Static task
static1
Behavioral task
behavioral1
Sample
2c3df7fb1a3619abef7273fdd3b8ee2d6e80437b7032feb028a45b5c82334289.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
2c3df7fb1a3619abef7273fdd3b8ee2d6e80437b7032feb028a45b5c82334289.exe
Resource
win10v2004-20220812-en
General
-
Target
2c3df7fb1a3619abef7273fdd3b8ee2d6e80437b7032feb028a45b5c82334289
-
Size
1.1MB
-
MD5
2823ba454a97dfa9a0a1b4a0155a70b9
-
SHA1
22f2d2ba6b2657cb6842ea856b024cf16182cd1c
-
SHA256
2c3df7fb1a3619abef7273fdd3b8ee2d6e80437b7032feb028a45b5c82334289
-
SHA512
be4cb059bfb959e7b40c47d59e35e474e76691b628013c6afb84279a2adfcb8915a846fd6d01587629cdbba5bb81c0de082e97d177a30f84d84e1408ea27f46b
-
SSDEEP
24576:GNQHqGIFAUYdjNvuB8JEW1RN8TD0D+ify2eJ3oP:9g8JEGRU0qify2+o
Malware Config
Signatures
Files
-
2c3df7fb1a3619abef7273fdd3b8ee2d6e80437b7032feb028a45b5c82334289.exe windows x86
c9bc122864118cad95507ae762b019a0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
version
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
kernel32
InterlockedIncrement
InterlockedDecrement
VirtualProtect
RaiseException
SetUnhandledExceptionFilter
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
lstrcmpiW
LoadLibraryExW
IsBadReadPtr
MultiByteToWideChar
GetFileSizeEx
WriteFile
ReadFile
WritePrivateProfileStringW
CreateFileW
SetFileAttributesW
GetFileAttributesW
DeleteFileW
WideCharToMultiByte
GetShortPathNameW
GetLongPathNameW
CreateMutexW
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
Sleep
SetEvent
WaitForMultipleObjects
CreateEventW
OutputDebugStringW
GlobalMemoryStatusEx
GetPrivateProfileIntW
GetPrivateProfileStringW
QueryPerformanceCounter
QueryPerformanceFrequency
GetTickCount
FlushFileBuffers
ConnectNamedPipe
DisconnectNamedPipe
SetNamedPipeHandleState
GetNamedPipeInfo
CreateNamedPipeW
GetNamedPipeHandleStateW
ResetEvent
GetOverlappedResult
PeekNamedPipe
CancelIo
GetTimeZoneInformation
InterlockedFlushSList
GetVersionExW
GetSystemWindowsDirectoryW
FreeResource
GetLocalTime
WaitForSingleObjectEx
OutputDebugStringA
SetEnvironmentVariableW
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
DecodePointer
IsValidCodePage
FindNextFileW
FindNextFileA
FindFirstFileExW
FindFirstFileExA
FindClose
WriteConsoleW
ReadConsoleW
SetEndOfFile
SetStdHandle
EnumSystemLocalesW
GetUserDefaultLCID
SizeofResource
LoadResource
InitializeCriticalSectionAndSpinCount
GetExitCodeProcess
TerminateProcess
GetCurrentProcessId
GetCurrentProcess
OpenProcess
GetProcessHeap
HeapSize
HeapFree
HeapReAlloc
HeapAlloc
HeapDestroy
GetProcAddress
FreeLibrary
LockResource
SetLastError
GetLastError
WaitForSingleObject
GetCurrentThreadId
InterlockedCompareExchange
InterlockedExchange
FindResourceExW
IsValidLocale
GetTimeFormatW
GetDateFormatW
RtlUnwind
GetCurrentThread
GetACP
GetStdHandle
GetModuleFileNameA
GetFileSize
CreateFileA
GetSystemDirectoryW
lstrcmpiA
lstrcmpA
DeviceIoControl
InterlockedExchangeAdd
ExitProcess
GetConsoleMode
GetConsoleCP
SetFilePointerEx
GetFileType
SetConsoleCtrlHandler
GetFileAttributesExW
GetModuleHandleExW
FindResourceW
GetModuleHandleW
GetStartupInfoW
UnhandledExceptionFilter
GetModuleFileNameW
LoadLibraryW
GetCPInfo
GetLocaleInfoW
FreeLibraryAndExitThread
ResumeThread
ExitThread
GetOEMCP
CloseHandle
IsDebuggerPresent
EncodePointer
InitializeSListHead
InterlockedPopEntrySList
InterlockedPushEntrySList
FlushInstructionCache
IsProcessorFeaturePresent
VirtualAlloc
VirtualFree
LoadLibraryExA
FormatMessageW
GetStringTypeW
SwitchToThread
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
CompareStringW
LCMapStringW
CreateThread
user32
UnregisterClassA
GetWindowThreadProcessId
GetMessageW
PostQuitMessage
PostMessageW
wsprintfW
FindWindowExW
GetWindowLongW
KillTimer
SetTimer
IsWindow
CallWindowProcW
SendMessageTimeoutW
LoadCursorW
SetWindowLongW
CharNextW
DestroyWindow
CreateWindowExW
GetClassInfoExW
RegisterClassExW
UnregisterClassW
DefWindowProcW
PeekMessageW
DispatchMessageW
TranslateMessage
advapi32
RegDeleteKeyW
RegOpenKeyExA
RegQueryValueExA
GetTokenInformation
RegQueryValueExW
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
RegSetValueExW
RegQueryInfoKeyW
RegOpenKeyExW
RegEnumKeyExW
RegDeleteValueW
RegEnumKeyExA
RegCreateKeyExW
RegCloseKey
LookupPrivilegeValueW
AdjustTokenPrivileges
OpenProcessToken
CryptContextAddRef
CryptDecrypt
CryptEncrypt
CryptImportKey
CryptGenRandom
CryptSetKeyParam
CryptDestroyKey
CryptReleaseContext
CryptAcquireContextW
shell32
ShellExecuteExW
ord165
ShellExecuteW
SHGetSpecialFolderPathW
ole32
CoInitializeSecurity
CoSetProxyBlanket
CoCreateGuid
CLSIDFromProgID
CoTaskMemFree
CoTaskMemRealloc
CoTaskMemAlloc
CoCreateInstance
CoUninitialize
CoInitialize
CoInitializeEx
oleaut32
VariantClear
VariantInit
VarUI4FromStr
SysFreeString
SysAllocString
shlwapi
StrStrIA
StrCmpIW
StrCmpNIW
SHGetValueW
PathCombineW
StrStrIW
PathFindFileNameW
PathRemoveFileSpecW
PathFileExistsW
PathAppendW
StrToIntExW
SHGetValueA
SHSetValueA
StrTrimA
comctl32
InitCommonControlsEx
psapi
GetModuleFileNameExW
crypt32
CertGetNameStringW
wintrust
WinVerifyTrust
WTHelperProvDataFromStateData
wininet
InternetGetConnectedState
iphlpapi
GetAdaptersInfo
urlmon
URLDownloadToCacheFileW
URLDownloadToFileW
Sections
.text Size: 793KB - Virtual size: 793KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 165KB - Virtual size: 164KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 18KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 93KB - Virtual size: 93KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 37KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ