Static task
static1
Behavioral task
behavioral1
Sample
cb26252bee1d36af2d8084b5501b88fc9456d9fb49ca7b7c813cff18d33fbc47.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
cb26252bee1d36af2d8084b5501b88fc9456d9fb49ca7b7c813cff18d33fbc47.exe
Resource
win10v2004-20220812-en
General
-
Target
cb26252bee1d36af2d8084b5501b88fc9456d9fb49ca7b7c813cff18d33fbc47
-
Size
335KB
-
MD5
13eefc2ade99cdf1a50cb8db8546b04f
-
SHA1
d3807954c2e789f710f6445b83d57d2cd8d30c3e
-
SHA256
cb26252bee1d36af2d8084b5501b88fc9456d9fb49ca7b7c813cff18d33fbc47
-
SHA512
3841fe7eb57adee900bb25dc8707f943ac7be06e951c13d4e42348b4c277aa1f26a67ef54733e561ade455f2cc989598c0bf555f3d913b34b388b7588880395b
-
SSDEEP
6144:PYZfAk+qzkLwfu1n4GlJOK50ybSPG3rOiIKUsd0+VDZgLlffHckW:Al+yIvy1PG7pIKp0+ta5
Malware Config
Signatures
Files
-
cb26252bee1d36af2d8084b5501b88fc9456d9fb49ca7b7c813cff18d33fbc47.exe windows x86
074440e47d665ea112bb50df5e6b1d2a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
??1type_info@@UAE@XZ
memmove
_wtoi
_HUGE
floor
ceil
_XcptFilter
bsearch
_CIsqrt
_vsnprintf
_itow
_vsnwprintf
_onexit
_lock
__dllonexit
_unlock
_adjust_fdiv
_amsg_exit
_initterm
free
malloc
__CxxFrameHandler
_CxxThrowException
memcpy
memset
kernel32
GetCurrentProcess
HeapDestroy
GetModuleFileNameW
GlobalUnlock
GlobalLock
GlobalAlloc
FreeLibrary
lstrlenA
GetFileSize
CreateFileW
GetModuleHandleW
InterlockedIncrement
InterlockedDecrement
GetUserDefaultLCID
HeapAlloc
HeapFree
HeapReAlloc
GetVersion
GetProcAddress
GetProcessHeap
FreeLibraryAndExitThread
SetEvent
CreateEventW
GetModuleHandleExW
WaitForMultipleObjectsEx
CreateThread
CloseHandle
LoadLibraryW
WaitForSingleObjectEx
GlobalFree
GlobalHandle
GlobalSize
GlobalReAlloc
RtlUnwind
InterlockedExchange
Sleep
InterlockedCompareExchange
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
SetFilePointer
WriteFile
GetTimeZoneInformation
GetSystemTime
SystemTimeToFileTime
ReadFile
GetLocalTime
DisableThreadLibraryCalls
lstrcmpiW
GetVersionExW
VirtualProtect
VirtualAlloc
GetSystemInfo
GetCurrentThreadId
CompareStringW
VirtualQuery
lstrlenW
MultiByteToWideChar
GetLastError
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
user32
GetSystemMetrics
DestroyWindow
LoadImageW
PostMessageW
FillRect
CopyRect
SetRect
IsCharAlphaNumericW
IsCharAlphaW
CharUpperW
ReleaseCapture
GetWindowLongW
PeekMessageW
DispatchMessageW
TranslateMessage
MsgWaitForMultipleObjects
LoadStringW
DefWindowProcW
CreateWindowExW
RegisterClassExW
SetWindowLongW
SystemParametersInfoW
MapWindowPoints
EqualRect
IntersectRect
KillTimer
SetTimer
RegisterClassW
ReleaseDC
GetDC
SetRectEmpty
gdi32
SelectObject
CreateCompatibleBitmap
CreateCompatibleDC
SetBkColor
SetTextColor
BitBlt
DeleteObject
DeleteDC
SetPixel
GetDeviceCaps
StretchBlt
SetStretchBltMode
CreateSolidBrush
GetPaletteEntries
GetObjectW
CreateDIBSection
GetPixel
advapi32
RegEnumKeyExW
RegDeleteKeyW
RegCloseKey
RegCreateKeyExW
RegOpenKeyExW
IsTextUnicode
RegSetValueExW
RegQueryInfoKeyW
ole32
CoTaskMemFree
CoTaskMemAlloc
CoInitializeEx
CoUninitialize
StringFromCLSID
CoCreateInstance
CLSIDFromString
CoMarshalInterThreadInterfaceInStream
CoGetInterfaceAndReleaseStream
StringFromGUID2
OleRun
oleaut32
VariantClear
SysStringByteLen
VariantInit
SysAllocString
SysAllocStringLen
SysStringLen
SysFreeString
VariantCopy
VariantChangeType
LoadRegTypeLi
SetErrorInfo
CreateErrorInfo
LoadTypeLi
VariantChangeTypeEx
GetErrorInfo
SafeArrayCreateVector
SafeArrayAccessData
SafeArrayUnaccessData
urlmon
CoInternetCombineUrl
FindMimeFromData
URLDownloadToCacheFileW
CoGetClassObjectFromURL
CreateAsyncBindCtx
CompatFlagsFromClsid
wininet
InternetCrackUrlW
InternetCombineUrlW
InternetGetConnectedStateExW
ddraw
DirectDrawCreate
shlwapi
PathFindExtensionW
ord158
SHRegGetValueW
StrStrIW
StrCSpnIW
StrStrW
PathFileExistsW
StrCmpW
wnsprintfW
StrSpnW
StrRChrW
StrCmpNW
StrCmpIW
ord2
StrCmpNIW
PathAppendW
ord29
PathFindFileNameW
rpcrt4
NdrDllGetClassObject
NdrCStdStubBuffer_Release
NdrDllCanUnloadNow
CStdStubBuffer_CountRefs
NdrOleAllocate
CStdStubBuffer_DebugServerRelease
CStdStubBuffer_DebugServerQueryInterface
NdrOleFree
CStdStubBuffer_IsIIDSupported
CStdStubBuffer_Invoke
CStdStubBuffer_Disconnect
CStdStubBuffer_Connect
CStdStubBuffer_AddRef
CStdStubBuffer_QueryInterface
IUnknown_Release_Proxy
IUnknown_AddRef_Proxy
IUnknown_QueryInterface_Proxy
Sections
.text Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.fhj5 Size: 512B - Virtual size: 180B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.fhj50 Size: 512B - Virtual size: 202B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.fhj51 Size: 512B - Virtual size: 176B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.fhj52 Size: 146KB - Virtual size: 145KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.fhj53 Size: 146KB - Virtual size: 145KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.fhj54 Size: 512B - Virtual size: 222B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.fhj55 Size: 512B - Virtual size: 222B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.fhj56 Size: 512B - Virtual size: 222B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.fhj57 Size: 512B - Virtual size: 222B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.fhj58 Size: 512B - Virtual size: 222B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.fhj59 Size: 512B - Virtual size: 222B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.1231 Size: 512B - Virtual size: 244B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.JAKS Size: 512B - Virtual size: 134B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.GAHS Size: 512B - Virtual size: 194B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.HAJS Size: 512B - Virtual size: 166B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.HnJS Size: 512B - Virtual size: 200B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 288KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ