Static task
static1
Behavioral task
behavioral1
Sample
c99d717405375c5e71d3e66291e3eeba3ec94b9e910228394508fdb3f069b084.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c99d717405375c5e71d3e66291e3eeba3ec94b9e910228394508fdb3f069b084.exe
Resource
win10v2004-20220812-en
General
-
Target
c99d717405375c5e71d3e66291e3eeba3ec94b9e910228394508fdb3f069b084
-
Size
225KB
-
MD5
9b1abc4fd1d0d0ae5583df53c8cd9d10
-
SHA1
a0280e195557cf17517304552ac1c3ad8f5da9fe
-
SHA256
c99d717405375c5e71d3e66291e3eeba3ec94b9e910228394508fdb3f069b084
-
SHA512
87fff159c19d3e0d7d1e817e7cdb291e352c9061f6960b510c6ef6d4d1f1f8236e66f686c38e6f470db2e231a8f600d231d02d01720dbd5a4dbc072cb2654b71
-
SSDEEP
6144:WLLudBWbuDCvZvY6g7c83xtKxLpJjvkQ0Q:WLLudpYlY6dVxL3jvr
Malware Config
Signatures
Files
-
c99d717405375c5e71d3e66291e3eeba3ec94b9e910228394508fdb3f069b084.exe windows x86
96a2a2077190fcfc137f2c2f70217725
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comdlg32
GetFileTitleA
dwOKSubclass
gdi32
TextOutA
ExtTextOutA
SelectClipRgn
GdiPlayDCScript
CreateDIBitmap
GetDeviceCaps
DeleteDC
SetWindowExtEx
DeleteObject
RoundRect
CreateEllipticRgn
RestoreDC
ScaleViewportExtEx
GetRelAbs
GetClipBox
SaveDC
PtInRegion
SetMapMode
kernel32
GetCurrentThreadId
GetFileSize
WideCharToMultiByte
FreeEnvironmentStringsA
FlushFileBuffers
TlsSetValue
GetEnvironmentStringsW
lstrcpynA
GetVolumeInformationA
SystemTimeToFileTime
FatalExit
lstrlenA
LeaveCriticalSection
GetCommandLineA
ClearCommError
GlobalUnlock
GetEnvironmentStringsA
FindFirstFileA
VirtualAlloc
TlsAlloc
GetLastError
HeapDestroy
lstrcmpiA
GetProcAddress
SetHandleCount
SetFileAttributesA
GetFullPathNameA
GetModuleFileNameA
GlobalGetAtomNameA
SetEnvironmentVariableA
CompareStringW
GetStringTypeW
lstrcmpA
SetErrorMode
MulDiv
SystemTimeToTzSpecificLocalTime
LocalFree
FreeLibrary
GlobalAddAtomA
LocalAlloc
GetThreadLocale
CompareStringA
ReadFile
EnterCriticalSection
LocalFileTimeToFileTime
SetConsoleCursorInfo
Sleep
InterlockedDecrement
Toolhelp32ReadProcessMemory
FreeEnvironmentStringsW
FileTimeToSystemTime
LoadLibraryA
GlobalFree
GetCPInfo
FileTimeToLocalFileTime
HeapFree
IsBadCodePtr
LocalReAlloc
GetACP
GetCurrentDirectoryA
IsBadReadPtr
GetFileAttributesA
InitializeCriticalSection
SetFilePointer
CloseHandle
LoadResource
GetEnvironmentVariableA
UnhandledExceptionFilter
HeapCreate
GetSystemDirectoryA
RaiseException
SetLastError
Beep
GetFileType
GetFileTime
TlsFree
TlsGetValue
LockFile
MultiByteToWideChar
FindResourceA
GetStdHandle
GetTimeZoneInformation
GlobalAlloc
DeleteFileA
WriteFile
DeleteCriticalSection
IsDebuggerPresent
IsValidLocale
RtlUnwind
SetEndOfFile
GetProcessVersion
DuplicateHandle
GlobalLock
GetStartupInfoA
GetDriveTypeA
InterlockedIncrement
GetStringTypeA
lstrcatA
SetCurrentDirectoryA
VirtualFree
CreateFileA
FlushInstructionCache
DosDateTimeToFileTime
SetUnhandledExceptionFilter
InitializeSListHead
LCMapStringW
LCMapStringA
ExitProcess
GetVersionExA
LockResource
SetStdHandle
HeapSize
FindClose
GlobalHandle
GetModuleHandleA
ReleaseActCtx
GlobalFindAtomA
GetWindowsDirectoryA
GetVersion
GlobalFlags
LocalUnlock
SetConsoleTextAttribute
IsBadWritePtr
HeapAlloc
GlobalDeleteAtom
GetCurrentThread
HeapReAlloc
SetSystemTime
lstrcpyA
GetCurrentProcess
FindNextFileA
GetOEMCP
UnlockFile
winmm
timeGetSystemTime
waveOutGetPitch
mixerOpen
mmioAdvance
advapi32
SystemFunction030
RegCloseKey
AddUsersToEncryptedFile
RegSetValueExA
OpenThreadToken
LsaEnumeratePrivileges
LsaICLookupNamesWithCreds
LockServiceDatabase
SetSecurityDescriptorControl
RegCreateKeyExA
MSChapSrvChangePassword
AddAccessDeniedAceEx
RegOpenKeyExA
SystemFunction016
GetAclInformation
RegDeleteValueA
user32
GetMenu
SystemParametersInfoA
GetWindowPlacement
GrayStringA
GetFocus
IsWindow
GetClassInfoA
RemovePropA
PtInRect
GetClassNameA
GetDlgCtrlID
PeekMessageA
GetCapture
LoadStringA
GetDC
GetSystemMetrics
ShowWindow
SetMenuItemBitmaps
DefWindowProcA
GetWindowTextA
EndDialog
GetMenuItemID
LoadIconA
ReleaseDC
EnableWindow
CheckMenuItem
IsDialogMessageA
UnhookWindowsHookEx
DestroyWindow
ClientToScreen
PostQuitMessage
BeginPaint
GetParent
RegisterClassA
GetWindowTextLengthA
GetForegroundWindow
CopyRect
SendDlgItemMessageA
GetMenuState
GetWindowRect
LoadCursorA
CallNextHookEx
SetWindowTextA
IsWindowVisible
WinHelpA
GetKeyState
CharUpperA
SetWindowsHookExA
DestroyMenu
wsprintfA
MapWindowPoints
UpdateWindow
GetTopWindow
IsWindowEnabled
GetMenuItemCount
GetLastActivePopup
GetSysColor
CreateDialogIndirectParamA
GetSubMenu
SendMessageA
GetPropA
GetMessageA
GetWindow
GetCursorPos
PostMessageA
GetDlgItem
SetWindowLongA
SetPropA
GetSysColorBrush
MessageBoxA
GetMessagePos
GetClientRect
GetMenuCheckMarkDimensions
ValidateRect
SetActiveWindow
SetForegroundWindow
UnregisterClassA
EnableMenuItem
DrawIcon
GetWindowLongA
IsIconic
TranslateMessage
CreateWindowExA
SetWindowPos
ExitWindowsEx
GetActiveWindow
CallWindowProcA
LoadBitmapA
Sections
.text Size: 200KB - Virtual size: 200KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ