A0DB34FC6FE35D429A28ADDE5467D4D7
Static task
static1
Behavioral task
behavioral1
Sample
21042efaee2d83aea88e6baca111744a1c84bfa3bec72aa44bc8286aeb81950b.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
21042efaee2d83aea88e6baca111744a1c84bfa3bec72aa44bc8286aeb81950b.exe
Resource
win10v2004-20220812-en
General
-
Target
21042efaee2d83aea88e6baca111744a1c84bfa3bec72aa44bc8286aeb81950b
-
Size
1.1MB
-
MD5
07c0143fbf22c9c85859480ef60d995a
-
SHA1
c07de4b5e908c46c44a5a13aeec75151c5403528
-
SHA256
21042efaee2d83aea88e6baca111744a1c84bfa3bec72aa44bc8286aeb81950b
-
SHA512
66ffb67676586bac94d6eea03a78e3c7ab1aea1fe830b986c98a495b9fb8d95e0f9011d9959a03277be9394ad88dc6d7a53c83e2ee5fd6d1b02ee20ceab6315f
-
SSDEEP
24576:3HLTPCMOESyd6ZqPFi+2T3dIHnKconFuoOdFOsI:3HLTPiESyd64dkDdIHnKccNOdFq
Malware Config
Signatures
Files
-
21042efaee2d83aea88e6baca111744a1c84bfa3bec72aa44bc8286aeb81950b.exe windows x86
5918832847f3ba56baf6bf15efeede72
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
wimgapi
WIMMountImage
WIMUnmountImage
kernel32
TlsFree
GetModuleHandleW
InterlockedIncrement
SystemTimeToFileTime
GlobalFlags
GetCPInfo
GetOEMCP
WritePrivateProfileStringA
GetCurrentDirectoryA
FindResourceExA
SetErrorMode
GetFileTime
GetTickCount
RtlUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RaiseException
ExitThread
GetSystemTimeAsFileTime
GetTimeFormatA
GetDateFormatA
GetCommandLineA
GetSystemInfo
VirtualQuery
ExitProcess
GetACP
IsValidCodePage
LCMapStringA
LocalReAlloc
HeapCreate
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
InitializeCriticalSectionAndSpinCount
GetStringTypeA
GetStringTypeW
GetConsoleCP
GetConsoleMode
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
GetLocaleInfoW
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CompareStringW
SetEnvironmentVariableA
OutputDebugStringA
IsBadWritePtr
IsBadReadPtr
TlsSetValue
TlsAlloc
GlobalHandle
GlobalReAlloc
TlsGetValue
GetFullPathNameA
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
GetThreadLocale
VirtualProtect
SuspendThread
SetThreadPriority
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
InterlockedExchange
GetCurrentProcessId
InterlockedDecrement
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
CompareStringA
FileTimeToLocalFileTime
FileTimeToSystemTime
lstrcmpA
GetLocalTime
Sleep
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
SetFilePointer
CreateProcessW
CreateFileW
SetLastError
GetVersionExA
GetEnvironmentVariableW
GetModuleFileNameW
DeviceIoControl
lstrcmpW
GetSystemTime
GetTimeZoneInformation
SystemTimeToTzSpecificLocalTime
FormatMessageW
lstrlenA
CopyFileExA
GetLogicalDrives
GetStartupInfoA
TerminateProcess
GetModuleHandleA
GetTempPathW
GetLongPathNameW
GetExitCodeProcess
GetTempPathA
SetEvent
ResetEvent
FreeResource
ResumeThread
GlobalLock
GlobalUnlock
MulDiv
GlobalFree
CreateEventA
HeapSize
HeapFree
HeapReAlloc
GetProcessHeap
HeapAlloc
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
FreeLibrary
SetFilePointerEx
ReadFile
WriteFile
CreateMutexA
GetCurrentThread
GetCurrentProcess
LocalAlloc
CreatePipe
CreateProcessA
FindFirstFileA
FindNextFileA
GetFileSizeEx
FindClose
GetModuleFileNameA
SetCurrentDirectoryA
GlobalAlloc
LoadResource
LockResource
SizeofResource
FindResourceA
SetFileAttributesA
GetFileAttributesA
CreateFileA
CopyFileA
MoveFileA
CreateDirectoryA
DeleteFileA
GetLastError
RemoveDirectoryA
FormatMessageA
LocalFree
MultiByteToWideChar
GetDriveTypeA
WideCharToMultiByte
QueryDosDeviceA
lstrlenW
GetVolumeInformationA
WaitForSingleObject
CloseHandle
CreateThread
LCMapStringW
user32
RegisterClipboardFormatA
MessageBeep
GetNextDlgGroupItem
InvalidateRgn
IsRectEmpty
CopyAcceleratorTableA
CharNextA
UnregisterClassA
GetSysColorBrush
DestroyMenu
CharUpperA
SetWindowContextHelpId
MapDialogRect
GetAsyncKeyState
GetMessageA
TranslateMessage
GetCursorPos
ValidateRect
PostQuitMessage
GetWindowThreadProcessId
EndPaint
BeginPaint
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
MoveWindow
SetWindowTextA
IsDialogMessageA
SetDlgItemTextA
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
ModifyMenuA
EnableMenuItem
CheckMenuItem
RegisterWindowMessageA
SendDlgItemMessageA
WinHelpA
IsChild
GetCapture
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassNameA
SetPropA
RemovePropA
GetFocus
GetWindowTextLengthA
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
DispatchMessageA
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
PeekMessageA
MapWindowPoints
GetKeyState
SetMenu
IsWindowVisible
UpdateWindow
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
ScreenToClient
EqualRect
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
GetMenu
OffsetRect
IntersectRect
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetSystemMetrics
GetWindow
GetDesktopWindow
GetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
GetWindowLongA
GetDlgItem
IsWindowEnabled
GetNextDlgTabItem
EndDialog
GetMenuState
GetMenuItemID
GetMenuItemCount
GetProcessWindowStation
GetUserObjectInformationA
GetSubMenu
PostThreadMessageA
GetPropA
IsWindow
ShowWindow
BringWindowToTop
KillTimer
SetTimer
GetWindowRect
SetWindowPos
RedrawWindow
SendNotifyMessageA
SetForegroundWindow
GetSystemMenu
InsertMenuA
SetWindowLongA
LoadIconA
PostMessageA
GetParent
SendMessageA
CopyRect
GetSysColor
FillRect
InvalidateRect
GetDC
ReleaseDC
SetRect
SetCapture
SetFocus
ReleaseCapture
SetActiveWindow
LoadCursorA
GetWindowDC
GetClientRect
PtInRect
DestroyCursor
SetCursor
EnableWindow
MessageBoxA
gdi32
CreateRectRgnIndirect
GetBkColor
GetTextColor
GetRgnBox
GetMapMode
ExtSelectClipRgn
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetWindowExtEx
CreateCompatibleDC
GetStockObject
EnumFontFamiliesExA
CreatePen
MoveToEx
LineTo
SetMapMode
SetBkMode
RestoreDC
SaveDC
CreateBitmap
GetObjectA
SetBkColor
SetTextColor
GetClipBox
CreateFontA
CreateSolidBrush
BitBlt
CreateCompatibleBitmap
DeleteDC
DeleteObject
GetDeviceCaps
SelectObject
GetViewportExtEx
comdlg32
GetFileTitleA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
RegQueryValueExA
RegQueryValueA
RegOpenKeyA
RegEnumKeyA
RegDeleteKeyA
RegSetValueExA
RegCreateKeyExA
RegQueryInfoKeyA
RegEnumValueA
RegOpenKeyExA
RegEnumKeyExA
RegCloseKey
FreeSid
ImpersonateSelf
OpenThreadToken
OpenProcessToken
AllocateAndInitializeSid
InitializeSecurityDescriptor
GetLengthSid
InitializeAcl
AddAccessAllowedAce
SetSecurityDescriptorDacl
SetSecurityDescriptorGroup
SetSecurityDescriptorOwner
IsValidSecurityDescriptor
AccessCheck
RevertToSelf
shell32
ShellExecuteExA
SHFileOperationA
ShellExecuteA
comctl32
ord17
shlwapi
SHGetValueA
PathFindExtensionA
PathFindFileNameA
PathStripToRootA
PathIsUNCA
PathFileExistsA
SHSetValueA
PathRemoveFileSpecW
oledlg
ord8
ole32
OleInitialize
CoFreeUnusedLibraries
OleUninitialize
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoGetClassObject
CoInitializeEx
CoCreateInstance
CoUninitialize
CoRevokeClassObject
CLSIDFromProgID
CoTaskMemAlloc
CoTaskMemFree
CreateStreamOnHGlobal
OleIsCurrentClipboard
OleFlushClipboard
CoRegisterMessageFilter
CLSIDFromString
CoInitialize
oleaut32
OleLoadPicture
SystemTimeToVariantTime
VariantTimeToSystemTime
SafeArrayDestroy
VariantCopy
SysAllocStringLen
VariantInit
VariantChangeType
VariantClear
SysAllocStringByteLen
SysStringLen
SysFreeString
OleCreateFontIndirect
SysAllocString
Exports
Exports
Sections
.text Size: 577KB - Virtual size: 576KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
SPTD Size: 1024B - Virtual size: 921B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 236KB - Virtual size: 235KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 29KB - Virtual size: 117KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 284KB - Virtual size: 283KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ