Static task
static1
Behavioral task
behavioral1
Sample
0d9afc633f1ec02307dfe302e0d8c517d1243e669c6acade891481df7f9e3cdd.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
0d9afc633f1ec02307dfe302e0d8c517d1243e669c6acade891481df7f9e3cdd.exe
Resource
win10v2004-20221111-en
General
-
Target
0d9afc633f1ec02307dfe302e0d8c517d1243e669c6acade891481df7f9e3cdd
-
Size
177KB
-
MD5
87c394a4d97c6d712a41f35c3eb349db
-
SHA1
a403063ae83e84242ccb542869c147ca4584bee8
-
SHA256
0d9afc633f1ec02307dfe302e0d8c517d1243e669c6acade891481df7f9e3cdd
-
SHA512
3e06d4e9590033b6981640876b4b2eb2c2bf63e92f1fac2d13be9fbaab5508c5be2f256005bbc8f45cf0fee2db24934e66f7b78e08c1fc5bd071025a3831fcd8
-
SSDEEP
384:r/U7dWx6ZDQyYpRwJvAul2YcW/yNYK0cbaPcba7JlEMMRe4mDZvaXN:47YKDQIpAul10YjZ77PVu
Malware Config
Signatures
Files
-
0d9afc633f1ec02307dfe302e0d8c517d1243e669c6acade891481df7f9e3cdd.exe windows x86
54b389ea793810f72b95f95e9243599f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalAlloc
GlobalFree
InterlockedDecrement
InterlockedIncrement
LoadLibraryA
LocalFree
MulDiv
OutputDebugStringA
QueryPerformanceCounter
RemoveDirectoryW
SearchPathW
GetWindowsDirectoryW
SetErrorMode
SetFileAttributesW
SetLastError
SetUnhandledExceptionFilter
TerminateProcess
UnhandledExceptionFilter
lstrcatW
lstrcmpiW
lstrcpyW
lstrcpynW
lstrlenW
GetVersionExW
GetTickCount
GetSystemTimeAsFileTime
GetSystemDirectoryW
GetProcAddress
GetPrivateProfileStringW
GetPrivateProfileIntW
GetModuleHandleW
GetModuleHandleA
GetModuleFileNameW
GetLastError
GetFileAttributesW
GetExitCodeThread
GetCurrentThreadId
GetCurrentProcessId
GetCurrentProcess
GetCurrentDirectoryW
GetCommandLineW
FreeLibrary
FormatMessageW
FindNextFileW
FindFirstFileW
FindClose
ExitProcess
DeleteFileW
CreateProcessW
CreateFileW
CreateFileMappingW
CloseHandle
LocalAlloc
GetCurrentThread
LoadLibraryW
VirtualAlloc
SetCurrentDirectoryW
ReadFile
user32
GetWindowRect
GetWindowTextW
InflateRect
InvalidateRect
IsChild
IsDlgButtonChecked
IsRectEmpty
IsWindowEnabled
IsWindowVisible
LoadAcceleratorsW
LoadCursorW
LoadIconW
LoadImageW
LoadStringA
LoadStringW
MapWindowPoints
MessageBeep
MessageBoxW
MoveWindow
MsgWaitForMultipleObjects
OffsetRect
PeekMessageW
PostMessageW
PostQuitMessage
RedrawWindow
RegisterClassExW
RegisterClassW
ReleaseDC
SendDlgItemMessageW
SendMessageW
SetCursor
SetFocus
SetForegroundWindow
SetMessageQueue
SetWindowLongW
SetWindowPos
SetWindowTextW
ShowWindow
TranslateAcceleratorW
TranslateMessage
UnregisterClassW
UpdateWindow
WaitMessage
wsprintfW
GetWindowLongW
GetWindow
GetUpdateRect
GetSysColorBrush
GetSysColor
GetParent
GetMessageW
GetLastActivePopup
GetFocus
GetDlgItem
GetDlgCtrlID
GetDesktopWindow
GetDC
GetClientRect
GetClassInfoW
FindWindowW
FillRect
ExitWindowsEx
EnumThreadWindows
EnumChildWindows
EndPaint
EndDialog
EnableWindow
DrawTextW
DrawIcon
DrawFocusRect
DrawEdge
DispatchMessageW
DialogBoxParamW
DestroyWindow
DefWindowProcW
CreateWindowExW
CreateDialogParamW
CopyRect
CheckRadioButton
CheckDlgButton
CharPrevW
CharNextW
CallWindowProcW
BringWindowToTop
BeginPaint
GetSystemMetrics
GetNextDlgTabItem
gdi32
StretchBlt
SetTextColor
SetMapMode
SetBkMode
SetBkColor
SelectObject
GetTextMetricsW
GetStockObject
GetObjectW
GetMapMode
BitBlt
DeleteObject
DeleteDC
DPtoLP
CreateFontIndirectW
CreateCompatibleDC
CreateCompatibleBitmap
CreateBitmap
GetDeviceCaps
advapi32
AdjustTokenPrivileges
RegSetValueExW
RegQueryValueW
RegQueryValueExW
RegQueryValueExA
RegOpenKeyW
RegOpenKeyExA
RegDeleteValueW
RegCreateKeyW
RegCreateKeyExW
RegCloseKey
OpenProcessToken
RegOpenKeyExW
LookupPrivilegeValueW
shell32
SHGetSpecialFolderLocation
SHGetPathFromIDListW
SHGetMalloc
ShellExecuteW
ole32
CoInitialize
CoUninitialize
CoCreateInstance
shlwapi
PathIsURLW
PathIsFileSpecW
msvcrt
_wsplitpath
swscanf
setlocale
memmove
_except_handler3
_vsnwprintf
_wmakepath
_wtoi
free
malloc
Sections
.text Size: 42KB - Virtual size: 41KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data2 Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data10 Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data9 Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data8 Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data7 Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data6 Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data5 Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data4 Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data3 Size: 22KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text3 Size: 49KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text2 Size: 22KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 841KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ