Static task
static1
Behavioral task
behavioral1
Sample
a716d10b498a5ee01e14c70173659e394ef5c2cdbd5d325bd55e01deeb831900.exe
Resource
win7-20220812-en
General
-
Target
a716d10b498a5ee01e14c70173659e394ef5c2cdbd5d325bd55e01deeb831900
-
Size
232KB
-
MD5
9630bcd84cb45fc5a6d2ab8a6ae471c1
-
SHA1
f96abe40ca3ff1007b151bb5800a26b3ab5ffa63
-
SHA256
a716d10b498a5ee01e14c70173659e394ef5c2cdbd5d325bd55e01deeb831900
-
SHA512
87bff4e8b6201461b2428090d6077d0f8d28483b6925729d5307456a21feaad9f07c13e6ba272062728159e1c8b12ebe20d6dcf1774e923c9f9012b8bab7aa45
-
SSDEEP
6144:yl5qDSO2e2DCNWeo5P9UtcAD4YwQ6KHDr:yl5qDho5P9UtzX66
Malware Config
Signatures
Files
-
a716d10b498a5ee01e14c70173659e394ef5c2cdbd5d325bd55e01deeb831900.exe windows x86
8abb36ba4c6beb15d1dcec728ccaedcb
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
SHGetSpecialFolderPathA
ShellExecuteA
SHFileOperationA
shlwapi
PathRemoveExtensionA
PathFindExtensionA
PathFindFileNameA
SHDeleteValueA
PathAppendA
SHDeleteKeyA
SHGetValueA
PathFileExistsA
PathGetArgsA
PathIsDirectoryA
iphlpapi
GetAdaptersInfo
kernel32
FlushFileBuffers
SetEndOfFile
GetThreadLocale
GetFullPathNameA
GlobalGetAtomNameA
GetModuleFileNameW
InterlockedDecrement
WritePrivateProfileStringA
GetCurrentDirectoryA
GlobalFlags
LocalAlloc
LeaveCriticalSection
TlsGetValue
EnterCriticalSection
GlobalReAlloc
GlobalHandle
InitializeCriticalSection
TlsAlloc
TlsSetValue
LocalReAlloc
DeleteCriticalSection
TlsFree
InterlockedIncrement
lstrcmpW
GlobalFindAtomA
SetErrorMode
SetFilePointer
GetOEMCP
GetFileInformationByHandle
PeekNamedPipe
GetFileType
ExitProcess
HeapFree
HeapAlloc
VirtualAlloc
HeapReAlloc
GetCommandLineA
GetProcessHeap
GetStartupInfoA
RtlUnwind
RaiseException
HeapSize
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
SetStdHandle
SetHandleCount
GetStdHandle
GetACP
HeapDestroy
HeapCreate
VirtualFree
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetTimeZoneInformation
GetDriveTypeA
GetConsoleCP
GetConsoleMode
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEnvironmentVariableA
WriteFile
GetCurrentProcessId
GlobalAddAtomA
GlobalFree
GlobalUnlock
FormatMessageA
LocalFree
FindFirstFileA
FileTimeToLocalFileTime
FileTimeToSystemTime
FindNextFileA
FindClose
GetCurrentThread
GetCurrentThreadId
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
GlobalLock
lstrcmpA
GlobalAlloc
GlobalDeleteAtom
GetModuleHandleA
lstrcpyA
GetVersion
CompareStringA
InterlockedExchange
MultiByteToWideChar
CompareStringW
lstrlenA
SystemTimeToFileTime
GetSystemTimeAsFileTime
RemoveDirectoryA
TerminateProcess
OpenProcess
Sleep
CreateMutexA
MoveFileExA
DeleteFileA
GetShortPathNameA
GetCurrentProcess
SetPriorityClass
DeviceIoControl
GetLastError
GetVolumeInformationA
GetComputerNameA
lstrcatA
lstrcmpiA
SetLastError
GetVersionExA
CloseHandle
ReadFile
GetFileSize
CreateFileA
FindResourceA
LoadResource
LockResource
SizeofResource
WideCharToMultiByte
SetCurrentDirectoryA
CopyFileA
GetModuleFileNameA
GetTempPathA
FreeLibrary
GetProcAddress
LoadLibraryA
GetCPInfo
user32
GetSysColorBrush
UnregisterClassA
DestroyMenu
ShowWindow
LoadIconA
WinHelpA
GetClassLongA
SetPropA
GetPropA
RemovePropA
IsWindow
GetForegroundWindow
GetDlgItem
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetForegroundWindow
GetClientRect
GetMenu
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
CopyRect
DefWindowProcA
CallWindowProcA
SetWindowLongA
SetWindowPos
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetSysColor
ReleaseDC
GetDC
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
GetDlgCtrlID
GetWindowRect
GetClassNameA
PtInRect
SetWindowTextA
LoadCursorA
GetCapture
ClientToScreen
UnhookWindowsHookEx
GetSystemMetrics
RegisterWindowMessageA
MessageBoxA
FindWindowA
PostMessageA
GetDesktopWindow
GetWindow
GetWindowLongA
GetLastActivePopup
IsWindowEnabled
EnableWindow
SetCursor
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
GetFocus
GetParent
ModifyMenuA
EnableMenuItem
CheckMenuItem
GetWindowTextA
FindWindowExA
SendMessageTimeoutA
EnumWindows
GetWindowThreadProcessId
PostQuitMessage
ValidateRect
GetCursorPos
PeekMessageA
GetKeyState
SendMessageA
IsWindowVisible
GetActiveWindow
DispatchMessageA
TranslateMessage
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
SetWindowsHookExA
CallNextHookEx
GetMessageA
gdi32
SetMapMode
GetClipBox
GetStockObject
SetTextColor
SetBkColor
RestoreDC
SaveDC
DeleteObject
CreateBitmap
GetDeviceCaps
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
DeleteDC
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
RegCreateKeyExA
RegQueryValueA
RegEnumKeyA
RegOpenKeyA
RegEnumKeyExA
RegDeleteKeyA
RegSetValueExA
RegDeleteValueA
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
ole32
CoGetMalloc
StringFromIID
oleaut32
VariantClear
VariantChangeType
VariantInit
Sections
.text Size: 184KB - Virtual size: 181KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 176B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ