Static task
static1
Behavioral task
behavioral1
Sample
8753d3c7c4f16f4cab8701a690fd8d4d89dd8ed74e29dfb23229deb43f33c8a0.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
8753d3c7c4f16f4cab8701a690fd8d4d89dd8ed74e29dfb23229deb43f33c8a0.exe
Resource
win10v2004-20221111-en
General
-
Target
8753d3c7c4f16f4cab8701a690fd8d4d89dd8ed74e29dfb23229deb43f33c8a0
-
Size
415KB
-
MD5
35bff52e6193fe50221f91ab5d86d28e
-
SHA1
051a62f3a2aa91aea0226765256d3aa7bc969061
-
SHA256
8753d3c7c4f16f4cab8701a690fd8d4d89dd8ed74e29dfb23229deb43f33c8a0
-
SHA512
fa241316f392481a4e8e2e6d69ac4e9d34d2df5f1410a202313ef7553125c5f72218db4fb9cf621a3a8c26f9054be9830480d9945ceef30bdcb52b2cb4baa019
-
SSDEEP
6144:mtyYobXxywVgAE50DqVHG/hk/yoaaMRPH6xN2fMO9D1DZkfgTvoh:sUbXxywOAEqDIHGUyoaaMpH6DiK
Malware Config
Signatures
Files
-
8753d3c7c4f16f4cab8701a690fd8d4d89dd8ed74e29dfb23229deb43f33c8a0.exe windows x86
7bc2a929aca87b0f8ae8bcb5ce98b7ee
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
sensapi
IsNetworkAlive
kernel32
InterlockedIncrement
lstrlenA
RaiseException
EnterCriticalSection
LeaveCriticalSection
lstrcmpiA
GetModuleFileNameA
IsDBCSLeadByte
Sleep
CreateThread
CreateEventA
GetModuleHandleW
GetCurrentThreadId
SetEvent
ExitProcess
GetTickCount
FreeLibrary
FindResourceA
LoadLibraryExA
GetCommandLineA
FlushInstructionCache
GetCurrentProcess
SetLastError
LoadLibraryA
SetFilePointer
CreateDirectoryA
GetTempPathA
MoveFileExA
GetTempFileNameA
InitializeCriticalSection
GlobalUnlock
GlobalLock
GlobalAlloc
lstrcmpA
MulDiv
ReleaseMutex
ResetEvent
CreateMutexA
GetVersionExA
GetEnvironmentVariableA
SetEnvironmentVariableA
CreateFileA
HeapReAlloc
HeapSize
FindResourceExW
InitializeCriticalSectionAndSpinCount
CreateFileW
WriteConsoleW
FlushFileBuffers
SetStdHandle
LoadLibraryW
LCMapStringW
GetConsoleMode
GetConsoleCP
GetStringTypeW
GetCurrentProcessId
QueryPerformanceCounter
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
GetModuleFileNameW
GetStdHandle
GetTimeZoneInformation
TerminateProcess
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
HeapCreate
GetSystemTimeAsFileTime
GetStartupInfoW
HeapSetInformation
VirtualQuery
GetSystemInfo
VirtualProtect
GetDateFormatA
GetTimeFormatA
RtlUnwind
EncodePointer
DecodePointer
LocalFree
InterlockedPopEntrySList
VirtualAlloc
VirtualFree
WaitForSingleObject
GetFileTime
InterlockedDecrement
lstrlenW
MultiByteToWideChar
FileTimeToLocalFileTime
FileTimeToSystemTime
WriteFile
WideCharToMultiByte
CloseHandle
GetModuleHandleA
FindResourceW
LoadResource
LockResource
SizeofResource
DeleteCriticalSection
GetLastError
CompareStringW
GetProcessHeap
GetProcAddress
HeapFree
HeapAlloc
HeapDestroy
IsProcessorFeaturePresent
InterlockedPushEntrySList
InterlockedCompareExchange
user32
ShowWindow
SetWindowPos
CharNextW
PostThreadMessageA
CharUpperA
UnregisterClassA
DestroyWindow
SetWindowLongA
IsWindow
GetClassInfoExA
LoadCursorA
LoadIconA
CharNextA
SendMessageA
CallWindowProcA
GetWindowLongA
SetWindowTextA
FillRect
MsgWaitForMultipleObjects
PeekMessageA
GetWindowTextLengthA
GetWindowTextA
CreateAcceleratorTableA
DestroyAcceleratorTable
GetDesktopWindow
SetFocus
GetFocus
GetWindow
BeginPaint
EndPaint
RegisterClassExA
ReleaseCapture
GetClassNameA
GetDlgItem
GetParent
IsChild
SetCapture
RedrawWindow
InvalidateRgn
InvalidateRect
ReleaseDC
GetDC
ScreenToClient
ClientToScreen
GetClientRect
MoveWindow
GetSysColor
GetMessageA
TranslateMessage
DispatchMessageA
KillTimer
RegisterWindowMessageA
PostQuitMessage
CreateWindowExA
DefWindowProcA
gdi32
BitBlt
GetStockObject
GetObjectA
CreateSolidBrush
GetDeviceCaps
DeleteObject
CreateCompatibleDC
CreateCompatibleBitmap
DeleteDC
SelectObject
advapi32
RegQueryInfoKeyW
RegQueryValueExA
RegQueryInfoKeyA
RegDeleteValueA
RegEnumKeyExA
RegSetValueExA
RegCloseKey
RegDeleteKeyA
RegCreateKeyExA
RegOpenKeyExA
shell32
ShellExecuteExA
Shell_NotifyIconA
SHGetSpecialFolderPathW
ord165
SHGetSpecialFolderPathA
SHGetFileInfoA
ole32
OleRun
OleUninitialize
OleInitialize
CoGetClassObject
CoCreateInstance
CLSIDFromProgID
CLSIDFromString
CoTaskMemFree
StringFromCLSID
CoTaskMemAlloc
CoTaskMemRealloc
CoInitialize
CoUninitialize
CoRevokeClassObject
CoCreateGuid
CoRegisterClassObject
StringFromGUID2
CoAddRefServerProcess
CoReleaseServerProcess
CoInitializeEx
CreateStreamOnHGlobal
OleLockRunning
oleaut32
LoadRegTypeLi
GetErrorInfo
SafeArrayLock
OleCreateFontIndirect
SysStringByteLen
SysAllocStringByteLen
VarBstrCat
DispCallFunc
RegisterTypeLi
UnRegisterTypeLi
VarUI4FromStr
LoadTypeLi
SafeArrayUnlock
SafeArrayCopy
SafeArrayDestroy
SysAllocStringLen
VariantCopy
SysAllocString
VariantClear
VariantInit
SysFreeString
VarBstrCmp
SysStringLen
SafeArrayGetLBound
SafeArrayGetUBound
SafeArrayGetVartype
SafeArrayGetDim
shlwapi
SHGetValueA
PathAppendA
PathRenameExtensionA
PathFindFileNameA
PathFindExtensionA
PathIsURLW
StrStrW
StrToIntW
Sections
.text Size: 239KB - Virtual size: 239KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 54KB - Virtual size: 53KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 14KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 27KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.vrdata Size: 76KB - Virtual size: 76KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE