Static task
static1
Behavioral task
behavioral1
Sample
981c9a78a02066a308d534b125ced5457a94bdb5ebbf9289be0e4eeebdb66bf3.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
981c9a78a02066a308d534b125ced5457a94bdb5ebbf9289be0e4eeebdb66bf3.exe
Resource
win10v2004-20220901-en
General
-
Target
981c9a78a02066a308d534b125ced5457a94bdb5ebbf9289be0e4eeebdb66bf3
-
Size
2.3MB
-
MD5
b75fca90dc1015c1f4b0172de6942842
-
SHA1
2a72afdd10e04570aaa0af926b62a8fb0f69abf5
-
SHA256
981c9a78a02066a308d534b125ced5457a94bdb5ebbf9289be0e4eeebdb66bf3
-
SHA512
ccd45d84591766d4fe510db2d14e402bb38ca1f22e8f3935cc5cac4b7be74813471022ef1eb21bb05fcfef36846af88019048289c5984501b355178ae85796a2
-
SSDEEP
24576:Co42+s8wfPAFQWYqt+zG0nrz40Y9M37rLIP7s3UfnfmCUTFPsSzYF68924Ir80hZ:CH2+PwGn+zG0nrz4kPqUTeSkF689JIr
Malware Config
Signatures
Files
-
981c9a78a02066a308d534b125ced5457a94bdb5ebbf9289be0e4eeebdb66bf3.exe windows x86
50ebf62411df6189b49e3f4cc062f563
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
EnumResourceLanguagesA
ConvertDefaultLocale
GetCurrentThread
GlobalHandle
TlsGetValue
TlsAlloc
TlsSetValue
LocalReAlloc
TlsFree
GlobalFlags
GetCPInfo
GetOEMCP
FindResourceExA
SetErrorMode
WritePrivateProfileStringA
RtlUnwind
HeapFree
GetSystemTimeAsFileTime
GetTimeFormatA
GetDateFormatA
HeapAlloc
VirtualAlloc
GetSystemInfo
VirtualQuery
GetStartupInfoA
HeapReAlloc
SetStdHandle
GlobalReAlloc
HeapSize
HeapDestroy
HeapCreate
VirtualFree
IsBadWritePtr
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
GetTimeZoneInformation
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
SetHandleCount
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
IsBadReadPtr
IsBadCodePtr
GetLocaleInfoW
SetEnvironmentVariableA
CreateEventA
SuspendThread
SetEvent
SetThreadPriority
lstrcmpA
GetFullPathNameA
InterlockedExchange
GetVolumeInformationA
lstrcpyA
GetCurrentProcess
DuplicateHandle
UnlockFile
LockFile
FlushFileBuffers
VirtualProtect
FreeResource
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
lstrcatA
lstrcmpW
SetLastError
GlobalFree
MulDiv
GlobalAlloc
lstrcpynA
CompareStringW
CompareStringA
lstrlenW
lstrcmpiA
GetSystemTime
GetTickCount
CreateMutexA
MapViewOfFile
UnmapViewOfFile
ReleaseMutex
GetWindowsDirectoryA
WinExec
GetPrivateProfileIntA
GetPrivateProfileStringA
GetUserDefaultLangID
ExpandEnvironmentStringsA
GetSystemDefaultLCID
OpenProcess
TerminateProcess
TerminateThread
CreateThread
ResumeThread
ExitThread
GetLogicalDrives
GetDriveTypeA
LeaveCriticalSection
EnterCriticalSection
MoveFileExA
GetCommandLineA
GetCurrentProcessId
GetModuleHandleA
CreateFileMappingA
RemoveDirectoryA
GetComputerNameA
GetModuleFileNameA
WaitForSingleObject
GetCurrentDirectoryA
MultiByteToWideChar
CopyFileA
lstrlenA
LocalAlloc
MoveFileA
DeleteFileA
CreateDirectoryA
SetFileAttributesA
Sleep
GetFileSize
GetTempFileNameA
FreeLibrary
CreateFileA
CloseHandle
GetTempPathA
GetFileAttributesA
SetFilePointer
ReadFile
WriteFile
SetEndOfFile
ExitProcess
GetFileTime
FileTimeToLocalFileTime
FileTimeToSystemTime
FindFirstFileA
GetLastError
FormatMessageA
LocalFree
FindNextFileA
FindClose
GlobalLock
GlobalUnlock
GetVersion
GetEnvironmentVariableA
InterlockedDecrement
LoadLibraryA
GetProcAddress
InterlockedIncrement
WideCharToMultiByte
FindResourceA
LoadResource
LockResource
SizeofResource
DeleteCriticalSection
InitializeCriticalSection
RaiseException
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
GetFileType
user32
GetSysColorBrush
DestroyMenu
SetWindowContextHelpId
PostQuitMessage
GetMessageA
ValidateRect
WindowFromPoint
EndPaint
BeginPaint
GetWindowDC
ReleaseDC
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
SetMenuItemBitmaps
ModifyMenuA
CheckMenuItem
LoadBitmapA
MapDialogRect
GetAsyncKeyState
GetDesktopWindow
GetActiveWindow
CreateDialogIndirectParamA
GetNextDlgTabItem
EndDialog
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
SetDlgItemTextA
ReleaseCapture
WinHelpA
GetCapture
CreateWindowExA
SetWindowsHookExA
UnregisterClassA
EnableWindow
SendMessageA
GetMenuCheckMarkDimensions
SetCapture
CharNextA
PostMessageA
GetWindowRect
GetFocus
RegisterClipboardFormatA
MessageBoxA
CallNextHookEx
GetClassLongA
GetClassInfoExA
GetPropA
RemovePropA
SendDlgItemMessageA
IsChild
GetLastActivePopup
SetActiveWindow
GetDlgItem
GetTopWindow
DestroyWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
PeekMessageA
IsRectEmpty
SetRect
CopyAcceleratorTableA
InvalidateRgn
GetNextDlgGroupItem
PostThreadMessageA
MapWindowPoints
IsWindowVisible
GetMenu
AdjustWindowRectEx
ScreenToClient
EqualRect
GetClassInfoA
PtInRect
GetClientRect
GetParent
GetWindowLongA
GetKeyState
SetForegroundWindow
wsprintfA
SetPropA
GetClassNameA
SetFocus
IsWindow
IsWindowEnabled
EnumChildWindows
GetForegroundWindow
DispatchMessageA
TranslateMessage
DrawIcon
AppendMenuA
GetSystemMenu
IsIconic
UpdateWindow
InvalidateRect
LoadIconA
GetSystemMetrics
RegisterWindowMessageA
GetSysColor
SetTimer
KillTimer
EnableMenuItem
GetMenuItemCount
GetMenuItemID
GetSubMenu
LoadMenuA
keybd_event
GetWindowTextA
FindWindowExA
FindWindowA
GetDC
MessageBeep
RegisterClassA
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
SetWindowLongA
SetWindowPos
OffsetRect
IntersectRect
SystemParametersInfoA
GetWindowPlacement
CopyRect
GetWindowTextLengthA
GetWindow
GetMenuState
BringWindowToTop
GetCursorPos
TrackPopupMenu
SetMenuDefaultItem
CharUpperA
LoadCursorA
CopyIcon
SetCursor
gdi32
GetRgnBox
GetTextColor
GetBkColor
GetMapMode
SetBkMode
CreateRectRgnIndirect
DeleteDC
ExtSelectClipRgn
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetWindowExtEx
GetViewportExtEx
DeleteObject
SetMapMode
CreateFontIndirectA
GetObjectA
GetTextExtentPoint32A
GetStockObject
GetDeviceCaps
GetClipBox
SetTextColor
SetBkColor
CreateBitmap
SaveDC
RestoreDC
EnumFontFamiliesExA
comdlg32
GetOpenFileNameA
GetFileTitleA
GetSaveFileNameA
winspool.drv
DocumentPropertiesA
OpenPrinterA
ClosePrinter
advapi32
RegOpenKeyA
RegCreateKeyExA
RegEnumKeyA
RegDeleteKeyA
RegEnumValueA
RegDeleteValueA
RegSetValueExA
RegQueryValueExA
RegCreateKeyA
RegOpenKeyExA
RegCloseKey
RegQueryValueA
shell32
ShellExecuteA
SHGetPathFromIDListA
SHBrowseForFolderA
Shell_NotifyIconA
SHGetSpecialFolderLocation
SHFileOperationA
ShellExecuteExA
SHGetMalloc
comctl32
PropertySheetA
DestroyPropertySheetPage
CreatePropertySheetPageA
ImageList_Destroy
ImageList_Create
ord17
shlwapi
PathStripToRootA
PathIsUNCA
PathFindExtensionA
PathRemoveExtensionA
PathFindFileNameA
SHDeleteKeyA
oledlg
ord8
ole32
CoTaskMemAlloc
CoTaskMemFree
StgOpenStorage
OleRun
CoCreateInstance
ReleaseStgMedium
CoInitialize
CoUninitialize
CLSIDFromString
CoFreeUnusedLibraries
OleInitialize
CoRevokeClassObject
OleIsCurrentClipboard
OleFlushClipboard
CoRegisterMessageFilter
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoGetClassObject
CLSIDFromProgID
OleUninitialize
oleaut32
OleCreateFontIndirect
SafeArrayDestroy
CreateErrorInfo
SysAllocStringLen
VarUdateFromDate
SystemTimeToVariantTime
VariantTimeToSystemTime
SysStringByteLen
VariantChangeType
VariantClear
VariantCopy
VariantInit
SysAllocStringByteLen
SysFreeString
SysStringLen
GetErrorInfo
SysAllocString
ws2_32
accept
socket
select
htonl
htons
bind
WSASetLastError
connect
closesocket
recvfrom
WSAAsyncSelect
send
recv
shutdown
ioctlsocket
WSAGetLastError
gethostbyname
inet_ntoa
inet_addr
WSACleanup
WSAStartup
sendto
wininet
InternetWriteFile
HttpOpenRequestA
InternetConnectA
HttpSendRequestExA
HttpEndRequestA
InternetReadFile
InternetSetFilePointer
InternetSetStatusCallback
InternetOpenA
InternetGetLastResponseInfoA
InternetCloseHandle
HttpAddRequestHeadersA
InternetQueryDataAvailable
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
psapi
EnumProcessModules
GetModuleBaseNameA
EnumProcesses
sensapi
IsNetworkAlive
Sections
.text Size: 800KB - Virtual size: 796KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 208KB - Virtual size: 207KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1.3MB - Virtual size: 1.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ