Static task
static1
Behavioral task
behavioral1
Sample
0738f111128d760f8bc2148d518ed36df0f3b5832cdc43dd1a7124a54c6d3559.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
0738f111128d760f8bc2148d518ed36df0f3b5832cdc43dd1a7124a54c6d3559.exe
Resource
win10v2004-20220812-en
General
-
Target
0738f111128d760f8bc2148d518ed36df0f3b5832cdc43dd1a7124a54c6d3559
-
Size
1.2MB
-
MD5
d9519ebd9ec88b9273828bc8450721dc
-
SHA1
93ab0f40d81a257b4024c4808aecfc1932b87323
-
SHA256
0738f111128d760f8bc2148d518ed36df0f3b5832cdc43dd1a7124a54c6d3559
-
SHA512
b9d9ef74cb6243619033f84911273e036cb8604721a31f9d7c2989143217dce676bd951a57d553af8a07ad496c3333f15f2076a4ccf52d03137b08caddb99138
-
SSDEEP
24576:bvVyUDB07lZ7H+L9VZ1GRf0Z7M9geywOuE1FLEzhHVOVuFS8m1i+WH6cO1MnbVCz:balZ7H+L9yf0Z7fEzhHYVuQgLH6tMn
Malware Config
Signatures
Files
-
0738f111128d760f8bc2148d518ed36df0f3b5832cdc43dd1a7124a54c6d3559.exe windows x86
d546788f690a8cae013fe0eb5f9535e6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WritePrivateProfileStringA
RtlUnwind
GetTimeZoneInformation
GetSystemTime
ExitProcess
CreateThread
ExitThread
RaiseException
HeapFree
HeapAlloc
GetStartupInfoA
GetCommandLineA
SetStdHandle
GetFileType
GetACP
HeapSize
HeapReAlloc
UnhandledExceptionFilter
SetUnhandledExceptionFilter
HeapDestroy
HeapCreate
VirtualFree
IsBadWritePtr
SetHandleCount
GetStdHandle
LCMapStringA
LCMapStringW
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
GetStringTypeA
GetStringTypeW
GetDriveTypeA
IsBadReadPtr
IsBadCodePtr
CompareStringA
CompareStringW
SetEnvironmentVariableA
InterlockedExchange
GetOEMCP
GetCPInfo
GetProcessVersion
GlobalFlags
TlsGetValue
LocalReAlloc
TlsSetValue
GlobalReAlloc
TlsFree
GlobalHandle
TlsAlloc
SetErrorMode
ReleaseMutex
CreateMutexA
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
LocalAlloc
EnterCriticalSection
lstrlenW
GetCurrentThread
GetFileTime
MulDiv
GlobalLock
GlobalUnlock
FileTimeToLocalFileTime
GetVersion
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
lstrcmpiA
GetThreadLocale
GetFullPathNameA
lstrcpynA
GetVolumeInformationA
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
DuplicateHandle
FindNextFileA
GetLastError
SetLastError
FormatMessageA
LocalFree
InterlockedDecrement
InterlockedIncrement
GetLocalTime
UnmapViewOfFile
GetFileSize
FileTimeToSystemTime
SetFileTime
GetFileAttributesA
LocalFileTimeToFileTime
GetCurrentDirectoryA
SystemTimeToFileTime
ReadFile
SetFilePointer
WideCharToMultiByte
MultiByteToWideChar
lstrcmpA
lstrcpyA
GetWindowsDirectoryA
SetLocaleInfoA
GetDiskFreeSpaceExA
GlobalMemoryStatus
GlobalAlloc
DeviceIoControl
GlobalFree
FreeLibrary
lstrcatA
LoadLibraryA
lstrlenA
GetShortPathNameA
WriteProfileStringA
GetProfileStringA
CreateToolhelp32Snapshot
Process32First
OpenProcess
WaitForSingleObject
TerminateProcess
Process32Next
GetProcAddress
GetCurrentProcess
Sleep
GetTickCount
WinExec
FindFirstFileA
FindClose
GetModuleFileNameA
DeleteFileA
GetSystemDirectoryA
CreateDirectoryA
GetProfileIntA
CopyFileA
GetModuleHandleA
FindResourceA
LoadResource
LockResource
SizeofResource
CreateFileA
WriteFile
VirtualAlloc
CloseHandle
user32
GetDC
ReleaseDC
GetNextDlgTabItem
EndDialog
CreateDialogIndirectParamA
IsWindowEnabled
GetMessageA
TranslateMessage
GetActiveWindow
ValidateRect
UpdateWindow
SendDlgItemMessageA
MapWindowPoints
PeekMessageA
DispatchMessageA
GetFocus
SetActiveWindow
SetFocus
AdjustWindowRectEx
ScrollWindow
GetScrollInfo
SetScrollInfo
ShowScrollBar
GetScrollRange
SetScrollRange
GetScrollPos
SetScrollPos
GetTopWindow
IsChild
GetCapture
WinHelpA
GetClassInfoA
RegisterClassA
GetMenu
GetMenuItemCount
GetMenuItemID
TrackPopupMenu
GetDlgItem
GetWindowTextLengthA
GetWindowTextA
GetDlgCtrlID
GetKeyState
DefWindowProcA
DestroyWindow
CreateWindowExA
SetWindowsHookExA
CallNextHookEx
GetClassLongA
SetPropA
UnhookWindowsHookEx
GetPropA
CallWindowProcA
RemovePropA
GetMessageTime
GetMessagePos
GetLastActivePopup
GetForegroundWindow
SetForegroundWindow
GetWindowLongA
SetWindowPos
RegisterWindowMessageA
IntersectRect
SystemParametersInfoA
GetWindowPlacement
CharUpperA
wsprintfA
GetClassNameA
ScreenToClient
CopyRect
DrawTextA
InflateRect
LoadCursorA
CopyIcon
GetSysColor
SetWindowLongA
SetCursor
PtInRect
ReleaseCapture
FindWindowA
UnregisterClassA
HideCaret
ShowCaret
ExcludeUpdateRgn
DrawFocusRect
DefDlgProcA
IsWindowUnicode
SetCapture
MessageBeep
GetWindowRect
OffsetRect
CreatePopupMenu
LoadMenuA
GetSubMenu
GetCursorPos
GetDesktopWindow
InvalidateRect
RedrawWindow
IsIconic
GetSystemMetrics
DrawIcon
GetSystemMenu
AppendMenuA
LoadIconA
PostThreadMessageA
RegisterClipboardFormatA
GetClientRect
GetParent
EnableWindow
IsWindowVisible
KillTimer
SetTimer
SendMessageA
GetWindowThreadProcessId
MessageBoxA
IsWindow
FindWindowExA
PostMessageA
GetNextDlgGroupItem
SetRect
CopyAcceleratorTableA
CharNextA
GetSysColorBrush
WindowFromPoint
DestroyMenu
LoadStringA
MapDialogRect
SetWindowContextHelpId
PostQuitMessage
GrayStringA
TabbedTextOutA
EndPaint
BeginPaint
GetWindowDC
ClientToScreen
wvsprintfA
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
GetWindow
gdi32
SaveDC
RestoreDC
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
IntersectClipRect
GetDeviceCaps
GetViewportExtEx
GetWindowExtEx
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
LPtoDP
DPtoLP
GetMapMode
GetTextColor
GetBkColor
PatBlt
GetClipBox
CreateBitmap
SetBkColor
SetTextColor
CreateRoundRectRgn
SelectClipRgn
CreateRectRgn
DeleteDC
DeleteObject
CreateCompatibleDC
SetBkMode
BitBlt
GetObjectA
CreateFontIndirectA
GetStockObject
SelectObject
CreateDIBitmap
GetTextExtentPointA
CreateSolidBrush
comdlg32
GetOpenFileNameA
GetSaveFileNameA
GetFileTitleA
winspool.drv
ClosePrinter
OpenPrinterA
DocumentPropertiesA
advapi32
RegQueryValueA
RegOpenKeyExA
RegCreateKeyExA
RegDeleteValueA
RegSetValueExA
RegQueryValueExA
RegCloseKey
shell32
SHBrowseForFolderA
SHGetSpecialFolderLocation
SHGetPathFromIDListA
ShellExecuteA
comctl32
ImageList_ReplaceIcon
ord17
ImageList_Destroy
ImageList_Create
oledlg
ord8
ole32
CLSIDFromString
CoGetClassObject
StgOpenStorageOnILockBytes
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
CoTaskMemAlloc
CLSIDFromProgID
OleInitialize
OleUninitialize
CoFreeUnusedLibraries
CoRegisterMessageFilter
CoRevokeClassObject
CoUninitialize
CoInitialize
StgIsStorageFile
StgOpenStorage
OleFlushClipboard
OleIsCurrentClipboard
CoTaskMemFree
olepro32
ord253
oleaut32
SysFreeString
SysAllocStringLen
VariantClear
VariantCopy
SysAllocString
SafeArrayUnaccessData
SafeArrayAccessData
SafeArrayGetUBound
SafeArrayGetLBound
SafeArrayGetElemsize
SafeArrayGetDim
SafeArrayCreate
SysAllocStringByteLen
VariantTimeToSystemTime
SysStringLen
VariantChangeType
psapi
EnumProcessModules
GetModuleFileNameExA
wsock32
inet_ntoa
ntohs
ioctlsocket
ntohl
gethostname
WSACleanup
WSAStartup
getprotobyname
connect
setsockopt
closesocket
send
gethostbyname
socket
htons
recv
wininet
InternetCanonicalizeUrlA
InternetCrackUrlA
msimg32
GradientFill
Sections
.text Size: 420KB - Virtual size: 416KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 92KB - Virtual size: 88KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 40.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 660KB - Virtual size: 657KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ