Static task
static1
Behavioral task
behavioral1
Sample
33eaaf0b09207f1a94ae44fd2a5bdbbea3e1f71572a51da2c3e949bc68f1e456.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
33eaaf0b09207f1a94ae44fd2a5bdbbea3e1f71572a51da2c3e949bc68f1e456.exe
Resource
win10v2004-20221111-en
General
-
Target
33eaaf0b09207f1a94ae44fd2a5bdbbea3e1f71572a51da2c3e949bc68f1e456
-
Size
460KB
-
MD5
fbc8130543bd6ecf319d51e91d81e495
-
SHA1
9a3158fb6a06865f64401fac69d29abbe3e4d5b6
-
SHA256
33eaaf0b09207f1a94ae44fd2a5bdbbea3e1f71572a51da2c3e949bc68f1e456
-
SHA512
50641b8c3f795dd24f5f55051be2781f1459f12b67cec488cf8133b61699efc08644794743ef3b724f0f1970cc79678181df22bd544a2db71ae15b280818ca81
-
SSDEEP
12288:7Lu6CNXhqEKE72Iwfz3aqswLDECm/deag+IbAwes:nu6CNXhqEx72zaqsw8Teag3bZ
Malware Config
Signatures
Files
-
33eaaf0b09207f1a94ae44fd2a5bdbbea3e1f71572a51da2c3e949bc68f1e456.exe windows x86
c410c4da9814b16693446716c6939cb4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualAlloc
GlobalAlloc
GetCurrentProcess
HeapDestroy
CompareStringW
GlobalLock
FreeEnvironmentStringsA
CreateDirectoryA
GlobalDeleteAtom
HeapCreate
WideCharToMultiByte
GetModuleFileNameA
LCMapStringW
GetSystemInfo
GetModuleHandleA
GetCPInfo
SetUnhandledExceptionFilter
HeapReAlloc
LeaveCriticalSection
TerminateProcess
LocalReAlloc
FileTimeToLocalFileTime
DeleteCriticalSection
VirtualQuery
GetProcAddress
GetStringTypeA
GetVersionExA
TlsFree
GetSystemTimeAsFileTime
LCMapStringA
HeapFree
WriteFile
EnterCriticalSection
GetTimeFormatA
GetEnvironmentStringsW
SetFilePointer
FindResourceExA
GetTimeZoneInformation
VirtualFree
LoadLibraryA
HeapAlloc
SetEnvironmentVariableA
InterlockedExchange
GetComputerNameA
GetCurrentThreadId
SetErrorMode
ExitProcess
GetStdHandle
LocalAlloc
GetEnvironmentStrings
GlobalHandle
EnumSystemLocalesA
GetStartupInfoA
GetThreadLocale
FreeEnvironmentStringsW
ExitThread
SetStdHandle
GetLastError
GetCommandLineA
GetDateFormatA
IsBadCodePtr
GetTempFileNameA
LockResource
CreateMutexA
lstrcpynA
GlobalFlags
GetSystemTime
FindClose
GetCurrentProcessId
SetLastError
TlsAlloc
GetOEMCP
QueryPerformanceCounter
GlobalUnlock
UnhandledExceptionFilter
CreateThread
CreateEventA
TlsSetValue
GetFileType
LockFile
UnlockFile
TlsGetValue
GetLocaleInfoA
RaiseException
FlushFileBuffers
InitializeCriticalSection
WaitForSingleObject
lstrlenW
CloseHandle
GetStringTypeW
MultiByteToWideChar
ReadFile
GetWindowsDirectoryA
CopyFileA
RtlUnwind
HeapSize
CompareStringA
SetHandleCount
GetTickCount
GetACP
VirtualProtect
ole32
OleDestroyMenuDescriptor
CreateILockBytesOnHGlobal
DoDragDrop
OleInitialize
RevokeDragDrop
CLSIDFromProgID
OleCreateMenuDescriptor
OleTranslateAccelerator
CoTaskMemFree
GetHGlobalFromILockBytes
OleIsRunning
IsAccelerator
StgCreateDocfileOnILockBytes
CoFreeUnusedLibraries
CoTaskMemAlloc
RegisterDragDrop
OleSaveToStream
StgOpenStorage
CreateGenericComposite
OleLockRunning
CreateOleAdviseHolder
CLSIDFromString
StringFromCLSID
StringFromGUID2
GetRunningObjectTable
OleCreateFromData
CoDisconnectObject
CoRevokeClassObject
StgCreateDocfile
CreateItemMoniker
OleIsCurrentClipboard
CoGetMalloc
CreateDataAdviseHolder
CreateStreamOnHGlobal
OleSetClipboard
OleGetClipboard
OleFlushClipboard
CoRegisterMessageFilter
OleUninitialize
StgOpenStorageOnILockBytes
WriteClassStg
OleLoad
CreateFileMoniker
comctl32
ImageList_GetIcon
ImageList_GetImageInfo
ImageList_Destroy
ImageList_DrawEx
ord17
ImageList_Draw
PropertySheetW
ImageList_Create
ImageList_ReplaceIcon
_TrackMouseEvent
ImageList_AddMasked
ImageList_Remove
DestroyPropertySheetPage
InitCommonControlsEx
advapi32
GetUserNameA
DeregisterEventSource
RegCloseKey
InitializeSecurityDescriptor
RegQueryValueExA
GetTokenInformation
RegQueryInfoKeyA
RegDeleteKeyA
CreateServiceA
IsValidSid
OpenServiceA
RegSetValueExA
OpenProcessToken
ControlService
DeleteService
RegCreateKeyExA
RegCreateKeyA
CloseServiceHandle
ReportEventA
RegOpenKeyA
RegEnumKeyExA
RegFlushKey
RegOpenKeyExA
RegDeleteValueA
OpenSCManagerA
RegisterEventSourceA
user32
EmptyClipboard
SetParent
CreateCaret
GetCursorPos
DefWindowProcA
GetClassInfoExA
MessageBoxA
IsZoomed
IntersectRect
TabbedTextOutA
SendDlgItemMessageA
IsWindowEnabled
ValidateRect
GetMenuItemCount
LoadBitmapA
GetSysColorBrush
DrawTextExA
RegisterClassA
IsDialogMessageA
DestroyIcon
MapDialogRect
GetMessageTime
GetClassInfoA
LoadAcceleratorsA
CreateWindowExA
LoadCursorA
SetCapture
SetCursor
GetDlgItem
DestroyWindow
GetWindowTextA
FillRect
GetWindow
GetWindowPlacement
SetFocus
IsIconic
EnableWindow
SetWindowPos
ToAsciiEx
SetWindowLongA
OpenClipboard
SetTimer
GetScrollPos
OffsetRect
UpdateWindow
CheckMenuItem
GetSystemMetrics
CallWindowProcA
GetClassLongA
LoadStringA
IsRectEmpty
GetSysColor
CheckDlgButton
AttachThreadInput
SetDlgItemTextA
GetSubMenu
GetFocus
ClientToScreen
EnableMenuItem
WindowFromPoint
AppendMenuA
SetClipboardData
CallNextHookEx
PtInRect
GetCapture
MessageBeep
GetCaretPos
ReleaseDC
EndDialog
GetMenu
EqualRect
ShowWindow
PostQuitMessage
SetCaretPos
LoadImageA
GetWindowDC
GetActiveWindow
SendMessageA
GetMessagePos
ScreenToClient
PeekMessageA
CharNextA
LoadIconA
GetMenuCheckMarkDimensions
UnhookWindowsHookEx
RegisterClassExA
IsChild
DestroyAcceleratorTable
gdi32
MaskBlt
CreateDCA
ExtSelectClipRgn
GetTextAlign
GetWindowExtEx
Polyline
PlayMetaFile
StartPage
GetDeviceCaps
DeleteObject
CreateCompatibleBitmap
SetTextAlign
StrokePath
LineTo
CreatePen
EndPage
IntersectClipRect
SetBkColor
DeleteDC
SelectObject
DeleteMetaFile
GetObjectA
RealizePalette
EndDoc
winspool.drv
DocumentPropertiesW
ClosePrinter
ord204
OpenPrinterW
GetJobW
EnumPrintersW
Sections
.text Size: 88KB - Virtual size: 86KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 260KB - Virtual size: 259KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 76KB - Virtual size: 81KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ