Static task
static1
Behavioral task
behavioral1
Sample
2.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
2.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
ppi.exe
Resource
win7-20221111-en
Behavioral task
behavioral4
Sample
ppi.exe
Resource
win10v2004-20220812-en
General
-
Target
c826fa0ddfdff9ce1645b77e542131fedabab0d6c3fb522725cbaa5fc408275a
-
Size
4.5MB
-
MD5
561d4e9e4c4807d2da7fa82ba2e0a35a
-
SHA1
9f14c13a29c95f2493fa00f1748fa267ffd918f8
-
SHA256
c826fa0ddfdff9ce1645b77e542131fedabab0d6c3fb522725cbaa5fc408275a
-
SHA512
e2a80fe9ab405d2e90962f9ab1540911297e808196d0b1a25ce95565a95d950ef6708fb0fcc5512783e0efa5288f87245e76feb9a77e3d54bdc2946fc74c4039
-
SSDEEP
98304:XhML2h5tw7M0v4v5wSktE2EMVa56cfcvytt8Vivyv9jk:RA2h5tev4vDz2E9GyPr
Malware Config
Signatures
Files
-
c826fa0ddfdff9ce1645b77e542131fedabab0d6c3fb522725cbaa5fc408275a.cab
-
2.exe.exe windows x86
35bbc20be27b9de06e5f37c77c0fca39
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WritePrivateProfileStringA
GetProcessVersion
SizeofResource
GetCPInfo
GetOEMCP
RtlUnwind
ExitProcess
TerminateProcess
HeapFree
HeapAlloc
RaiseException
GetTimeZoneInformation
GetSystemTime
GetLocalTime
HeapReAlloc
SetEnvironmentVariableA
SetCurrentDirectoryA
GetStartupInfoA
GetCommandLineA
GetACP
HeapSize
LCMapStringA
LCMapStringW
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
VirtualFree
VirtualAlloc
IsBadWritePtr
SetUnhandledExceptionFilter
CompareStringA
CompareStringW
GetFileType
SetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
GlobalFlags
SetErrorMode
TlsGetValue
GetProfileStringA
LocalReAlloc
TlsSetValue
GlobalReAlloc
TlsFree
GlobalHandle
TlsAlloc
LocalAlloc
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
SetFileTime
SystemTimeToFileTime
LocalFileTimeToFileTime
GetFileTime
MulDiv
SetLastError
FreeLibrary
GetVersion
lstrcatA
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GetModuleHandleA
GlobalUnlock
GlobalFree
LockResource
FindResourceA
LoadResource
GlobalLock
GlobalAlloc
GlobalDeleteAtom
GetCurrentThread
GetCurrentThreadId
lstrcmpiA
LoadLibraryA
GetProcAddress
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
WriteFile
GetCurrentProcess
DuplicateHandle
lstrcmpA
FileTimeToSystemTime
MultiByteToWideChar
WideCharToMultiByte
InterlockedDecrement
CreateDirectoryA
MoveFileA
SetVolumeLabelA
GetDriveTypeA
GetCurrentDirectoryA
GetFileSize
GetDiskFreeSpaceA
FormatMessageA
LocalFree
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
lstrlenA
CreateProcessA
GetLastError
GetExitCodeProcess
GetTempPathA
GetModuleFileNameA
RemoveDirectoryA
SetFileAttributesA
DeleteFileA
InterlockedIncrement
FindNextFileA
CreateFileA
SetFilePointer
ReadFile
CloseHandle
GetFullPathNameA
lstrcpynA
GetVolumeInformationA
GetFileAttributesA
lstrcpyA
FindFirstFileA
FindClose
FileTimeToLocalFileTime
HeapCreate
user32
ScreenToClient
AdjustWindowRectEx
GetSysColor
MapWindowPoints
UpdateWindow
ClientToScreen
GetWindowDC
BeginPaint
EndPaint
TabbedTextOutA
DrawTextA
GrayStringA
LoadStringA
GetClassNameA
PtInRect
GetSysColorBrush
InflateRect
DestroyMenu
InvalidateRect
WinHelpA
GetClassInfoA
RegisterClassA
GetMenu
GetMenuItemCount
GetSubMenu
GetMenuItemID
DefWindowProcA
CreateWindowExA
GetClassLongA
SetPropA
GetPropA
CallWindowProcA
RemovePropA
GetMessageTime
GetMessagePos
GetForegroundWindow
SetForegroundWindow
GetWindow
OffsetRect
IntersectRect
SystemParametersInfoA
GetWindowPlacement
GetWindowRect
CopyRect
GetDC
ReleaseDC
EndDialog
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetNextDlgTabItem
GetMessageA
GetActiveWindow
GetKeyState
CallNextHookEx
ValidateRect
IsWindowVisible
GetCursorPos
SetWindowsHookExA
GetLastActivePopup
UnhookWindowsHookEx
GetParent
SetFocus
IsWindowEnabled
ShowWindow
SetWindowPos
SetWindowLongA
GetDlgCtrlID
GetWindowTextLengthA
GetWindowTextA
SetWindowTextA
GetWindowLongA
IsDialogMessageA
SendDlgItemMessageA
GetDlgItem
CharUpperA
IsWindow
PostQuitMessage
UnregisterClassA
HideCaret
ShowCaret
CharToOemBuffA
OemToCharBuffA
wsprintfA
MsgWaitForMultipleObjects
TranslateMessage
DispatchMessageA
MessageBoxA
GetTopWindow
RegisterWindowMessageA
GetCapture
EnableWindow
LoadCursorA
SetCursor
IsIconic
GetSystemMetrics
GetClientRect
DrawIcon
PostMessageA
LoadIconA
SendMessageA
PeekMessageA
IsWindowUnicode
CharNextA
DefDlgProcA
DrawFocusRect
ExcludeUpdateRgn
GetFocus
gdi32
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
IntersectClipRect
DeleteObject
GetDeviceCaps
CreateSolidBrush
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
SetBkMode
GetStockObject
SelectObject
RestoreDC
SaveDC
DeleteDC
GetObjectA
SetBkColor
SetTextColor
GetClipBox
PatBlt
CreateDIBitmap
GetTextExtentPointA
BitBlt
CreateCompatibleDC
CreateBitmap
comdlg32
GetFileTitleA
winspool.drv
DocumentPropertiesA
ClosePrinter
OpenPrinterA
advapi32
RegCloseKey
RegCreateKeyExA
RegOpenKeyExA
RegSetValueExA
shell32
SHFileOperationA
comctl32
ord17
Sections
.text Size: 188KB - Virtual size: 186KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 36KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 164KB - Virtual size: 162KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
ppi.exe.exe windows x86
ab9f05af324330fc413c2c330a2b73e6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvbvm60
MethCallEngine
ord516
ord631
EVENT_SINK_AddRef
DllFunctionCall
EVENT_SINK_Release
EVENT_SINK_QueryInterface
__vbaExceptHandler
ord606
ord717
ProcCallEngine
ord537
ord644
ord572
ord100
ord616
ord618
ord581
Sections
.text Size: 188KB - Virtual size: 187KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 128KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ