Static task
static1
Behavioral task
behavioral1
Sample
c643aaad2cfc84df9fcb1b3e1ebd635417429fa82e1e492c3d44d396b4d2c72e.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c643aaad2cfc84df9fcb1b3e1ebd635417429fa82e1e492c3d44d396b4d2c72e.exe
Resource
win10v2004-20220812-en
General
-
Target
c643aaad2cfc84df9fcb1b3e1ebd635417429fa82e1e492c3d44d396b4d2c72e
-
Size
1.9MB
-
MD5
172dcf20d37ee5a59495c9344ffb51ed
-
SHA1
e0d65cc8191719f374ec6acfb219dc301456f4f4
-
SHA256
c643aaad2cfc84df9fcb1b3e1ebd635417429fa82e1e492c3d44d396b4d2c72e
-
SHA512
ab216f2743c6596834d3c92489e25d89041ac46c9abeacfd26d1c4b22f691adce37a6e1ab42440817d9c9eb255418eac221a951317878df01defb96de6c769a0
-
SSDEEP
49152:PXmRVuEMk4tLO+YfhTOY+zThUcbjrIeJzC6EhEr:veMr2fhUh9bj8eJzC6Eh
Malware Config
Signatures
Files
-
c643aaad2cfc84df9fcb1b3e1ebd635417429fa82e1e492c3d44d396b4d2c72e.exe windows x86
c3fdb71a4a792bde52e5bee6032eaf34
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SuspendThread
CreateEventW
GlobalFlags
MoveFileW
FlushFileBuffers
LockFile
UnlockFile
SetEndOfFile
DuplicateHandle
GetFullPathNameW
GetFileSizeEx
GetFileTime
SetErrorMode
GetStartupInfoW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetDriveTypeW
GetSystemTimeAsFileTime
GetFileType
HeapFree
HeapAlloc
RtlUnwind
RaiseException
HeapReAlloc
ExitThread
HeapSize
VirtualQuery
GetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetStartupInfoA
HeapCreate
QueryPerformanceCounter
GetConsoleCP
GetConsoleMode
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
SetThreadPriority
GetACP
GetOEMCP
IsValidCodePage
LCMapStringA
LCMapStringW
GetCurrentDirectoryA
GetTimeZoneInformation
SetStdHandle
GetProcessHeap
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetLocaleInfoA
GetStringTypeA
GetStringTypeW
GetDriveTypeA
CreateFileA
SetEnvironmentVariableA
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
SetConsoleMode
ReadConsoleInputA
FlushConsoleInputBuffer
GlobalMemoryStatus
GetVersion
GetEnvironmentVariableW
WriteProcessMemory
ReadProcessMemory
IsWow64Process
VirtualProtectEx
FlushInstructionCache
InterlockedCompareExchange
LoadLibraryExA
LoadLibraryExW
GetCPInfo
TlsFree
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
ConvertDefaultLocale
EnumResourceLanguagesW
lstrcmpA
GetLocaleInfoW
CompareStringA
InterlockedExchange
FindFirstFileW
FileTimeToLocalFileTime
FindNextFileW
MulDiv
GlobalAddAtomW
GlobalFindAtomW
GlobalDeleteAtom
LoadLibraryW
LoadLibraryA
lstrcmpW
GetVersionExA
GetThreadLocale
FreeResource
GlobalFree
FreeLibrary
InterlockedDecrement
SetLastError
GetModuleHandleW
GlobalAlloc
GlobalLock
GlobalUnlock
InterlockedIncrement
GetFileSize
FileTimeToSystemTime
SetFileTime
WriteFile
LocalFileTimeToFileTime
SystemTimeToFileTime
ReadFile
SetFilePointer
CreateFileW
UnmapViewOfFile
MapViewOfFile
CreateFileMappingW
FindClose
FindNextFileA
FindFirstFileA
GetCurrentDirectoryW
GetVolumeInformationW
OpenMutexA
GetComputerNameA
GetVersionExW
GetSystemInfo
LocalFree
FormatMessageW
MoveFileExW
GetTempPathW
CreateProcessW
WaitForSingleObject
GetExitCodeThread
GetPrivateProfileStringW
lstrlenA
GetExitCodeProcess
ResumeThread
lstrlenW
GetTickCount
GetModuleFileNameA
WritePrivateProfileStringW
GetPrivateProfileIntW
WideCharToMultiByte
SetEvent
ReleaseMutex
GetLastError
CreateMutexW
GetModuleFileNameW
VirtualFree
CompareStringW
MultiByteToWideChar
FindResourceW
LoadResource
LockResource
SizeofResource
RemoveDirectoryW
DeleteFileW
SetFileAttributesW
CreateDirectoryW
GetFileAttributesW
VirtualAlloc
Thread32Next
CreateThread
GetCurrentProcessId
Thread32First
CreateToolhelp32Snapshot
CloseHandle
OpenThread
VirtualProtect
SetThreadContext
GetProcAddress
GetModuleHandleA
TerminateThread
VirtualQueryEx
ExitProcess
GetCurrentThread
GetThreadContext
GetCurrentThreadId
VirtualAllocEx
GetCurrentProcess
TerminateProcess
Sleep
SetConsoleCtrlHandler
user32
SetMenuItemBitmaps
LoadBitmapW
ModifyMenuW
GetMenuState
EnableMenuItem
CheckMenuItem
SendDlgItemMessageW
SendDlgItemMessageA
WinHelpW
IsChild
GetCapture
SetWindowsHookExW
CallNextHookEx
GetClassLongW
GetClassNameW
SetPropW
GetPropW
RemovePropW
GetWindowTextLengthW
GetForegroundWindow
GetLastActivePopup
SetActiveWindow
DispatchMessageW
DestroyWindow
GetMessageTime
GetMessagePos
PeekMessageW
MapWindowPoints
GetKeyState
SetMenu
GetSubMenu
GetMenuItemID
GetMenuItemCount
CreateWindowExW
GetClassInfoExW
GetClassInfoW
RegisterClassW
AdjustWindowRectEx
DefWindowProcW
CallWindowProcW
GetMenu
SystemParametersInfoA
GetWindowPlacement
GetDlgCtrlID
CharNextW
SetWindowContextHelpId
MapDialogRect
UnhookWindowsHookEx
SetFocus
SetWindowPos
GetFocus
SetCapture
InvalidateRgn
GetWindowRect
IntersectRect
OffsetRect
SetRect
IsRectEmpty
IsWindowEnabled
MessageBoxA
RegisterWindowMessageW
SendMessageW
GetParent
CopyAcceleratorTableW
wsprintfW
LoadCursorW
UpdateWindow
GetWindowTextW
SetForegroundWindow
GetTopWindow
WaitForInputIdle
EqualRect
PostMessageW
IsWindowVisible
IsWindow
ReleaseDC
GetDC
SetLayeredWindowAttributes
SetWindowLongW
EnumThreadWindows
IsDialogMessageW
SetWindowTextW
MoveWindow
GetWindowThreadProcessId
GetDesktopWindow
GetWindow
EndDialog
GetNextDlgTabItem
CreateDialogIndirectParamW
GetActiveWindow
GetSysColor
GetNextDlgGroupItem
EnableWindow
GetProcessWindowStation
GetUserObjectInformationW
MessageBoxW
PostQuitMessage
LoadIconW
GetSystemMenu
AppendMenuW
IsIconic
GetSystemMetrics
GetClientRect
DrawIcon
DrawStateW
CopyRect
FrameRect
GetWindowLongW
InvalidateRect
ReleaseCapture
ShowWindow
SystemParametersInfoW
GetWindowRgn
SetWindowRgn
PtInRect
GetWindowTextA
GetClassNameA
PostThreadMessageW
CharUpperW
GetSysColorBrush
UnregisterClassW
RegisterClipboardFormatW
DestroyMenu
EndPaint
BeginPaint
GetWindowDC
ClientToScreen
GrayStringW
DrawTextExW
DrawTextW
TabbedTextOutW
SetCursor
GetMessageW
TranslateMessage
GetCursorPos
ValidateRect
GetDlgItem
MessageBeep
GetMenuCheckMarkDimensions
gdi32
SaveDC
RestoreDC
SetBkMode
SetMapMode
GetViewportExtEx
GetWindowExtEx
PtVisible
RectVisible
TextOutW
ExtTextOutW
Escape
CreateBitmap
GetTextColor
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
SetTextColor
ExtSelectClipRgn
DeleteDC
CreatePen
CreateSolidBrush
CreateFontIndirectW
GetMapMode
DPtoLP
SetViewportOrgEx
SetBkColor
GetBkColor
GetDeviceCaps
GetRgnBox
CreateRectRgnIndirect
CombineRgn
DeleteObject
BitBlt
SelectObject
CreateCompatibleBitmap
CreateDIBSection
GetTextExtentPoint32W
CreatePatternBrush
CreateRectRgn
GetStockObject
Rectangle
GetObjectW
StretchBlt
GetClipBox
CreateCompatibleDC
OffsetViewportOrgEx
GetPixel
comdlg32
GetFileTitleW
winspool.drv
DocumentPropertiesW
ClosePrinter
OpenPrinterW
advapi32
RegisterEventSourceA
DeregisterEventSource
RegCreateKeyExW
RegQueryValueW
RegOpenKeyW
RegEnumKeyW
RegDeleteKeyW
AdjustTokenPrivileges
LookupPrivilegeValueW
OpenProcessToken
GetUserNameA
RegSetValueExW
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
ReportEventA
shell32
ShellExecuteW
comctl32
InitCommonControlsEx
_TrackMouseEvent
shlwapi
PathFindFileNameW
PathStripToRootW
PathIsUNCW
SHDeleteKeyW
PathFindExtensionW
oledlg
OleUIBusyW
ole32
CoRevokeClassObject
OleIsCurrentClipboard
OleInitialize
CoFreeUnusedLibraries
OleUninitialize
OleFlushClipboard
CLSIDFromString
CLSIDFromProgID
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoGetClassObject
CoTaskMemFree
CoTaskMemAlloc
CoUninitialize
CoCreateInstance
CoInitialize
CoRegisterMessageFilter
oleaut32
VariantCopy
OleCreateFontIndirect
SysAllocStringLen
SafeArrayDestroy
SysFreeString
VariantClear
SysStringLen
SystemTimeToVariantTime
VariantTimeToSystemTime
VariantInit
SysAllocString
VariantChangeType
ntdll
RtlAdjustPrivilege
iphlpapi
GetAdaptersInfo
psapi
GetModuleInformation
oleacc
CreateStdAccessibleObject
LresultFromObject
Sections
.text Size: 769KB - Virtual size: 768KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 201KB - Virtual size: 201KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 27KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.detourd Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.detourc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.cpp0 Size: 828KB - Virtual size: 827KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 45KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ