Static task
static1
Behavioral task
behavioral1
Sample
9edbcf04a865d4b817513c31c51b931b0962cefc8bfc608d432aa16b16d941f0.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
9edbcf04a865d4b817513c31c51b931b0962cefc8bfc608d432aa16b16d941f0.exe
Resource
win10v2004-20220901-en
General
-
Target
9edbcf04a865d4b817513c31c51b931b0962cefc8bfc608d432aa16b16d941f0
-
Size
232KB
-
MD5
c8351b0df80635234811d9a2d4961531
-
SHA1
d54c3911bc5533f31c5b081ee89f78ce4c5f6b59
-
SHA256
9edbcf04a865d4b817513c31c51b931b0962cefc8bfc608d432aa16b16d941f0
-
SHA512
75a6780051a04d40ff5d544deaeb6903653fe9f46cf0efd08f2b3b7586e40de42641fa984220733a9e63f5854624b8b5f3dd8395aac720f17c16da826033934b
-
SSDEEP
3072:UiX/qtaHW2IvT27uQnKH80zt82JDJAAVcjlWnScyFtGjRdtfRr+T2:TisHW2Ib27u+e80zaPEcAScyF89RrX
Malware Config
Signatures
Files
-
9edbcf04a865d4b817513c31c51b931b0962cefc8bfc608d432aa16b16d941f0.exe windows x86
40534f8961463f59437145bffd10c8a9
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
PathIsUNCA
PathFindExtensionA
PathFindFileNameA
PathStripToRootA
PathFileExistsA
PathAppendA
SHSetValueA
SHGetValueA
wininet
HttpQueryInfoA
HttpSendRequestA
HttpOpenRequestA
InternetCloseHandle
InternetConnectA
InternetOpenA
InternetReadFile
kernel32
TlsGetValue
EnterCriticalSection
GlobalReAlloc
GlobalHandle
InitializeCriticalSection
TlsAlloc
TlsSetValue
LocalReAlloc
DeleteCriticalSection
TlsFree
WritePrivateProfileStringA
GlobalFlags
GetVersionExA
lstrcmpW
GlobalFindAtomA
SetErrorMode
FileTimeToSystemTime
FileTimeToLocalFileTime
GetFileAttributesA
GetFileTime
GetCPInfo
GetOEMCP
RaiseException
RtlUnwind
ExitProcess
HeapAlloc
HeapFree
HeapReAlloc
LeaveCriticalSection
GetCommandLineA
GetProcessHeap
GetStartupInfoA
HeapSize
SetUnhandledExceptionFilter
TerminateProcess
UnhandledExceptionFilter
IsDebuggerPresent
GetStdHandle
GetFileType
SetStdHandle
SetHandleCount
Sleep
VirtualFree
HeapDestroy
HeapCreate
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetACP
GetTimeZoneInformation
GetConsoleCP
GetConsoleMode
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEnvironmentVariableA
LocalAlloc
GetModuleFileNameW
InterlockedDecrement
InterlockedIncrement
GlobalGetAtomNameA
GetFullPathNameA
GetVolumeInformationA
FindFirstFileA
FindClose
DuplicateHandle
GetThreadLocale
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
ReadFile
GetCurrentProcessId
GlobalAddAtomA
WaitForSingleObject
GetCurrentThreadId
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
lstrcmpA
FreeLibrary
GlobalDeleteAtom
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageA
LocalFree
ReleaseSemaphore
CreateSemaphoreA
CompareStringW
CompareStringA
GetVersion
MultiByteToWideChar
InterlockedExchange
LoadLibraryA
GetProcAddress
GetModuleHandleA
lstrcatA
SetLastError
CreateMutexA
GetLastError
GetComputerNameA
DeleteFileA
RemoveDirectoryA
WideCharToMultiByte
GetSystemTimeAsFileTime
SystemTimeToFileTime
GetTempPathA
CreateFileA
GetModuleFileNameA
lstrlenA
WriteFile
CloseHandle
CreateProcessA
SetThreadPriority
GetCurrentThread
GetCurrentProcess
SetPriorityClass
ResumeThread
FindResourceA
LoadResource
LockResource
SizeofResource
VirtualAlloc
user32
DestroyMenu
UnregisterClassA
ShowWindow
LoadIconA
WinHelpA
GetCapture
GetClassLongA
SetPropA
GetPropA
RemovePropA
IsWindow
GetForegroundWindow
GetDlgItem
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetForegroundWindow
GetClientRect
GetMenu
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
CopyRect
CallWindowProcA
SetWindowLongA
SetWindowPos
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindow
GetDlgCtrlID
GetWindowRect
GetClassNameA
GetWindowTextA
SetWindowTextA
UnhookWindowsHookEx
LoadCursorA
GetSysColorBrush
GetSysColor
wsprintfA
MessageBoxA
PtInRect
PostQuitMessage
GetMessageExtraInfo
DefWindowProcA
ReleaseDC
GetDC
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
GetSystemMetrics
GetWindowThreadProcessId
GetWindowLongA
GetLastActivePopup
IsWindowEnabled
EnableWindow
SetCursor
SetWindowsHookExA
CallNextHookEx
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
RegisterWindowMessageA
CharUpperA
GetSubMenu
GetMenuItemCount
GetMenuItemID
GetMenuState
PostMessageA
CheckMenuItem
EnableMenuItem
ModifyMenuA
SendMessageA
IsWindowVisible
GetKeyState
PeekMessageA
GetCursorPos
ValidateRect
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
GetFocus
GetParent
gdi32
GetStockObject
DeleteDC
SetTextColor
SetBkColor
RestoreDC
SaveDC
CreateBitmap
GetDeviceCaps
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
DeleteObject
GetClipBox
SetMapMode
comdlg32
GetFileTitleA
winspool.drv
DocumentPropertiesA
OpenPrinterA
ClosePrinter
advapi32
RegSetValueExA
RegCreateKeyExA
RegQueryValueA
RegEnumKeyA
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
RegQueryInfoKeyA
RegEnumValueA
RegEnumKeyExA
RegOpenKeyA
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
RegDeleteValueA
RegDeleteKeyA
shell32
SHGetSpecialFolderPathA
SHGetFolderPathA
ShellExecuteA
ole32
CoInitializeEx
oleaut32
VariantClear
VariantChangeType
VariantInit
Sections
.text Size: 152KB - Virtual size: 149KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 48KB - Virtual size: 46KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ