Static task
static1
Behavioral task
behavioral1
Sample
ec20e708ee3a0bfd485709a3fb6802988646ca613ff0020889872dc9281596fc.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ec20e708ee3a0bfd485709a3fb6802988646ca613ff0020889872dc9281596fc.exe
Resource
win10v2004-20220812-en
General
-
Target
ec20e708ee3a0bfd485709a3fb6802988646ca613ff0020889872dc9281596fc
-
Size
368KB
-
MD5
381182f68cd574c904cad37210bb6d81
-
SHA1
2a689ecf57286103ba9d9fcb89f43923790e47f6
-
SHA256
ec20e708ee3a0bfd485709a3fb6802988646ca613ff0020889872dc9281596fc
-
SHA512
9282b257cf85f25d7d786433555d63a277f0ce87e0ce1d2307f0792ef24a6f7b024d0f9c5de89e876fd38ca3e4b8f6b75522b8ded386efc1ba8496cc472e9c0f
-
SSDEEP
6144:RFBCI3sdEbjS/F0zJlqku4MCzuKsZnBb/B23hEWvkVhKxUfeUjfI3v8rYwzFwG4q:Bb0Fwnu4MdKs3bJ4vkVhKxUfeUjfI3vI
Malware Config
Signatures
Files
-
ec20e708ee3a0bfd485709a3fb6802988646ca613ff0020889872dc9281596fc.exe windows x86
28e9e95c83f773e18a3c38134e1a0441
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
PathStripToRootW
PathAppendW
PathFindFileNameW
StrCatW
SHGetValueW
SHSetValueW
PathFileExistsW
PathIsUNCW
wininet
InternetConnectW
InternetCloseHandle
HttpOpenRequestW
HttpSendRequestW
HttpQueryInfoW
InternetReadFile
InternetOpenW
kernel32
GlobalReAlloc
GlobalHandle
InitializeCriticalSection
TlsAlloc
TlsSetValue
LocalReAlloc
DeleteCriticalSection
TlsFree
GetModuleHandleW
InterlockedDecrement
GetVersion
GetFileAttributesW
GetFileTime
GetModuleHandleA
lstrcmpW
GlobalFlags
GetVersionExA
LoadLibraryA
GlobalDeleteAtom
GlobalFindAtomW
GlobalAddAtomW
InterlockedExchange
CompareStringA
GetLocaleInfoW
ExitProcess
EnterCriticalSection
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapFree
GetCommandLineA
HeapAlloc
GetProcessHeap
GetStartupInfoA
RaiseException
RtlUnwind
HeapReAlloc
HeapSize
GetStdHandle
GetModuleFileNameA
SetStdHandle
GetFileType
SetHandleCount
CreateFileA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
GetCPInfo
GetACP
GetOEMCP
GetConsoleCP
GetConsoleMode
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetTimeZoneInformation
GetLocaleInfoA
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEnvironmentVariableA
TlsGetValue
LeaveCriticalSection
LocalAlloc
ReleaseSemaphore
CreateSemaphoreW
GetFullPathNameW
GetVolumeInformationW
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
ReadFile
GetThreadLocale
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
GetSystemTime
LocalFree
FileTimeToLocalFileTime
GetCurrentThreadId
GetLocalTime
FileTimeToSystemTime
FormatMessageW
CompareStringW
WideCharToMultiByte
ReleaseMutex
InterlockedCompareExchange
WaitForSingleObject
InterlockedIncrement
FindClose
FindNextFileW
FindFirstFileW
Sleep
CreateDirectoryW
GetLastError
CreateMutexW
SetLastError
RemoveDirectoryW
DeleteFileW
ResumeThread
GetCurrentProcess
SetPriorityClass
GetCurrentThread
SetThreadPriority
CreateProcessW
CloseHandle
lstrlenW
WriteFile
GetModuleFileNameW
CreateFileW
GetTempPathW
FreeLibrary
GetCurrentProcessId
GetProcAddress
LoadLibraryW
GetComputerNameW
SystemTimeToFileTime
GetSystemTimeAsFileTime
GetVersionExW
MultiByteToWideChar
FindResourceW
LoadResource
LockResource
SizeofResource
TerminateProcess
user32
DestroyMenu
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapW
ModifyMenuW
EnableMenuItem
CheckMenuItem
LoadIconW
WinHelpW
GetCapture
GetClassLongW
SetPropW
GetPropW
RemovePropW
GetForegroundWindow
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetForegroundWindow
GetClientRect
GetMenu
PostMessageW
GetClassInfoExW
GetClassInfoW
RegisterClassW
AdjustWindowRectEx
CopyRect
CallWindowProcW
SystemParametersInfoA
IsIconic
GetWindowPlacement
SetWindowPos
SetWindowLongW
GetDlgItem
GetFocus
GetWindow
GetDlgCtrlID
GetWindowRect
GetClassNameW
PtInRect
SetWindowTextW
SetWindowsHookExW
CallNextHookEx
GetKeyState
PeekMessageW
ValidateRect
GrayStringW
DrawTextExW
DrawTextW
TabbedTextOutW
LoadCursorW
GetDC
ReleaseDC
GetSysColor
GetSysColorBrush
GetWindowTextW
UnhookWindowsHookEx
GetWindowThreadProcessId
SendMessageW
GetParent
GetWindowLongW
GetLastActivePopup
IsWindowEnabled
CharUpperW
GetSystemMetrics
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
IsWindow
IsWindowVisible
EnableWindow
DispatchMessageW
TranslateMessage
SetMessageExtraInfo
GetMessageW
SetTimer
CreateWindowExW
RegisterClassExW
DefWindowProcW
PostQuitMessage
GetMessageExtraInfo
MessageBoxW
wsprintfW
RegisterWindowMessageW
ClientToScreen
UnregisterClassA
gdi32
CreateBitmap
GetStockObject
ScaleWindowExtEx
SetWindowExtEx
GetClipBox
SetMapMode
SetTextColor
SetBkColor
RestoreDC
SaveDC
GetDeviceCaps
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutW
TextOutW
RectVisible
PtVisible
DeleteObject
DeleteDC
comdlg32
GetFileTitleW
winspool.drv
OpenPrinterW
DocumentPropertiesW
ClosePrinter
advapi32
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
RegCloseKey
RegQueryValueW
RegEnumValueW
RegQueryInfoKeyW
RegOpenKeyExW
RegDeleteValueW
RegDeleteKeyW
RegEnumKeyExW
RegQueryValueExW
RegOpenKeyW
shell32
SHGetFolderPathW
SHGetSpecialFolderPathW
ShellExecuteW
ole32
CoInitializeEx
oleaut32
VariantInit
VariantChangeType
VariantClear
Sections
.text Size: 280KB - Virtual size: 276KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 68KB - Virtual size: 65KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 620B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ