Static task
static1
Behavioral task
behavioral1
Sample
a4a9c4c3877cf65050f78713b2254df3efd4b0774cc4321318446120c255a55c.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a4a9c4c3877cf65050f78713b2254df3efd4b0774cc4321318446120c255a55c.exe
Resource
win10v2004-20221111-en
General
-
Target
a4a9c4c3877cf65050f78713b2254df3efd4b0774cc4321318446120c255a55c
-
Size
936KB
-
MD5
70d4a5f85dca5957c0f2034239c48a07
-
SHA1
269690b78531ebae3c2f505fc358b93c9b2962c0
-
SHA256
a4a9c4c3877cf65050f78713b2254df3efd4b0774cc4321318446120c255a55c
-
SHA512
3f4db839fff2bf83080d0e9fb2cdc69b7e7ff705d0af8df137824d6b2e60f091e3b1ada70ed6c513e548af4315b00e80e4e0bccec31eb56d76579ffb364c9d99
-
SSDEEP
24576:QUTOCFgEhNOptidWukhwBb7XzfM+cjXgjJOvwoo8HM:QUTOCFlyux7jfMxjXQawq
Malware Config
Signatures
Files
-
a4a9c4c3877cf65050f78713b2254df3efd4b0774cc4321318446120c255a55c.exe windows x86
90b3fc7fb5be3d85472250e5a692dea0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleFileNameW
CreateMutexW
GetExitCodeThread
LockResource
GetProcAddress
QueryPerformanceCounter
GetVersionExW
MulDiv
GetCurrentProcessId
HeapAlloc
TerminateProcess
Sleep
WaitForMultipleObjects
FindResourceExW
WaitForSingleObject
SystemTimeToFileTime
SetCurrentDirectoryW
GetCurrentThreadId
HeapCreate
GetBinaryTypeW
GetTickCount
LoadResource
HeapFree
CreateEventW
FileTimeToSystemTime
GetUserDefaultLCID
OpenEventW
FindResourceA
GetStartupInfoW
InitializeCriticalSection
lstrlenW
CreateThread
lstrcmpiW
SetLastError
CloseHandle
DelayLoadFailureHook
EnterCriticalSection
CreateIoCompletionPort
GetSystemDirectoryW
HeapReAlloc
GetCurrentProcess
InitializeCriticalSectionAndSpinCount
WideCharToMultiByte
VirtualAlloc
lstrlenA
HeapDestroy
CompareStringW
OutputDebugStringA
GetModuleHandleW
GetUserDefaultUILanguage
LeaveCriticalSection
HeapSize
ProcessIdToSessionId
GetCurrentThread
GetQueuedCompletionStatus
FlushInstructionCache
GetSystemInfo
LoadLibraryExA
FindResourceW
FreeLibrary
VirtualFree
SetUnhandledExceptionFilter
UnhandledExceptionFilter
ResumeThread
RaiseException
ExitProcess
GetSystemTimeAsFileTime
LoadLibraryW
TerminateThread
HeapSetInformation
LocalFree
LoadLibraryA
LocalAlloc
LoadLibraryExW
PostQueuedCompletionStatus
OpenProcess
GetProcessHeap
FormatMessageW
ReleaseMutex
ExpandEnvironmentStringsW
MultiByteToWideChar
GetSystemTime
GetLastError
ResetEvent
GetSystemWindowsDirectoryW
GetVersionExA
SizeofResource
SetEvent
DeleteCriticalSection
user32
IsWindowEnabled
GetFocus
LoadMenuW
MoveWindow
TranslateAcceleratorW
LoadCursorW
CheckDlgButton
UnregisterClassA
LoadStringW
LoadAcceleratorsW
KillTimer
SetWindowLongW
GetMenu
DefWindowProcW
CreateWindowExW
SetWindowTextW
GetWindowLongW
IsDlgButtonChecked
IsWindowVisible
GetClassNameW
DestroyIcon
SetCursor
EnumChildWindows
TranslateMessage
TrackPopupMenuEx
ShowWindow
GetDC
AdjustWindowRectEx
CharNextW
EnableWindow
ReleaseDC
GetProcessDefaultLayout
RegisterClassExW
DestroyMenu
SetWindowPos
GetSystemMetrics
GetSysColor
DestroyWindow
SendMessageW
InvalidateRect
GetMonitorInfoW
IsIconic
LockWindowUpdate
PostMessageW
IsZoomed
PostQuitMessage
GetClassInfoExW
GetKeyState
GetWindowPlacement
GetSysColorBrush
ClientToScreen
SetFocus
CharLowerBuffW
CheckMenuRadioItem
GetDlgItem
GetSubMenu
GetClientRect
GetWindowThreadProcessId
GetMessageW
CallWindowProcW
SystemParametersInfoW
MonitorFromRect
SetTimer
DeleteMenu
GetWindowRect
TrackMouseEvent
DispatchMessageW
EnableMenuItem
GetShellWindow
MonitorFromPoint
IsWindow
BringWindowToTop
GetParent
SetActiveWindow
gdi32
GetDeviceCaps
AbortDoc
GetTextExtentPointA
StartDocA
GetStockObject
StartPage
DeleteDC
EndPage
SetMapMode
TextOutA
SelectObject
EndDoc
SetBkColor
StretchBlt
DeleteObject
ExtTextOutA
CreateFontA
CreateCompatibleDC
CreateSolidBrush
SetBkMode
GetTextMetricsA
SetTextColor
CreateFontIndirectA
SetAbortProc
CreateCompatibleBitmap
GetObjectA
GetTextExtentPoint32A
advapi32
OpenProcessToken
RegOpenKeyA
AdjustTokenPrivileges
StartServiceA
LookupPrivilegeValueA
DeleteService
InitializeSecurityDescriptor
RegDeleteValueA
RegDeleteKeyA
OpenServiceA
RegQueryValueExA
RegSetValueExA
SetSecurityDescriptorDacl
RegCreateKeyA
CloseServiceHandle
RegCloseKey
CreateServiceA
QueryServiceStatus
OpenSCManagerA
ControlService
RegOpenKeyExA
shell32
ShellExecuteExA
SHBrowseForFolderA
SHGetMalloc
Shell_NotifyIconA
ShellExecuteA
SHGetSpecialFolderLocation
ole32
CoResumeClassObjects
CoRevertToSelf
CoInitializeSecurity
CoUninitialize
OleGetClipboard
CoRegisterClassObject
CoRevokeClassObject
CoImpersonateClient
PropVariantClear
OleUninitialize
CoInitialize
CreateStreamOnHGlobal
CoTaskMemFree
CoTaskMemAlloc
CoCreateInstance
OleInitialize
CoTaskMemRealloc
StringFromCLSID
CoGetClassObject
oleaut32
SysAllocString
SafeArrayLock
SafeArrayGetLBound
SafeArrayGetUBound
VariantClear
VariantCopyInd
SysStringLen
SysAllocStringByteLen
SafeArrayDestroy
VariantInit
GetErrorInfo
SafeArrayUnlock
VarUI4FromStr
VarBstrCmp
SysFreeString
VariantCopy
SysAllocStringLen
SafeArrayCreate
LoadRegTypeLi
VarBstrCat
SafeArrayRedim
LoadTypeLi
SysStringByteLen
DispCallFunc
comctl32
ImageList_Add
shlwapi
SHStrDupW
UrlUnescapeW
ColorHLSToRGB
UrlEscapeW
rpcrt4
UuidToStringA
UuidCreateNil
UuidCreate
UuidFromStringA
UuidIsNil
RpcStringFreeA
wldap32
ord134
gdiplus
GdiplusStartup
msvcrt
malloc
Sections
.text Size: 480KB - Virtual size: 479KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 280KB - Virtual size: 280KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 164KB - Virtual size: 1.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ