A0DB34FC6FE35D429A28ADDE5467D4D7
Static task
static1
Behavioral task
behavioral1
Sample
c13b387c457bf64a9c87d12ff44ec46d1298b8ac80c7726247f4527f5095b5cf.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c13b387c457bf64a9c87d12ff44ec46d1298b8ac80c7726247f4527f5095b5cf.exe
Resource
win10v2004-20220812-en
General
-
Target
c13b387c457bf64a9c87d12ff44ec46d1298b8ac80c7726247f4527f5095b5cf
-
Size
1.1MB
-
MD5
33009e283899a5c8b2d4c542b3c18b6f
-
SHA1
4d2fb2757818f818c7f18a061a9fe0d0a0e7ddec
-
SHA256
c13b387c457bf64a9c87d12ff44ec46d1298b8ac80c7726247f4527f5095b5cf
-
SHA512
417eb2844c07835937272d7412603c8279116c2003b633841d9215f54eed2b0479ec219b37d9f45aaf49db302177bc0b8796866dd75515aada13d05bb0ce616a
-
SSDEEP
24576:pHLTPuMzBECd6B9H1aG2r3dI3PKco3fmggmFOsI:pHLTPLBECd6HVkbdI3PKc+dgmFq
Malware Config
Signatures
Files
-
c13b387c457bf64a9c87d12ff44ec46d1298b8ac80c7726247f4527f5095b5cf.exe windows x86
5918832847f3ba56baf6bf15efeede72
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
wimgapi
WIMMountImage
WIMUnmountImage
kernel32
TlsFree
GetModuleHandleW
InterlockedIncrement
SystemTimeToFileTime
GlobalFlags
GetCPInfo
GetOEMCP
WritePrivateProfileStringA
GetCurrentDirectoryA
FindResourceExA
SetErrorMode
GetFileTime
GetTickCount
RtlUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RaiseException
ExitThread
GetSystemTimeAsFileTime
GetTimeFormatA
GetDateFormatA
GetCommandLineA
GetSystemInfo
VirtualQuery
ExitProcess
GetACP
IsValidCodePage
LCMapStringA
LocalReAlloc
HeapCreate
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
InitializeCriticalSectionAndSpinCount
GetStringTypeA
GetStringTypeW
GetConsoleCP
GetConsoleMode
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
GetLocaleInfoW
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CompareStringW
SetEnvironmentVariableA
OutputDebugStringA
IsBadWritePtr
IsBadReadPtr
TlsSetValue
TlsAlloc
GlobalHandle
GlobalReAlloc
TlsGetValue
GetFullPathNameA
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
GetThreadLocale
VirtualProtect
SuspendThread
SetThreadPriority
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
InterlockedExchange
GetCurrentProcessId
InterlockedDecrement
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
CompareStringA
FileTimeToLocalFileTime
FileTimeToSystemTime
lstrcmpA
GetLocalTime
Sleep
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
SetFilePointer
CreateProcessW
CreateFileW
SetLastError
GetVersionExA
GetEnvironmentVariableW
GetModuleFileNameW
DeviceIoControl
lstrcmpW
GetSystemTime
GetTimeZoneInformation
SystemTimeToTzSpecificLocalTime
FormatMessageW
lstrlenA
CopyFileExA
GetLogicalDrives
GetStartupInfoA
TerminateProcess
GetModuleHandleA
GetTempPathW
GetLongPathNameW
GetExitCodeProcess
GetTempPathA
SetEvent
ResetEvent
FreeResource
ResumeThread
GlobalLock
GlobalUnlock
MulDiv
GlobalFree
CreateEventA
HeapSize
HeapFree
HeapReAlloc
GetProcessHeap
HeapAlloc
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
FreeLibrary
SetFilePointerEx
ReadFile
WriteFile
CreateMutexA
GetCurrentThread
GetCurrentProcess
LocalAlloc
CreatePipe
CreateProcessA
FindFirstFileA
FindNextFileA
GetFileSizeEx
FindClose
GetModuleFileNameA
SetCurrentDirectoryA
GlobalAlloc
LoadResource
LockResource
SizeofResource
FindResourceA
SetFileAttributesA
GetFileAttributesA
CreateFileA
CopyFileA
MoveFileA
CreateDirectoryA
DeleteFileA
GetLastError
RemoveDirectoryA
FormatMessageA
LocalFree
MultiByteToWideChar
GetDriveTypeA
WideCharToMultiByte
QueryDosDeviceA
lstrlenW
GetVolumeInformationA
WaitForSingleObject
CloseHandle
CreateThread
LCMapStringW
user32
RegisterClipboardFormatA
MessageBeep
GetNextDlgGroupItem
InvalidateRgn
IsRectEmpty
CopyAcceleratorTableA
CharNextA
UnregisterClassA
GetSysColorBrush
DestroyMenu
CharUpperA
SetWindowContextHelpId
MapDialogRect
GetAsyncKeyState
GetMessageA
TranslateMessage
GetCursorPos
ValidateRect
PostQuitMessage
GetWindowThreadProcessId
EndPaint
BeginPaint
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
MoveWindow
SetWindowTextA
IsDialogMessageA
SetDlgItemTextA
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
ModifyMenuA
EnableMenuItem
CheckMenuItem
RegisterWindowMessageA
SendDlgItemMessageA
WinHelpA
IsChild
GetCapture
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassNameA
SetPropA
RemovePropA
GetFocus
GetWindowTextLengthA
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
DispatchMessageA
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
PeekMessageA
MapWindowPoints
GetKeyState
SetMenu
IsWindowVisible
UpdateWindow
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
ScreenToClient
EqualRect
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
GetMenu
OffsetRect
IntersectRect
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetSystemMetrics
GetWindow
GetDesktopWindow
GetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
GetWindowLongA
GetDlgItem
IsWindowEnabled
GetNextDlgTabItem
EndDialog
GetMenuState
GetMenuItemID
GetMenuItemCount
GetProcessWindowStation
GetUserObjectInformationA
GetSubMenu
PostThreadMessageA
GetPropA
IsWindow
ShowWindow
BringWindowToTop
KillTimer
SetTimer
GetWindowRect
SetWindowPos
RedrawWindow
SendNotifyMessageA
SetForegroundWindow
GetSystemMenu
InsertMenuA
SetWindowLongA
LoadIconA
PostMessageA
GetParent
SendMessageA
CopyRect
GetSysColor
FillRect
InvalidateRect
GetDC
ReleaseDC
SetRect
SetCapture
SetFocus
ReleaseCapture
SetActiveWindow
LoadCursorA
GetWindowDC
GetClientRect
PtInRect
DestroyCursor
SetCursor
EnableWindow
MessageBoxA
gdi32
CreateRectRgnIndirect
GetBkColor
GetTextColor
GetRgnBox
GetMapMode
ExtSelectClipRgn
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetWindowExtEx
CreateCompatibleDC
GetStockObject
EnumFontFamiliesExA
CreatePen
MoveToEx
LineTo
SetMapMode
SetBkMode
RestoreDC
SaveDC
CreateBitmap
GetObjectA
SetBkColor
SetTextColor
GetClipBox
CreateFontA
CreateSolidBrush
BitBlt
CreateCompatibleBitmap
DeleteDC
DeleteObject
GetDeviceCaps
SelectObject
GetViewportExtEx
comdlg32
GetFileTitleA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
RegQueryValueExA
RegQueryValueA
RegOpenKeyA
RegEnumKeyA
RegDeleteKeyA
RegSetValueExA
RegCreateKeyExA
RegQueryInfoKeyA
RegEnumValueA
RegOpenKeyExA
RegEnumKeyExA
RegCloseKey
FreeSid
ImpersonateSelf
OpenThreadToken
OpenProcessToken
AllocateAndInitializeSid
InitializeSecurityDescriptor
GetLengthSid
InitializeAcl
AddAccessAllowedAce
SetSecurityDescriptorDacl
SetSecurityDescriptorGroup
SetSecurityDescriptorOwner
IsValidSecurityDescriptor
AccessCheck
RevertToSelf
shell32
ShellExecuteExA
SHFileOperationA
ShellExecuteA
comctl32
ord17
shlwapi
SHGetValueA
PathFindExtensionA
PathFindFileNameA
PathStripToRootA
PathIsUNCA
PathFileExistsA
SHSetValueA
PathRemoveFileSpecW
oledlg
ord8
ole32
OleInitialize
CoFreeUnusedLibraries
OleUninitialize
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoGetClassObject
CoInitializeEx
CoCreateInstance
CoUninitialize
CoRevokeClassObject
CLSIDFromProgID
CoTaskMemAlloc
CoTaskMemFree
CreateStreamOnHGlobal
OleIsCurrentClipboard
OleFlushClipboard
CoRegisterMessageFilter
CLSIDFromString
CoInitialize
oleaut32
OleLoadPicture
SystemTimeToVariantTime
VariantTimeToSystemTime
SafeArrayDestroy
VariantCopy
SysAllocStringLen
VariantInit
VariantChangeType
VariantClear
SysAllocStringByteLen
SysStringLen
SysFreeString
OleCreateFontIndirect
SysAllocString
Exports
Exports
Sections
.text Size: 577KB - Virtual size: 576KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
SPTD Size: 1024B - Virtual size: 921B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 236KB - Virtual size: 235KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 29KB - Virtual size: 117KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 284KB - Virtual size: 283KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ