Static task
static1
Behavioral task
behavioral1
Sample
753171a7e648dff9bee6d30cebf9ead03f17ecaca561323f0233ffeb7222bcb3.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
753171a7e648dff9bee6d30cebf9ead03f17ecaca561323f0233ffeb7222bcb3.exe
Resource
win10v2004-20220812-en
General
-
Target
753171a7e648dff9bee6d30cebf9ead03f17ecaca561323f0233ffeb7222bcb3
-
Size
463KB
-
MD5
367f1bce74013898bbd36f44305b4c6a
-
SHA1
fe20fa2a8fedad57031a61c8a8b218f1172b70f4
-
SHA256
753171a7e648dff9bee6d30cebf9ead03f17ecaca561323f0233ffeb7222bcb3
-
SHA512
24f0c7c14d0988992a6a5de91956a98846366dcc2cc9ebf3913402060206cc03cd7cb648d660564fd7706ae4f88dc55e0f878cede9fd7eb3771352e6ee969f18
-
SSDEEP
12288:5zlCmWDKpe+SROLNPQ3PlD9s0QBI/QdP+MiUY:jKp+SRmNWPlD9s0QBwM
Malware Config
Signatures
Files
-
753171a7e648dff9bee6d30cebf9ead03f17ecaca561323f0233ffeb7222bcb3.exe windows x86
529ea23b8335954c74c674decff25c06
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ole32
OleInitialize
OleUninitialize
CoInitialize
CoCreateInstance
CoUninitialize
shlwapi
SHDeleteKeyA
PathFileExistsA
wininet
InternetReadFile
InternetGetLastResponseInfoA
InternetCrackUrlA
HttpOpenRequestA
HttpSendRequestA
HttpQueryInfoA
InternetTimeToSystemTime
InternetSetOptionA
InternetConnectA
InternetOpenA
InternetOpenUrlA
InternetCloseHandle
InternetGetConnectedState
user32
CharLowerA
SendDlgItemMessageA
GetClientRect
GetClassNameA
FillRect
GetDlgItemTextA
GetClassInfoExA
LoadCursorA
RegisterClassExA
GetSystemMetrics
CreateWindowExA
SetWindowLongA
CharPrevA
GetWindowTextA
CharNextA
UpdateWindow
SetTimer
RedrawWindow
GetMessageA
TranslateMessage
DispatchMessageA
DialogBoxParamA
SetWindowRgn
DestroyWindow
GetWindowLongA
ClientToScreen
GetFocus
DefWindowProcA
GetForegroundWindow
GetCursorPos
PtInRect
InvalidateRect
BeginPaint
EndPaint
SetWindowTextA
LoadIconA
SendMessageA
GetSystemMenu
EnableMenuItem
SetDlgItemTextA
GetDlgItem
SetForegroundWindow
SetActiveWindow
SetFocus
ShowWindow
GetWindowRect
ScreenToClient
SetWindowPos
EndDialog
LoadStringA
GetDC
ReleaseDC
DrawTextW
MessageBoxA
EnumWindows
oleaut32
SysFreeString
VariantInit
VariantClear
SysAllocStringLen
SysAllocString
gdi32
DeleteObject
GetStockObject
SetPixel
GetTextExtentPoint32A
TextOutW
CreateRectRgn
GetPixel
CombineRgn
CreatePatternBrush
GetDeviceCaps
CreateBitmap
GetObjectA
BitBlt
StretchBlt
SetBkMode
SetTextColor
CreateCompatibleDC
SelectObject
DeleteDC
GetTextExtentPointW
CreateFontW
advapi32
IsValidSid
GetLengthSid
InitializeAcl
AddAccessDeniedAce
AddAccessAllowedAce
InitializeSecurityDescriptor
RegSetValueA
RegOpenKeyA
RegQueryValueA
RegCreateKeyExA
RegSetValueExA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
FreeSid
GetUserNameA
SetSecurityDescriptorOwner
SetSecurityDescriptorDacl
LookupAccountNameA
AllocateAndInitializeSid
shell32
ShellExecuteExA
SHGetSpecialFolderPathA
version
GetFileVersionInfoSizeA
VerQueryValueA
GetFileVersionInfoA
msimg32
TransparentBlt
kernel32
GetConsoleMode
GetConsoleCP
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
RtlUnwind
GetSystemTimeAsFileTime
VirtualAlloc
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetFilePointer
GetCurrentThreadId
DeleteCriticalSection
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
GetProcessHeap
HeapSize
HeapReAlloc
HeapFree
HeapAlloc
HeapDestroy
CreateFileMappingA
VirtualFree
GetCommandLineA
GetStartupInfoA
FileTimeToSystemTime
FileTimeToLocalFileTime
GetFileInformationByHandle
PeekNamedPipe
GetFileType
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetModuleHandleW
ExitProcess
SetEnvironmentVariableA
GetFullPathNameA
SetEndOfFile
HeapCreate
SetLastError
SetHandleCount
GetStdHandle
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetTimeZoneInformation
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetCurrentProcessId
GetStringTypeA
GetStringTypeW
FlushFileBuffers
LCMapStringA
LCMapStringW
InitializeCriticalSectionAndSpinCount
CompareStringA
CompareStringW
MapViewOfFile
UnmapViewOfFile
GetCurrentDirectoryA
GetSystemInfo
RaiseException
GetLastError
lstrcpyA
lstrlenA
CloseHandle
CreateMutexA
OpenMutexA
SetEnvironmentVariableW
GetVersionExA
FreeLibrary
GetProcAddress
LoadLibraryA
WideCharToMultiByte
RemoveDirectoryA
FindClose
DeleteFileA
FindNextFileA
FindFirstFileA
GetModuleFileNameA
GetCurrentProcess
GetModuleHandleA
ReadFile
GetFileSize
CreateFileA
MultiByteToWideChar
CreateDirectoryA
GetPrivateProfileStringA
WritePrivateProfileStringA
Sleep
CompareFileTime
SystemTimeToFileTime
GetFileTime
GetTickCount
WriteFile
SizeofResource
LockResource
LoadResource
FindResourceA
FindResourceExA
SetFileAttributesA
GetLocaleInfoA
FreeResource
LocalFree
InterlockedIncrement
InterlockedDecrement
GetTempFileNameA
GetTempPathA
GetDriveTypeA
GetFileAttributesA
crypt32
CertCloseStore
CryptMsgClose
CertFreeCertificateContext
CertGetNameStringW
CertFindCertificateInStore
CryptMsgGetParam
CryptQueryObject
Sections
.text Size: 224KB - Virtual size: 223KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 101KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 36KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
PACK Size: 160KB - Virtual size: 416KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE