Static task
static1
Behavioral task
behavioral1
Sample
9ec6c18a604878ff149e6d35a89ceefe1c51881cfecc57ffad2165102261071f.exe
Resource
win7-20220812-en
General
-
Target
9ec6c18a604878ff149e6d35a89ceefe1c51881cfecc57ffad2165102261071f
-
Size
2.5MB
-
MD5
a0acefc9d45baff16bea68eeb73c490d
-
SHA1
e383b0af10a75922bad86d79a8fc5536e4612985
-
SHA256
9ec6c18a604878ff149e6d35a89ceefe1c51881cfecc57ffad2165102261071f
-
SHA512
78e7ad14bee009124ec88c8c3e9695d65069c9206642aa4d76fdf8bf9e82ff797669b38e0fb888872d148fe03d1a9eca8ca0eea9d7dc07638308a706f14990e0
-
SSDEEP
49152:qFeahZSPPPeRZGPPPPcoPPPP0YBPPPxC5626x6Eqj5VWO83HhV:qFeHPPPeTGPPPPcoPPPP0YBPPPxC562G
Malware Config
Signatures
Files
-
9ec6c18a604878ff149e6d35a89ceefe1c51881cfecc57ffad2165102261071f.exe windows x86
8eb7b27521ec57dc323c8f9764bbcc9d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
ShellExecuteA
DragFinish
DragQueryFileA
SHGetPathFromIDListA
SHGetSpecialFolderLocation
SHGetSpecialFolderPathA
SHGetFolderPathA
shlwapi
PathFindOnPathA
PathGetDriveNumberA
PathRemoveFileSpecA
PathAppendA
PathFileExistsA
PathMatchSpecA
PathIsURLA
PathIsUNCA
PathFindFileNameA
PathFindExtensionA
PathStripToRootA
wininet
InternetGetCookieA
InternetCloseHandle
InternetCrackUrlA
InternetOpenA
InternetConnectA
HttpOpenRequestA
InternetQueryOptionA
InternetSetOptionA
HttpSendRequestA
iphlpapi
GetAdaptersInfo
kernel32
TlsFree
GlobalFlags
InterlockedIncrement
GetCPInfo
GetOEMCP
GetFileAttributesA
GetFileTime
GetFullPathNameA
GetCurrentDirectoryA
FlushFileBuffers
LockFile
UnlockFile
DuplicateHandle
GetCurrentProcess
LocalReAlloc
SetErrorMode
GetTickCount
RtlUnwind
RaiseException
HeapAlloc
HeapFree
ExitThread
CreateThread
GetStartupInfoA
ExitProcess
HeapReAlloc
TerminateProcess
HeapSize
GetTimeZoneInformation
LCMapStringA
LCMapStringW
SetUnhandledExceptionFilter
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
GetStringTypeA
GetStringTypeW
GetSystemInfo
VirtualQuery
UnhandledExceptionFilter
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
IsBadReadPtr
IsBadCodePtr
SetStdHandle
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
SetEnvironmentVariableA
GetLocaleInfoW
TlsSetValue
TlsAlloc
TlsGetValue
GlobalHandle
GlobalReAlloc
LocalAlloc
FileTimeToLocalFileTime
FileTimeToSystemTime
VirtualProtect
SuspendThread
ResumeThread
SetThreadPriority
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesA
GlobalAlloc
GlobalFree
GlobalLock
GlobalUnlock
MulDiv
SetLastError
InterlockedDecrement
FreeResource
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
lstrcmpW
GetLogicalDriveStringsA
lstrcpynA
TerminateThread
CreateEventA
GetCurrentThreadId
SetEvent
ResetEvent
WaitForSingleObject
GetDriveTypeA
GetLogicalDrives
GetVolumeInformationA
GetModuleHandleA
GetModuleFileNameA
CreateDirectoryA
Sleep
GetWindowsDirectoryA
lstrcatA
GetComputerNameA
WritePrivateProfileStringA
GetCommandLineA
CreateMutexA
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
lstrcmpA
GetDateFormatA
GetTimeFormatA
GetPrivateProfileStringA
GetPrivateProfileSectionNamesA
GetEnvironmentVariableA
UnmapViewOfFile
GetFileSize
CreateFileMappingA
MapViewOfFileEx
CompareStringW
CompareStringA
GetVersion
lstrcmpiA
LoadLibraryA
GetProcAddress
FreeLibrary
GetLocalTime
SetEndOfFile
FormatMessageA
LocalFree
lstrlenA
MultiByteToWideChar
SetCurrentDirectoryA
FindFirstFileA
FindClose
lstrcpyA
FindNextFileA
GetLastError
DeleteFileA
CreateFileA
ReadFile
SetFilePointer
WriteFile
CloseHandle
WideCharToMultiByte
FindResourceA
LoadResource
LockResource
SizeofResource
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
user32
SetWindowContextHelpId
GetSysColorBrush
CharNextA
CopyAcceleratorTableA
GetNextDlgGroupItem
RegisterClipboardFormatA
PostThreadMessageA
MapDialogRect
GetMessageA
TranslateMessage
ValidateRect
ShowOwnedPopups
WindowFromPoint
PostQuitMessage
UnpackDDElParam
ReuseDDElParam
LoadAcceleratorsA
InsertMenuItemA
CreatePopupMenu
BringWindowToTop
SetMenu
TranslateAcceleratorA
DestroyMenu
GetMenuItemInfoA
wsprintfA
GetDesktopWindow
GetActiveWindow
CreateDialogIndirectParamA
GetNextDlgTabItem
EndDialog
EndPaint
BeginPaint
GetWindowDC
SetMenuItemBitmaps
ModifyMenuA
GetMenuState
GetMenuCheckMarkDimensions
IsWindowEnabled
SetWindowTextA
IsDialogMessageA
SetDlgItemTextA
RegisterWindowMessageA
WinHelpA
CreateWindowExA
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassInfoExA
SetPropA
GetPropA
RemovePropA
SendDlgItemMessageA
SetFocus
IsChild
GetWindowTextLengthA
GetWindowTextA
GetLastActivePopup
SetActiveWindow
DispatchMessageA
BeginDeferWindowPos
EndDeferWindowPos
GetTopWindow
DestroyWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
PeekMessageA
MapWindowPoints
MessageBoxA
SetScrollPos
GetScrollPos
UpdateWindow
GetMenu
GetMenuItemID
GetMenuItemCount
AdjustWindowRectEx
EqualRect
DeferWindowPos
SetScrollInfo
RegisterClassA
UnregisterClassA
GetDlgCtrlID
CallWindowProcA
IntersectRect
GetWindowPlacement
GetWindow
SystemParametersInfoA
MessageBeep
DestroyCursor
MoveWindow
SetRect
TrackMouseEvent
CopyIcon
EnableMenuItem
GetClassNameA
FindWindowExA
SetWindowPos
LoadIconA
KillTimer
SetTimer
GetSystemMenu
AppendMenuA
DrawIcon
EnumWindows
SetForegroundWindow
IsIconic
ShowWindow
SendMessageTimeoutA
GetKeyState
GetClipCursor
ClipCursor
GetSystemMetrics
SetCursor
GetClassInfoA
DefWindowProcA
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
LoadCursorA
GetCapture
ScreenToClient
ClientToScreen
InvertRect
SetRectEmpty
GetSysColor
EnableWindow
LoadBitmapA
SendMessageA
InflateRect
FillRect
PostMessageA
SetWindowRgn
GetWindowRect
GetClientRect
GetDC
ReleaseDC
InvalidateRect
InvalidateRgn
IsWindowVisible
GetFocus
GetParent
GetDlgItem
IsWindow
CheckMenuItem
GetSubMenu
LoadMenuA
TrackPopupMenu
GetCursorPos
CopyRect
IsRectEmpty
SetWindowLongA
GetWindowLongA
OffsetRect
SetCapture
ReleaseCapture
CharUpperA
FindWindowA
DrawStateA
PtInRect
RedrawWindow
GetForegroundWindow
gdi32
ExtSelectClipRgn
CreatePatternBrush
GetDeviceCaps
CreatePen
GetMapMode
DPtoLP
GetBkColor
GetTextColor
GetRgnBox
CreateFontA
Rectangle
GetTextMetricsA
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetCurrentObject
FillRgn
CreatePolygonRgn
CreateFontIndirectA
CreateSolidBrush
GetStockObject
GetObjectA
DeleteDC
SetPixel
GetPixel
GetBitmapDimensionEx
SelectObject
SetRectRgn
PtInRegion
DeleteObject
GetTextExtentPoint32A
BitBlt
CreateCompatibleDC
CreateCompatibleBitmap
CreateRoundRectRgn
RoundRect
CombineRgn
CreateRectRgn
ScaleWindowExtEx
SetWindowExtEx
SetWindowOrgEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
GetWindowExtEx
GetViewportExtEx
MoveToEx
LineTo
ExcludeClipRect
SetMapMode
SetBkMode
RestoreDC
SaveDC
CreateRectRgnIndirect
CreateBitmap
SetBkColor
SetTextColor
GetClipBox
advapi32
RegSetValueExA
RegOpenKeyExA
RegSetValueA
RegDeleteValueA
RegQueryValueExA
RegCreateKeyExA
GetUserNameA
RegEnumKeyExA
RegEnumValueA
RegQueryValueA
RegOpenKeyA
RegDeleteKeyA
RegEnumKeyA
RegCloseKey
comctl32
ImageList_AddMasked
ImageList_GetImageInfo
ord17
ImageList_Destroy
ImageList_Create
ImageList_LoadImageA
ImageList_Draw
ImageList_DrawIndirect
oledlg
ord8
ole32
CoTaskMemFree
CoInitialize
CoCreateInstance
CoUninitialize
CoTaskMemAlloc
CLSIDFromProgID
CoGetClassObject
StgOpenStorageOnILockBytes
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
OleUninitialize
CoFreeUnusedLibraries
OleInitialize
CoRevokeClassObject
OleIsCurrentClipboard
OleFlushClipboard
CoRegisterMessageFilter
CLSIDFromString
oleaut32
VariantClear
VariantChangeType
VariantInit
SysAllocStringLen
SysStringLen
VarUdateFromDate
SysAllocStringByteLen
VariantCopy
VarBstrFromDate
SafeArrayDestroy
SysAllocString
OleCreateFontIndirect
SystemTimeToVariantTime
SysFreeString
urlmon
URLOpenBlockingStreamA
oleacc
LresultFromObject
CreateStdAccessibleObject
winspool.drv
DocumentPropertiesA
OpenPrinterA
ClosePrinter
comdlg32
GetFileTitleA
Sections
.text Size: 512KB - Virtual size: 510KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 116KB - Virtual size: 115KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1.8MB - Virtual size: 1.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ