Static task
static1
Behavioral task
behavioral1
Sample
8d4dd85fc269b664352087c6f700f2c95a7ac9482fd4ca83c86f1ab5d21b7940.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
8d4dd85fc269b664352087c6f700f2c95a7ac9482fd4ca83c86f1ab5d21b7940.exe
Resource
win10v2004-20221111-en
General
-
Target
8d4dd85fc269b664352087c6f700f2c95a7ac9482fd4ca83c86f1ab5d21b7940
-
Size
1.8MB
-
MD5
c93e6124a4a2fcf851e8a2987ff182c8
-
SHA1
578de6bbe0ff943ea2b7ef00dbdf0b7381cfb1bc
-
SHA256
8d4dd85fc269b664352087c6f700f2c95a7ac9482fd4ca83c86f1ab5d21b7940
-
SHA512
7f4e8e43bf03ae72aa6f6ba369210663f510b82f546ebf42fa414710eea9b002c4cf59c698354d382ee9311345c90b39563ce781ffb88431939d843b3e6d6966
-
SSDEEP
24576:jXRtWdA5Knb+tUatB+sRwKFZA3WbQN/ILguAWNR3y:jhtWdlnb+6atgUdZA3WEdCet
Malware Config
Signatures
Files
-
8d4dd85fc269b664352087c6f700f2c95a7ac9482fd4ca83c86f1ab5d21b7940.exe windows x86
5b0b7c2d3798c02bf3fa73c7748f36d5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ws2_32
recv
send
WSAGetLastError
closesocket
kernel32
RaiseException
GlobalReAlloc
GlobalHandle
TlsGetValue
TlsAlloc
TlsSetValue
LocalReAlloc
TlsFree
GlobalFlags
InterlockedIncrement
GetCPInfo
GetOEMCP
SetErrorMode
RtlUnwind
HeapAlloc
HeapFree
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
ExitProcess
GetFileType
ExitThread
GetFileTime
SetEnvironmentVariableA
SetCurrentDirectoryA
GetSystemTimeAsFileTime
GetStartupInfoA
GetCommandLineA
HeapReAlloc
HeapSize
SetStdHandle
HeapDestroy
HeapCreate
VirtualFree
IsBadWritePtr
SetUnhandledExceptionFilter
SetHandleCount
GetStdHandle
UnhandledExceptionFilter
GetTimeZoneInformation
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCurrentProcessId
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
IsBadReadPtr
IsBadCodePtr
SetFileTime
SystemTimeToFileTime
LocalFileTimeToFileTime
FindNextFileA
CreateFileA
GetFullPathNameA
GetVolumeInformationA
FindFirstFileA
FindClose
GetCurrentProcess
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
MoveFileA
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
LocalAlloc
FileTimeToLocalFileTime
ResumeThread
GetCurrentThread
lstrcmpA
ConvertDefaultLocale
EnumResourceLanguagesA
lstrcpyA
GetModuleFileNameA
InterlockedDecrement
SetLastError
GlobalFree
MulDiv
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageA
LocalFree
FreeResource
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
LoadLibraryA
FreeLibrary
lstrcatA
lstrcmpW
lstrcpynA
GetModuleHandleA
GetProcAddress
QueryPerformanceFrequency
QueryPerformanceCounter
TerminateProcess
SetVolumeLabelA
GetDiskFreeSpaceA
UnmapViewOfFile
CreateFileMappingA
MapViewOfFile
GetDriveTypeA
CreateDirectoryA
GetFileAttributesA
SetFileAttributesA
GetTickCount
GetPrivateProfileStringA
CreateEventA
CloseHandle
GetCurrentDirectoryA
Sleep
DeleteFileA
FileTimeToSystemTime
GetDiskFreeSpaceExA
WritePrivateProfileStringA
WaitForSingleObject
CreateProcessA
SetEvent
CreateMutexA
GetSystemDirectoryA
FindResourceA
LoadResource
LockResource
SizeofResource
CompareStringW
CompareStringA
lstrlenW
lstrcmpiA
GetVersion
GetLastError
WideCharToMultiByte
MultiByteToWideChar
lstrlenA
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
CreateThread
user32
GetNextDlgGroupItem
MessageBeep
RegisterClipboardFormatA
PostThreadMessageA
GetSysColorBrush
DestroyMenu
GetMenuItemInfoA
InflateRect
SetWindowContextHelpId
MapDialogRect
GetDesktopWindow
CreateDialogIndirectParamA
GetNextDlgTabItem
EndDialog
GetMessageA
GetActiveWindow
ValidateRect
ShowOwnedPopups
SetCursor
LoadCursorA
SetTimer
IsRectEmpty
GetCursorPos
WindowFromPoint
SetMenuItemBitmaps
ModifyMenuA
CheckMenuItem
GetMenuCheckMarkDimensions
IsWindowEnabled
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
SetDlgItemTextA
EndPaint
BeginPaint
GetDC
ClientToScreen
GetMenuState
RegisterWindowMessageA
WinHelpA
GetCapture
CreateWindowExA
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassInfoExA
GetClassNameA
SetPropA
GetPropA
RemovePropA
SendDlgItemMessageA
GetFocus
IsWindow
CharNextA
GetWindowTextLengthA
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
SetActiveWindow
BeginDeferWindowPos
EndDeferWindowPos
GetDlgItem
GetTopWindow
DestroyWindow
UnhookWindowsHookEx
GetMessagePos
MapWindowPoints
ScrollWindow
TrackPopupMenu
GetKeyState
SetScrollRange
GetScrollRange
SetScrollPos
GetScrollPos
SetForegroundWindow
ShowScrollBar
IsWindowVisible
UpdateWindow
GetMenu
GetSubMenu
GetMenuItemID
GetMenuItemCount
GetSysColor
AdjustWindowRectEx
GetParent
EqualRect
DeferWindowPos
GetScrollInfo
SetScrollInfo
GetClassInfoA
RegisterClassA
UnregisterClassA
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
GetWindowLongA
SetWindowLongA
SetWindowPos
OffsetRect
IntersectRect
SystemParametersInfoA
GetWindowPlacement
CopyRect
PtInRect
GetWindow
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
wsprintfA
CharToOemBuffA
OemToCharBuffA
PostQuitMessage
GetSystemMetrics
ReleaseCapture
LoadIconA
SetCapture
LoadMenuA
UnpackDDElParam
ReuseDDElParam
LoadAcceleratorsA
InsertMenuItemA
CreatePopupMenu
KillTimer
ScreenToClient
GetClientRect
GetWindowRect
SetWindowRgn
IsIconic
GetSystemMenu
PostMessageA
SendMessageA
AppendMenuA
DrawIcon
FillRect
SetRect
SetRectEmpty
BringWindowToTop
SetMenu
TranslateAcceleratorA
InvalidateRgn
IsChild
CopyAcceleratorTableA
PeekMessageA
TranslateMessage
DispatchMessageA
MessageBoxA
SetFocus
FindWindowA
CharUpperA
GetWindowDC
ReleaseDC
EnableWindow
InvalidateRect
LoadBitmapA
GetMessageTime
EnableMenuItem
gdi32
ExtSelectClipRgn
DeleteDC
CreateBitmap
GetStockObject
CreateEllipticRgn
LPtoDP
Ellipse
CreateFontIndirectA
GetTextExtentPoint32A
CreateRectRgnIndirect
GetMapMode
GetBkColor
GetTextColor
SetMapMode
SetBkMode
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
GetPixel
GetWindowExtEx
GetViewportExtEx
CreatePatternBrush
CreateSolidBrush
CreateRectRgn
CombineRgn
DeleteObject
GetDIBits
BitBlt
SelectObject
CreateCompatibleDC
GetObjectA
GetRgnBox
CreateFontA
RestoreDC
SaveDC
GetDeviceCaps
SetBkColor
SetTextColor
GetClipBox
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
CreateCompatibleBitmap
comdlg32
GetFileTitleA
winspool.drv
DocumentPropertiesA
ClosePrinter
OpenPrinterA
advapi32
RegCloseKey
RegCreateKeyExA
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
RegOpenKeyA
RegEnumKeyA
RegDeleteKeyA
RegQueryValueA
shell32
DragFinish
DragQueryFileA
ShellExecuteA
comctl32
_TrackMouseEvent
ord17
ImageList_Destroy
ImageList_Draw
ImageList_GetImageInfo
shlwapi
PathFindFileNameA
UrlUnescapeA
PathStripToRootA
PathFindExtensionA
PathIsUNCA
oledlg
ord8
ole32
CoTaskMemFree
CoGetClassObject
StgOpenStorageOnILockBytes
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
OleUninitialize
CoFreeUnusedLibraries
CoTaskMemAlloc
CLSIDFromProgID
CLSIDFromString
OleInitialize
CoRevokeClassObject
OleIsCurrentClipboard
OleFlushClipboard
CoRegisterMessageFilter
oleaut32
SafeArrayUnaccessData
SysAllocStringByteLen
SysStringLen
SysFreeString
SysAllocStringLen
VariantInit
VariantChangeType
VariantClear
SafeArrayDestroy
SafeArrayAccessData
SystemTimeToVariantTime
SysAllocString
OleCreateFontIndirect
SafeArrayGetUBound
SafeArrayGetLBound
SafeArrayGetElemsize
SafeArrayGetDim
SafeArrayCreate
VariantCopy
wininet
InternetCanonicalizeUrlA
InternetQueryOptionA
InternetSetOptionExA
InternetQueryDataAvailable
HttpQueryInfoA
InternetCloseHandle
InternetGetLastResponseInfoA
InternetOpenA
InternetSetStatusCallback
InternetSetFilePointer
InternetWriteFile
InternetReadFile
InternetOpenUrlA
InternetCrackUrlA
Sections
.text Size: 292KB - Virtual size: 288KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 72KB - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1.4MB - Virtual size: 1.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
J&���u� Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE