Static task
static1
Behavioral task
behavioral1
Sample
4e77074b133abe1567526a3061cf92a463dfa74f8b29ce15b7d66c896576e52f.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
4e77074b133abe1567526a3061cf92a463dfa74f8b29ce15b7d66c896576e52f.exe
Resource
win10v2004-20221111-en
General
-
Target
4e77074b133abe1567526a3061cf92a463dfa74f8b29ce15b7d66c896576e52f
-
Size
734KB
-
MD5
8dd8a5cea944025ec060e6c9dd1d3a32
-
SHA1
509af07fc878bc3b784c031b0b3af5a062b52eab
-
SHA256
4e77074b133abe1567526a3061cf92a463dfa74f8b29ce15b7d66c896576e52f
-
SHA512
9313393b1f91f18b07b4f1bbcfd45820941d5a3546faafd5272c5cf35295c6824d41755a4a18a23b392eed921258f6f43eec31fc4b5f97efce2dff7512dcd10d
-
SSDEEP
12288:bl0UJjSMVcDGIfS/M3Mss+l0zblPzgOvPFebQp7cnPk+sHRRnZdpuBS8NZvDd5hs:K/Zl0zblPcO1ebVPamzZvDd5hjXo
Malware Config
Signatures
Files
-
4e77074b133abe1567526a3061cf92a463dfa74f8b29ce15b7d66c896576e52f.exe windows x86
3cfe6ab542b78f6b1812758b6c689772
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ws2_32
connect
ioctlsocket
socket
WSAGetLastError
htons
send
recv
select
inet_addr
htonl
closesocket
WSACleanup
WSAStartup
gethostbyname
msimg32
GradientFill
kernel32
ReadFile
SetFilePointer
FlushFileBuffers
LockFile
UnlockFile
SetEndOfFile
GetFileSize
DuplicateHandle
GetCurrentProcess
FindClose
FindFirstFileA
GetVolumeInformationA
GetFullPathNameA
GetTickCount
SetErrorMode
FileTimeToLocalFileTime
GetFileAttributesA
GetFileSizeEx
GetFileTime
RtlUnwind
ExitProcess
GetCommandLineA
GetStartupInfoA
RaiseException
VirtualProtect
GetSystemInfo
VirtualQuery
HeapReAlloc
ExitThread
CreateThread
HeapSize
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetConsoleCP
GetConsoleMode
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapCreate
VirtualFree
QueryPerformanceCounter
GetACP
IsValidCodePage
GetStringTypeA
GetStringTypeW
GetTimeZoneInformation
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
LCMapStringA
LCMapStringW
CompareStringW
SetEnvironmentVariableA
WritePrivateProfileStringA
FileTimeToSystemTime
GetModuleHandleW
GetOEMCP
GetCPInfo
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
GlobalFlags
InterlockedDecrement
GetModuleFileNameW
GetCurrentProcessId
CreateEventA
SuspendThread
SetEvent
ResumeThread
SetThreadPriority
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesA
GetModuleFileNameA
GetLocaleInfoA
InterlockedExchange
lstrcmpA
GetThreadLocale
InterlockedIncrement
GlobalAlloc
FormatMessageA
LocalFree
MulDiv
lstrlenA
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
FreeLibrary
CompareStringA
GetLastError
SetLastError
MultiByteToWideChar
lstrcmpW
GetVersionExA
GlobalLock
GlobalUnlock
GlobalFree
FreeResource
GetSystemTimeAsFileTime
OpenProcess
Sleep
VirtualAllocEx
WriteProcessMemory
GetModuleHandleA
CreateRemoteThread
WaitForSingleObject
VirtualFreeEx
GetCurrentDirectoryA
LoadLibraryA
GetProcAddress
WideCharToMultiByte
CreateFileA
WriteFile
CloseHandle
FindResourceA
LoadResource
SizeofResource
LockResource
lstrcmpiA
HeapFree
GetProcessHeap
HeapAlloc
GetCurrentThreadId
VirtualAlloc
user32
EndPaint
LoadCursorA
CopyAcceleratorTableA
IsRectEmpty
SetRect
InvalidateRect
InvalidateRgn
SetCapture
ReleaseCapture
CharUpperA
GetNextDlgGroupItem
MessageBeep
UnregisterClassA
RegisterClipboardFormatA
PostThreadMessageA
GetMessageA
TranslateMessage
GetCursorPos
ValidateRect
PostQuitMessage
CharNextA
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
ModifyMenuA
GetMenuState
EnableMenuItem
CheckMenuItem
RegisterWindowMessageA
SendDlgItemMessageA
WinHelpA
IsChild
GetCapture
GetClassLongA
SetPropA
BeginPaint
RemovePropA
SetFocus
GetWindowTextLengthA
GetForegroundWindow
GetLastActivePopup
DispatchMessageA
GetTopWindow
GetMessageTime
GetMessagePos
PeekMessageA
MapWindowPoints
GetKeyState
SetMenu
SetForegroundWindow
IsWindowVisible
UpdateWindow
PostMessageA
GetSubMenu
GetMenuItemID
GetMenuItemCount
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
EqualRect
CopyRect
PtInRect
GetDlgCtrlID
GetMenu
SetWindowPos
IntersectRect
SystemParametersInfoA
GetWindowPlacement
GetWindow
GetDesktopWindow
GetActiveWindow
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
IsWindow
GetDlgItem
IsWindowEnabled
GetParent
GetNextDlgTabItem
EndDialog
FindWindowA
GetWindowThreadProcessId
MessageBoxA
EnumWindows
GetClientRect
IsIconic
DrawIcon
GetSystemMenu
AppendMenuA
LoadIconA
EnableWindow
GetSystemMetrics
GetSysColorBrush
FrameRect
InflateRect
GetDC
ClientToScreen
GrayStringA
DrawTextExA
TabbedTextOutA
DestroyMenu
SetWindowContextHelpId
MapDialogRect
GetPropA
SetCursor
GetSysColor
FillRect
DrawFocusRect
GetWindowTextA
OffsetRect
DrawTextA
CallWindowProcA
DefWindowProcA
TrackMouseEvent
CallNextHookEx
EnumChildWindows
ReleaseDC
GetWindowRect
GetWindowDC
GetClassNameA
GetWindowLongA
GetFocus
SetWindowLongA
SendMessageA
RedrawWindow
EnumThreadWindows
UnhookWindowsHookEx
SetWindowsHookExA
gdi32
GetClipBox
SetBkColor
GetViewportExtEx
GetWindowExtEx
PtVisible
RectVisible
TextOutA
Escape
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
CreatePen
ExtSelectClipRgn
CreateRectRgnIndirect
GetRgnBox
GetMapMode
GetStockObject
MoveToEx
LineTo
CreateSolidBrush
SetPixel
SetTextColor
DeleteObject
DeleteDC
CreateCompatibleDC
SetBkMode
SelectObject
CreateCompatibleBitmap
BitBlt
SetMapMode
RestoreDC
SaveDC
ExtTextOutA
GetTextColor
GetBkColor
GetDeviceCaps
CreateBitmap
GetObjectA
comdlg32
GetFileTitleA
winspool.drv
DocumentPropertiesA
ClosePrinter
OpenPrinterA
advapi32
RegSetValueExA
RegCreateKeyExA
RegQueryValueA
RegOpenKeyA
RegEnumKeyA
RegDeleteKeyA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
shlwapi
PathFindFileNameA
PathStripToRootA
PathIsUNCA
PathFindExtensionA
oledlg
ord8
ole32
CLSIDFromString
CLSIDFromProgID
CoTaskMemAlloc
CoTaskMemFree
CoGetClassObject
StgOpenStorageOnILockBytes
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
CoRegisterMessageFilter
OleFlushClipboard
OleIsCurrentClipboard
CoRevokeClassObject
OleInitialize
CoFreeUnusedLibraries
OleUninitialize
oleaut32
VariantCopy
OleCreateFontIndirect
SysAllocStringByteLen
SysFreeString
SysStringLen
SysAllocStringLen
VariantInit
VariantChangeType
VariantClear
SafeArrayDestroy
VariantTimeToSystemTime
SystemTimeToVariantTime
SysAllocString
Sections
.text Size: 245KB - Virtual size: 245KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 57KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 335KB - Virtual size: 335KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vmp0 Size: 83KB - Virtual size: 82KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ