SHGetValueW
PathFindFileNameW
PathStripToRootW
PathIsDirectoryW
PathIsUNCW
oleaut32
VariantChangeType
VariantClear
VariantInit
Sections
.text Size: 192KB - Virtual size: 191KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 44KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 500B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ