Static task
static1
Behavioral task
behavioral1
Sample
a4d317e36d68f8e80f2a00d70fb4dc1f8525891a2b2a08c59230ff851bd152e0.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a4d317e36d68f8e80f2a00d70fb4dc1f8525891a2b2a08c59230ff851bd152e0.exe
Resource
win10v2004-20221111-en
General
-
Target
a4d317e36d68f8e80f2a00d70fb4dc1f8525891a2b2a08c59230ff851bd152e0
-
Size
1.9MB
-
MD5
6b5ccbcb3231d8b2f600d82c5a4c72d5
-
SHA1
1c0a73d7e5de7afc47d329a1ee635273ac1dbecf
-
SHA256
a4d317e36d68f8e80f2a00d70fb4dc1f8525891a2b2a08c59230ff851bd152e0
-
SHA512
0418c0eb46b506954d5b4a16f9f6c0a3248e75479296ed67913d8ea0b532b928fd83e6cdd5d38f1d0523126b27b28a549d92d6ef7f35d19c914c67a64047428b
-
SSDEEP
49152:pNrDV4bEJjHJrgQYgyMOSAZ2Qa7ZWNyXX0w+viQ161:HJjxgQFyMvcnN8E76+6
Malware Config
Signatures
Files
-
a4d317e36d68f8e80f2a00d70fb4dc1f8525891a2b2a08c59230ff851bd152e0.exe windows x86
6d7a60411da9d34de9a1e81c64a0b715
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
PathFileExistsW
PathRemoveFileSpecW
kernel32
GlobalDeleteAtom
GlobalFindAtomW
GlobalAddAtomW
FreeResource
GlobalFlags
SetEndOfFile
GetModuleHandleA
InterlockedExchange
GetLocaleInfoW
SetFileTime
UnhandledExceptionFilter
IsDebuggerPresent
HeapFree
HeapAlloc
ExitThread
GetCommandLineA
GetStartupInfoA
RtlUnwind
RaiseException
HeapReAlloc
HeapSize
ExitProcess
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
HeapCreate
HeapDestroy
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetSystemTimeAsFileTime
InitializeCriticalSectionAndSpinCount
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetConsoleCP
GetConsoleMode
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetProcessHeap
WinExec
MoveFileExW
LoadLibraryA
SetFilePointerEx
GetTickCount
WriteFile
ReadFile
CreateFileW
GetLastError
DeviceIoControl
CloseHandle
GetTimeFormatA
GetDateFormatA
GlobalAlloc
Sleep
GlobalFree
GetSystemTime
CreateThread
GetFileSizeEx
CreateDirectoryW
WideCharToMultiByte
GetFileAttributesW
GetLocalTime
DeleteFileW
FlushFileBuffers
FindResourceExW
FindResourceW
LoadResource
SizeofResource
MultiByteToWideChar
LockResource
GetFileSize
FindFirstFileW
MoveFileW
FindClose
FindNextFileW
GetFileTime
CreateFileA
FreeLibrary
SetUnhandledExceptionFilter
GetCurrentProcess
LoadLibraryW
CreateDirectoryA
GetProcAddress
GetCurrentDirectoryA
GetCurrentThreadId
GetCurrentProcessId
InterlockedCompareExchange
DosDateTimeToFileTime
lstrcmpW
GetVersionExA
lstrlenA
VirtualFree
VirtualAlloc
GetDiskFreeSpaceExW
GetVolumeInformationW
CreateMutexW
SystemTimeToFileTime
InitializeCriticalSection
OpenProcess
LeaveCriticalSection
TerminateProcess
lstrcmpA
InterlockedIncrement
MulDiv
lstrlenW
InterlockedDecrement
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
GlobalHandle
GlobalReAlloc
TlsGetValue
LocalAlloc
SetLastError
EnterCriticalSection
GetModuleHandleW
GetDiskFreeSpaceW
GlobalUnlock
GlobalLock
LocalFree
FormatMessageW
GetCurrentDirectoryW
DuplicateHandle
CreatePipe
CreateEventW
GetModuleFileNameW
GetExitCodeProcess
WaitForSingleObject
CreateProcessW
PeekNamedPipe
GetPrivateProfileSectionW
WritePrivateProfileStringW
GetPrivateProfileStringW
GetPrivateProfileSectionNamesW
FileTimeToSystemTime
SetFilePointer
DeleteCriticalSection
CreateToolhelp32Snapshot
Process32NextW
Process32FirstW
SetStdHandle
user32
SetCapture
IsRectEmpty
KillTimer
SetTimer
SetRect
ReleaseCapture
SetCursor
InvalidateRect
EndPaint
BeginPaint
GrayStringW
DrawTextExW
DrawTextW
TabbedTextOutW
FillRect
DestroyMenu
SetWindowTextW
RegisterWindowMessageW
LoadIconW
WinHelpW
GetCapture
GetClassLongW
GetClassNameW
SetPropW
GetPropW
RemovePropW
IsWindow
SetFocus
GetForegroundWindow
GetDlgItem
GetTopWindow
GetMessageTime
GetMessagePos
SetMenu
GetClassInfoExW
GetClassInfoW
RegisterClassW
AdjustWindowRectEx
GetDlgCtrlID
CallWindowProcW
CopyRect
GetMenu
SystemParametersInfoA
GetWindowPlacement
GetWindow
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapW
GetFocus
ModifyMenuW
EnableMenuItem
CheckMenuItem
GetSysColor
GetSysColorBrush
SetWindowsHookExW
CallNextHookEx
GetMessageW
TranslateMessage
DispatchMessageW
GetKeyState
PeekMessageW
GetCursorPos
ValidateRect
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
CreateAcceleratorTableW
InvalidateRgn
CharPrevW
SetCaretPos
ShowCaret
HideCaret
CreateCaret
DrawIconEx
wvsprintfW
GetUpdateRect
UpdateLayeredWindow
CharNextW
LoadImageW
GetWindowThreadProcessId
GetLastActivePopup
IsWindowEnabled
EnableWindow
UnhookWindowsHookEx
DestroyWindow
LoadCursorW
RegisterClassExW
GetWindowRgn
CreateWindowExW
DefWindowProcW
GetDC
InflateRect
OffsetRect
ReleaseDC
SetWindowRgn
GetWindowRect
IsIconic
SetForegroundWindow
GetParent
IntersectRect
GetWindowLongW
MonitorFromWindow
SetWindowLongW
MapWindowPoints
GetMonitorInfoW
MoveWindow
PostMessageW
GetWindowTextLengthW
PtInRect
GetWindowTextW
SetWindowPos
ClientToScreen
ScreenToClient
PostQuitMessage
IsZoomed
GetClientRect
CharUpperW
RegisterDeviceNotificationW
SendMessageW
GetSystemMetrics
CharLowerA
FindWindowW
ShowWindow
MessageBoxW
CharLowerW
wsprintfW
gdi32
CreateFontIndirectW
ExtTextOutW
GetTextExtentPoint32W
SaveDC
RestoreDC
SetBkMode
SetMapMode
LineTo
MoveToEx
SelectClipRgn
PtVisible
RectVisible
TextOutW
Escape
SetViewportOrgEx
SetViewportExtEx
GetObjectW
SetWindowOrgEx
SetWindowExtEx
ScaleWindowExtEx
ExtSelectClipRgn
GetStockObject
CreatePen
CreateSolidBrush
CreateRectRgnIndirect
CombineRgn
GetTextMetricsW
GetCharABCWidthsW
RoundRect
SetBkColor
SetTextColor
ScaleViewportExtEx
GetClipBox
GetDeviceCaps
CreateDIBSection
PtInRegion
CreateRectRgn
CreateBitmap
DeleteObject
CreateRoundRectRgn
BitBlt
DeleteDC
SelectObject
CreateCompatibleDC
SetStretchBltMode
OffsetViewportOrgEx
CreateCompatibleBitmap
CreatePenIndirect
StretchBlt
GetObjectA
Rectangle
winspool.drv
OpenPrinterW
DocumentPropertiesW
ClosePrinter
comdlg32
GetSaveFileNameW
GetOpenFileNameW
advapi32
RegCloseKey
RegOpenKeyA
RegCreateKeyA
RegQueryValueExA
RegSetValueExA
shell32
SHGetPathFromIDListW
ShellExecuteW
SHBrowseForFolderW
SHFileOperationW
SHGetSpecialFolderPathW
ord165
ole32
OleRun
OleLockRunning
CLSIDFromProgID
CoUninitialize
OleInitialize
OleUninitialize
CoInitialize
CoCreateInstance
CLSIDFromString
OleSetContainedObject
oleaut32
VariantInit
SysAllocString
SysFreeString
SysStringLen
VariantClear
VariantChangeType
VariantCopy
SysAllocStringLen
ws2_32
gethostname
htonl
gethostbyaddr
connect
gethostbyname
send
WSAStartup
inet_addr
htons
WSACleanup
getservbyname
recv
socket
closesocket
iphlpapi
GetAdaptersInfo
gdiplus
GdipDeleteStringFormat
GdipCreateStringFormat
GdipAlloc
GdipFree
GdipDeleteBrush
GdipCreateLineBrushI
GdipDeleteGraphics
GdipSetStringFormatLineAlign
GdipCloneBrush
GdipSetTextRenderingHint
GdipDrawString
GdipCreateFontFromDC
GdipCreateFontFromLogfontA
GdipSetStringFormatAlign
GdipDeleteFont
GdiplusStartup
GdiplusShutdown
GdipCreateFromHDC
dbghelp
MiniDumpWriteDump
oleacc
LresultFromObject
CreateStdAccessibleObject
winmm
timeKillEvent
timeEndPeriod
timeSetEvent
comctl32
ord17
_TrackMouseEvent
Sections
.text Size: 874KB - Virtual size: 874KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 146KB - Virtual size: 146KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 17KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 817KB - Virtual size: 816KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 74KB - Virtual size: 74KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ