A0DB34FC6FE35D429A28ADDE5467D4D7
Static task
static1
Behavioral task
behavioral1
Sample
46a903dd4b3cca32df610b842ce289e734abeb86d6f635dac328f42526c7ff2e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
46a903dd4b3cca32df610b842ce289e734abeb86d6f635dac328f42526c7ff2e.exe
Resource
win10v2004-20221111-en
General
-
Target
46a903dd4b3cca32df610b842ce289e734abeb86d6f635dac328f42526c7ff2e
-
Size
1.1MB
-
MD5
158269c4f1af28674d453bfaac0a28a5
-
SHA1
0b4dce3fbe14f5cc64c1e59445d6a191949ab7a0
-
SHA256
46a903dd4b3cca32df610b842ce289e734abeb86d6f635dac328f42526c7ff2e
-
SHA512
8e9e60f8f43a9ba1583e4739abb1df6736bc96ce39c1603b65f2805fa94c50bf2d6acc5711e8acc7ba973cadeb81c443decdd1a53236b8bc4da3c8880521f503
-
SSDEEP
24576:+xHLTP4YcwZRtqSxD7P2c7pcts9paH0NyJqsTJJxFdqM+WS9u++7FOsp:SHLTPPcwZRtqSZr7pctyju++7FX
Malware Config
Signatures
Files
-
46a903dd4b3cca32df610b842ce289e734abeb86d6f635dac328f42526c7ff2e.exe windows x86
2bb5e9f992dee06d0ba9178443454a82
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetErrorMode
GetFileTime
GetTickCount
RtlUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RaiseException
ExitThread
HeapAlloc
GetSystemTimeAsFileTime
HeapFree
GetTimeFormatA
GetDateFormatA
GetCommandLineA
GetSystemInfo
VirtualQuery
HeapReAlloc
ExitProcess
HeapSize
GetACP
IsValidCodePage
LCMapStringA
LCMapStringW
HeapCreate
GetStdHandle
GetTimeZoneInformation
FreeEnvironmentStringsA
GetEnvironmentStrings
FindResourceExA
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
InitializeCriticalSectionAndSpinCount
GetStringTypeA
GetStringTypeW
GetConsoleCP
GetConsoleMode
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
GetLocaleInfoW
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CompareStringW
SetEnvironmentVariableA
OutputDebugStringA
GetSystemTime
IsBadWritePtr
IsBadReadPtr
GetCurrentDirectoryA
WritePrivateProfileStringA
GetOEMCP
GetCPInfo
GlobalFlags
SystemTimeToFileTime
InterlockedIncrement
GetModuleHandleW
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
GlobalHandle
GlobalReAlloc
TlsGetValue
GetFullPathNameA
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
GetThreadLocale
VirtualProtect
SuspendThread
SetThreadPriority
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
InterlockedExchange
GetCurrentProcessId
InterlockedDecrement
GetModuleFileNameW
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
CompareStringA
lstrcmpW
GetModuleHandleA
GetVersionExA
FileTimeToLocalFileTime
FileTimeToSystemTime
lstrlenA
lstrcmpA
SetLastError
GetLocalTime
Sleep
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
DeviceIoControl
SetFilePointer
CopyFileExA
GetLogicalDrives
CreatePipe
GetStartupInfoA
CreateProcessA
TerminateProcess
SetEvent
ResetEvent
CreateWaitableTimerA
SetWaitableTimer
WaitForMultipleObjects
FreeResource
ResumeThread
GlobalLock
GlobalUnlock
MulDiv
GlobalFree
CreateEventA
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
FreeLibrary
SetFilePointerEx
ReadFile
WriteFile
CreateMutexA
GetCurrentThread
GetCurrentProcess
LocalAlloc
FindFirstFileA
FindNextFileA
GetFileSizeEx
FindClose
GetModuleFileNameA
SetCurrentDirectoryA
GlobalAlloc
LoadResource
LockResource
SizeofResource
FindResourceA
SetFileAttributesA
GetFileAttributesA
CreateFileA
CopyFileA
MoveFileA
CreateDirectoryA
DeleteFileA
GetLastError
GetProcessHeap
RemoveDirectoryA
FormatMessageA
LocalFree
MultiByteToWideChar
GetDriveTypeA
WideCharToMultiByte
QueryDosDeviceA
lstrlenW
GetVolumeInformationA
WaitForSingleObject
CloseHandle
FreeEnvironmentStringsW
CreateThread
user32
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
ModifyMenuA
EnableMenuItem
RegisterWindowMessageA
SendDlgItemMessageA
WinHelpA
IsChild
GetCapture
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassNameA
SetPropA
GetPropA
RemovePropA
GetFocus
GetWindowTextLengthA
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
DispatchMessageA
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
PeekMessageA
MapWindowPoints
GetKeyState
SetMenu
IsWindowVisible
UpdateWindow
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
ScreenToClient
EqualRect
CopyRect
DefWindowProcA
GetMenu
OffsetRect
IntersectRect
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetSystemMetrics
GetWindow
GetDesktopWindow
GetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
GetWindowLongA
GetDlgItem
IsWindowEnabled
GetNextDlgTabItem
EndDialog
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
IsWindow
ShowWindow
BringWindowToTop
KillTimer
RegisterClipboardFormatA
SetTimer
GetWindowRect
SetWindowPos
RedrawWindow
SendNotifyMessageA
SetForegroundWindow
GetSystemMenu
InsertMenuA
SetWindowLongA
LoadIconA
PostMessageA
GetParent
SendMessageA
GetSysColor
FillRect
InvalidateRect
GetDC
ReleaseDC
SetCapture
SetFocus
ReleaseCapture
SetActiveWindow
LoadCursorA
GetWindowDC
GetClientRect
PtInRect
DestroyCursor
SetCursor
SetDlgItemTextA
IsDialogMessageA
GetProcessWindowStation
GetUserObjectInformationA
EnableWindow
MessageBoxA
PostThreadMessageA
CallWindowProcA
MessageBeep
GetNextDlgGroupItem
InvalidateRgn
SetRect
IsRectEmpty
CopyAcceleratorTableA
CharNextA
UnregisterClassA
GetSysColorBrush
DestroyMenu
CharUpperA
SetWindowContextHelpId
MapDialogRect
GetAsyncKeyState
GetMessageA
TranslateMessage
GetCursorPos
ValidateRect
PostQuitMessage
GetWindowThreadProcessId
EndPaint
BeginPaint
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
MoveWindow
GetDlgCtrlID
SetWindowTextA
CheckMenuItem
gdi32
MoveToEx
GetViewportExtEx
GetWindowExtEx
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
LineTo
ExtSelectClipRgn
CreateRectRgnIndirect
GetMapMode
EnumFontFamiliesExA
GetBkColor
GetTextColor
GetRgnBox
SetMapMode
SetBkMode
RestoreDC
SaveDC
CreateBitmap
GetObjectA
SetBkColor
SetTextColor
GetClipBox
CreateFontA
CreateCompatibleBitmap
BitBlt
CreateSolidBrush
DeleteDC
DeleteObject
GetDeviceCaps
SelectObject
CreateCompatibleDC
CreatePen
GetStockObject
comdlg32
GetFileTitleA
winspool.drv
DocumentPropertiesA
ClosePrinter
OpenPrinterA
advapi32
ImpersonateSelf
RegQueryValueA
RegOpenKeyA
RegEnumKeyA
RegDeleteKeyA
RegQueryValueExA
RegOpenKeyExA
RegSetValueExA
RegCreateKeyExA
RegCloseKey
FreeSid
OpenThreadToken
OpenProcessToken
AllocateAndInitializeSid
InitializeSecurityDescriptor
GetLengthSid
InitializeAcl
AddAccessAllowedAce
SetSecurityDescriptorDacl
SetSecurityDescriptorGroup
SetSecurityDescriptorOwner
IsValidSecurityDescriptor
AccessCheck
RevertToSelf
shell32
ShellExecuteExA
SHFileOperationA
ShellExecuteA
comctl32
ord17
shlwapi
SHGetValueA
PathFindExtensionA
PathFindFileNameA
PathStripToRootA
PathIsUNCA
PathFileExistsA
SHSetValueA
PathRemoveFileSpecW
oledlg
ord8
ole32
CoRevokeClassObject
OleInitialize
CoFreeUnusedLibraries
OleUninitialize
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoGetClassObject
CoInitializeEx
CoCreateInstance
OleIsCurrentClipboard
CLSIDFromString
CLSIDFromProgID
CoTaskMemAlloc
CoTaskMemFree
CreateStreamOnHGlobal
OleFlushClipboard
CoRegisterMessageFilter
CoInitialize
CoUninitialize
oleaut32
OleLoadPicture
SysStringLen
SysAllocStringByteLen
VariantClear
VariantChangeType
VariantInit
SysAllocStringLen
VariantCopy
SafeArrayDestroy
VariantTimeToSystemTime
SystemTimeToVariantTime
OleCreateFontIndirect
SysAllocString
SysFreeString
Exports
Exports
Sections
.text Size: 541KB - Virtual size: 541KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
SPTD Size: 1024B - Virtual size: 921B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 240KB - Virtual size: 239KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 29KB - Virtual size: 117KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 280KB - Virtual size: 280KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ