Static task
static1
Behavioral task
behavioral1
Sample
360516f598e85061abea4cfb92f41b8178468e426887c7f34fe292e9a8bb1604.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
360516f598e85061abea4cfb92f41b8178468e426887c7f34fe292e9a8bb1604.exe
Resource
win10v2004-20221111-en
General
-
Target
360516f598e85061abea4cfb92f41b8178468e426887c7f34fe292e9a8bb1604
-
Size
1.4MB
-
MD5
b466e4612982bf2f0c40ea7a65be48ec
-
SHA1
75e5f93cc9d05a70ddf756f9b2cd1ad285d41356
-
SHA256
360516f598e85061abea4cfb92f41b8178468e426887c7f34fe292e9a8bb1604
-
SHA512
885557005bf3363f450546eab4aeb037fe4e73d24b678acb7734fbae1c6de50d006e4825ef9381412d1fa56a4929beffd5cf8b3740e8b751392a7b00ccf9fc1c
-
SSDEEP
24576:S1y5J5porY3ys6d5zI8yA7UcOni7c1/IMD01tea5VQCxxKQ9bnMMMMMMKub2:oy5UsABIXOc9DZa5XmQMMMMMMK62
Malware Config
Signatures
Files
-
360516f598e85061abea4cfb92f41b8178468e426887c7f34fe292e9a8bb1604.exe windows x86
4af5dcad4230f5d88140a8b7901d94e5
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
InitCommonControlsEx
ImageList_ReplaceIcon
ord8
CreateStatusWindowW
ImageList_Destroy
ImageList_Create
ImageList_Remove
ImageList_AddMasked
ImageList_Add
PropertySheetW
shlwapi
StrCmpLogicalW
SHAutoComplete
uxtheme
IsAppThemed
IsThemeActive
kernel32
SetThreadExecutionState
GetSystemDirectoryW
SetThreadPriority
GetCurrentThread
SetPriorityClass
SetCurrentDirectoryW
GetFullPathNameA
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
CreateThread
WaitForSingleObject
GetProcessAffinityMask
CreateEventW
CreateSemaphoreW
ReleaseSemaphore
ResetEvent
SetEvent
SystemTimeToFileTime
GetSystemTime
SystemTimeToTzSpecificLocalTime
FileTimeToLocalFileTime
FileTimeToSystemTime
TzSpecificLocalTimeToSystemTime
WideCharToMultiByte
MultiByteToWideChar
CompareStringW
IsDBCSLeadByte
GetCPInfo
GetDateFormatW
GetTimeFormatW
GetTempPathW
UnmapViewOfFile
MapViewOfFile
OpenFileMappingW
CreateFileMappingW
GetVersionExA
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalSize
ReleaseMutex
CreateMutexW
GetDiskFreeSpaceW
FindCloseChangeNotification
FindFirstChangeNotificationW
GetTickCount
GetModuleHandleExW
GetCompressedFileSizeW
UpdateResourceW
EnumResourceLanguagesW
EndUpdateResourceW
EnumResourceNamesW
CompareStringA
GetLocaleInfoW
GetNumberFormatW
GetLogicalDrives
ResumeThread
SuspendThread
GetCurrentThreadId
GetLocalTime
CopyFileW
GetThreadPriority
GetPriorityClass
SetErrorMode
MulDiv
CompareFileTime
FindNextChangeNotification
WaitForMultipleObjects
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetModuleHandleA
LCMapStringW
LCMapStringA
HeapSize
CreateFileA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
SetHandleCount
ExitProcess
VirtualAlloc
VirtualFree
GetModuleFileNameA
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
IsValidCodePage
GetOEMCP
GetACP
InterlockedDecrement
InterlockedIncrement
GetStartupInfoA
GetCommandLineA
GetConsoleMode
GetConsoleCP
RaiseException
ExitThread
RtlUnwind
HeapReAlloc
GetCurrentProcessId
LoadLibraryExW
LoadResource
SizeofResource
FindResourceW
GetFullPathNameW
FoldStringW
GetCurrentDirectoryW
GetVersionExW
FindNextFileW
ExpandEnvironmentStringsW
GetVolumeInformationW
GetDiskFreeSpaceExW
GetDriveTypeW
GetFileType
GetFileTime
FlushFileBuffers
GetStdHandle
GetLongPathNameW
GetShortPathNameW
MoveFileW
FindFirstFileW
FindClose
DeviceIoControl
BackupSeek
BackupRead
FormatMessageW
LocalFree
GetCommandLineW
GetFileInformationByHandle
CreateHardLinkW
GetModuleHandleW
GetCurrentProcess
SetLastError
GetModuleFileNameW
HeapCreate
HeapDestroy
DosDateTimeToFileTime
LocalFileTimeToFileTime
HeapFree
HeapAlloc
Sleep
GetSystemTimeAsFileTime
RemoveDirectoryW
CreateDirectoryW
SetFileAttributesW
DeleteFileW
SetEndOfFile
WriteFile
ReadFile
GetProcAddress
SetFileTime
GetFileAttributesW
CloseHandle
SetFilePointer
GetFileSize
GetLastError
CreateFileW
LoadLibraryW
FreeLibrary
LoadLibraryA
InitializeCriticalSectionAndSpinCount
GetProcessHeap
SetEnvironmentVariableA
BeginUpdateResourceW
user32
GetClipboardData
PostQuitMessage
SetMenu
InsertMenuW
LoadMenuW
RegisterClassW
LoadAcceleratorsW
GetMenuState
CreateIcon
SetForegroundWindow
FlashWindow
RegisterClassExW
CopyRect
ValidateRect
GetSysColor
CopyImage
FillRect
DrawIconEx
GetSystemMenu
SetTimer
KillTimer
SystemParametersInfoW
MessageBoxIndirectW
RedrawWindow
GetComboBoxInfo
IsCharUpperW
IsCharAlphaW
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
MessageBeep
PeekMessageW
GetFocus
EnableMenuItem
MoveWindow
GetMenuItemID
LoadBitmapW
InsertMenuItemW
LoadImageW
GetForegroundWindow
BeginPaint
EndPaint
AppendMenuW
DrawMenuBar
GetMenu
GetSubMenu
DeleteMenu
GetMenuItemCount
ScreenToClient
ClientToScreen
CreatePopupMenu
TrackPopupMenu
DestroyMenu
CallWindowProcW
WaitForInputIdle
IsWindow
RegisterClipboardFormatW
GetKeyState
LoadCursorW
SetCursor
WindowFromPoint
GetWindowThreadProcessId
GetDC
ReleaseDC
GetDesktopWindow
GetCursorPos
EnableWindow
IntersectRect
SystemParametersInfoA
IsIconic
IsWindowEnabled
SetDlgItemInt
GetDlgItemInt
GetLastActivePopup
IsChild
PostThreadMessageW
CreateDialogParamW
SetScrollPos
ScrollWindowEx
PtInRect
SetScrollRange
LoadIconW
CreateDialogIndirectParamW
GetPropW
RemovePropW
BringWindowToTop
GetMessageW
TranslateMessage
DispatchMessageW
GetIconInfo
CreateIconIndirect
TranslateAcceleratorW
IsDialogMessageW
SetPropW
CheckMenuItem
FindWindowW
wsprintfW
OemToCharW
OemToCharA
CharToOemBuffA
OemToCharBuffA
CharToOemA
CharToOemBuffW
SetWindowLongW
RegisterWindowMessageW
MessageBoxW
FindWindowExW
UpdateWindow
EnumWindows
IsDlgButtonChecked
ShowWindow
EnumChildWindows
PostMessageW
InvalidateRect
CheckDlgButton
DialogBoxParamW
DestroyIcon
IsWindowVisible
SetWindowPlacement
GetWindowPlacement
GetParent
MapWindowPoints
GetDlgItem
SendDlgItemMessageW
EndDialog
GetDlgItemTextW
SetDlgItemTextW
DestroyWindow
CreateWindowExW
DefWindowProcW
SetFocus
CharUpperW
CharLowerW
ExitWindowsEx
CharLowerA
LoadStringW
SetProcessDefaultLayout
GetWindowRect
GetClientRect
SetWindowPos
GetWindowTextW
SetWindowTextW
GetSystemMetrics
GetWindow
GetClassNameW
SendMessageW
GetMenuItemInfoW
SetMenuItemInfoW
GetWindowLongW
GetWindowTextLengthW
gdi32
Rectangle
TextOutA
MoveToEx
LineTo
GetDeviceCaps
CreatePatternBrush
SetPixel
CreateDIBSection
DPtoLP
CreateBitmap
GetMapMode
SetMapMode
CreateCompatibleBitmap
StretchBlt
SetBkColor
ExtTextOutW
BitBlt
GetObjectW
CreateCompatibleDC
GetPixel
DeleteDC
CreatePen
CreateSolidBrush
SetTextColor
TextOutW
Polygon
Polyline
SelectObject
GetTextFaceW
GetTextMetricsW
CreateFontW
GetTextExtentPoint32W
DeleteObject
comdlg32
GetOpenFileNameW
GetSaveFileNameW
CommDlgExtendedError
ChooseFontW
advapi32
RegQueryValueExW
RegOpenKeyExW
AdjustTokenPrivileges
LookupPrivilegeValueW
OpenProcessToken
CryptReleaseContext
CryptGenRandom
CryptAcquireContextW
GetSecurityDescriptorLength
GetFileSecurityW
IsTextUnicode
RegSetValueExW
RegCreateKeyExW
RegDeleteValueW
RegEnumValueW
RegEnumKeyExW
RegDeleteKeyW
AllocateAndInitializeSid
CheckTokenMembership
FreeSid
DuplicateToken
MapGenericMask
AccessCheck
SetFileSecurityW
RegCloseKey
shell32
SHGetFolderPathW
SHGetPathFromIDListW
FindExecutableW
DragFinish
DragQueryFileW
DragAcceptFiles
Shell_NotifyIconW
ShellExecuteW
ord100
SHAddToRecentDocs
SHFileOperationW
ShellExecuteExW
SHBrowseForFolderW
SHChangeNotify
SHGetDesktopFolder
SHGetFolderLocation
SHGetFileInfoW
SHGetMalloc
SHGetSpecialFolderLocation
ole32
CreateStreamOnHGlobal
CoCreateInstance
CoTaskMemFree
OleInitialize
OleUninitialize
CoTaskMemAlloc
CLSIDFromString
OleSetClipboard
DoDragDrop
CoInitializeEx
oleaut32
VariantClear
SysAllocString
Sections
.text Size: 1022KB - Virtual size: 1022KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 83KB - Virtual size: 82KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 677KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 185KB - Virtual size: 185KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 83KB - Virtual size: 84KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE