Static task
static1
Behavioral task
behavioral1
Sample
1885d47054ddfabd11cab15ea0174eec64b4e35808161cb612ae920de753b970.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
1885d47054ddfabd11cab15ea0174eec64b4e35808161cb612ae920de753b970.exe
Resource
win10v2004-20221111-en
General
-
Target
1885d47054ddfabd11cab15ea0174eec64b4e35808161cb612ae920de753b970
-
Size
1.9MB
-
MD5
24a8b2854658a3650dddddb9f0ac17fe
-
SHA1
f0775d7d0b2416faa333c43d22d14deb92d1d05c
-
SHA256
1885d47054ddfabd11cab15ea0174eec64b4e35808161cb612ae920de753b970
-
SHA512
9202c1dae8570a3fda87fa33a2ca8c5222e33f7366c45d66c4155bbfcdd13345b45c96609de6527768d4d4ecc9db82fc3e3c66c7a8899d69c479eb2ca2ec4b55
-
SSDEEP
49152:gI70q/Y38ldZzphDZA18Uu0k9SFryQ3LZ/grnyZbAJLXqYo:gm5FnZ3C17u0kcFrXLEJO
Malware Config
Signatures
Files
-
1885d47054ddfabd11cab15ea0174eec64b4e35808161cb612ae920de753b970.exe windows x86
7f1de2ce7875d25f54ffb5a414a86e1e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
UnlockFile
DuplicateHandle
MoveFileW
FileTimeToSystemTime
SetErrorMode
FileTimeToLocalFileTime
GetFileAttributesW
GetFileAttributesExW
GetFileSizeEx
GetFileTime
SetFileTime
GetTickCount
CreateThread
ExitThread
MoveFileExW
RtlUnwind
GetModuleHandleExW
IsDebuggerPresent
IsProcessorFeaturePresent
HeapQueryInformation
GetSystemInfo
VirtualAlloc
VirtualProtect
VirtualQuery
GetStdHandle
GetFileType
GetStartupInfoW
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetEnvironmentStringsW
FreeEnvironmentStringsW
UnhandledExceptionFilter
IsValidCodePage
GetOEMCP
GetCPInfo
SetConsoleCtrlHandler
GetStringTypeW
GetTimeZoneInformation
SetFilePointer
GetConsoleMode
SetFilePointerEx
LCMapStringW
SetStdHandle
WriteConsoleW
ReadConsoleW
SetEnvironmentVariableA
SetEndOfFile
ReadFile
LockFile
GetVolumeInformationW
GlobalMemoryStatus
SetConsoleMode
DeviceIoControl
GetTempPathW
CreateDirectoryW
RemoveDirectoryW
GetLogicalDriveStringsW
FileTimeToDosDateTime
VirtualFree
CompareFileTime
OpenEventW
OpenFileMappingW
SetProcessAffinityMask
GetProcessTimes
SetFileApisToOEM
GetConsoleScreenBufferInfo
GetFileInformationByHandle
FindNextFileW
FindFirstFileExW
GetFullPathNameW
GetFileSize
FlushFileBuffers
FindFirstFileW
FindClose
GetThreadLocale
GlobalFlags
GetUserDefaultUILanguage
GetSystemDefaultUILanguage
GetLocaleInfoW
CompareStringW
GetCurrentDirectoryW
LocalReAlloc
LocalAlloc
GlobalHandle
GlobalReAlloc
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InitializeCriticalSection
GlobalFindAtomW
LoadLibraryA
GetSystemDirectoryW
EncodePointer
FormatMessageW
MulDiv
LocalFree
GlobalAddAtomW
WritePrivateProfileStringW
GetPrivateProfileIntW
SetEvent
GlobalUnlock
GlobalFree
lstrcmpA
GlobalDeleteAtom
GlobalLock
GlobalAlloc
LoadLibraryExW
FreeLibrary
GetVersionExW
GetCurrentThread
LoadLibraryW
GetProcAddress
GetModuleHandleW
GetModuleHandleA
GetACP
WideCharToMultiByte
MultiByteToWideChar
DeleteFileW
GetCommandLineW
CopyFileW
SetFileAttributesW
OutputDebugStringW
SetCurrentDirectoryW
GetPrivateProfileStringW
ExitProcess
FindResourceW
LockResource
GetModuleFileNameW
GetDiskFreeSpaceW
CreateProcessW
lstrcmpW
WriteFile
OutputDebugStringA
FreeResource
LoadResource
SizeofResource
FindResourceA
Sleep
CreateMutexW
SetLastError
SetUnhandledExceptionFilter
GetCommandLineA
Process32NextW
TerminateProcess
OpenProcess
Process32FirstW
CreateToolhelp32Snapshot
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
CreateFileW
OpenFileMappingA
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
CloseHandle
WaitForSingleObject
DeleteCriticalSection
DecodePointer
EnterCriticalSection
HeapSize
GetLastError
RaiseException
LeaveCriticalSection
HeapReAlloc
InitializeCriticalSectionAndSpinCount
GetProcessHeap
HeapFree
HeapAlloc
GetConsoleCP
user32
PtInRect
EqualRect
CopyRect
GetSysColor
MapWindowPoints
ScreenToClient
AdjustWindowRectEx
GetWindowRect
RemovePropW
GetPropW
SetPropW
RedrawWindow
SetForegroundWindow
GetForegroundWindow
UpdateWindow
SetMenu
GetMenu
GetCapture
IsChild
CreateWindowExW
GetClassInfoExW
GetClassInfoW
RegisterClassW
CallWindowProcW
DefWindowProcW
GetMessageTime
GetMessagePos
RegisterWindowMessageW
IsDialogMessageW
SetWindowLongW
GetWindowTextW
SetWindowTextW
GetClassLongW
GetDlgCtrlID
SetDlgItemTextW
MoveWindow
UnhookWindowsHookEx
GrayStringW
GetMenuItemCount
GetMenuItemID
GetSubMenu
wsprintfW
UnregisterClassW
ShowWindow
PostMessageW
SetCursor
CallNextHookEx
SetWindowsHookExW
GetCursorPos
ValidateRect
GetKeyState
IsWindowVisible
PeekMessageW
DispatchMessageW
TranslateMessage
GetMessageW
LoadBitmapW
SetMenuItemInfoW
TabbedTextOutW
GetDC
GetWindowDC
ReleaseDC
RealChildWindowFromPoint
BeginPaint
EndPaint
ClientToScreen
GetMenuCheckMarkDimensions
SetMenuItemBitmaps
GetClassNameW
GetTopWindow
WinHelpW
MonitorFromWindow
GetMonitorInfoW
DrawTextW
SetFocus
DrawTextExW
LoadIconW
SendMessageW
SetTimer
IsIconic
GetSystemMetrics
GetClientRect
DrawIcon
EnableWindow
SendDlgItemMessageA
GetParent
PostQuitMessage
IsWindowEnabled
MessageBoxW
GetWindowLongW
GetWindowThreadProcessId
GetLastActivePopup
SetWindowPos
SetWindowContextHelpId
GetWindow
MapDialogRect
IsWindow
DestroyWindow
CreateDialogIndirectParamW
EndDialog
GetDlgItem
GetNextDlgTabItem
GetActiveWindow
SetActiveWindow
GetDesktopWindow
GetFocus
CheckMenuItem
EnableMenuItem
SetCapture
LoadCursorW
PostThreadMessageW
RegisterClipboardFormatW
DestroyMenu
CharUpperW
GetSysColorBrush
MessageBeep
GetNextDlgGroupItem
IsRectEmpty
IntersectRect
SetRect
InvalidateRgn
CopyAcceleratorTableW
OffsetRect
CharNextW
InvalidateRect
KillTimer
ReleaseCapture
gdi32
GetStockObject
GetViewportExtEx
GetWindowExtEx
PtVisible
RectVisible
RestoreDC
SaveDC
ExtSelectClipRgn
SelectObject
SetMapMode
GetClipBox
TextOutW
SetViewportExtEx
SetViewportOrgEx
SetWindowExtEx
OffsetViewportOrgEx
ScaleViewportExtEx
ScaleWindowExtEx
GetBkColor
GetTextColor
CreateRectRgnIndirect
GetRgnBox
GetMapMode
Escape
DeleteObject
GetObjectW
SetTextColor
SetBkColor
GetDeviceCaps
ExtTextOutW
CreateBitmap
DeleteDC
winspool.drv
DocumentPropertiesW
OpenPrinterW
ClosePrinter
advapi32
SetFileSecurityW
OpenProcessToken
LookupPrivilegeValueW
AdjustTokenPrivileges
RegEnumValueW
RegQueryValueW
RegEnumKeyW
RegSetValueExW
RegDeleteValueW
RegDeleteKeyW
RegCreateKeyExW
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
GetFileSecurityW
shell32
ShellExecuteW
CommandLineToArgvW
SHGetSpecialFolderPathW
comctl32
InitCommonControlsEx
shlwapi
PathIsUNCW
PathFindFileNameW
PathFindExtensionW
PathStripPathW
PathAppendW
PathFileExistsW
PathRemoveFileSpecW
PathStripToRootW
ole32
CreateILockBytesOnHGlobal
StgOpenStorageOnILockBytes
StgCreateDocfileOnILockBytes
CoGetClassObject
CoFreeUnusedLibraries
OleInitialize
CoTaskMemFree
CoTaskMemAlloc
CoInitialize
CoCreateInstance
CLSIDFromProgID
CLSIDFromString
CoCreateGuid
CoUninitialize
OleUninitialize
CoRevokeClassObject
OleFlushClipboard
OleIsCurrentClipboard
CoRegisterMessageFilter
oleaut32
SafeArrayDestroy
VariantTimeToSystemTime
SystemTimeToVariantTime
OleCreateFontIndirect
VariantChangeType
VariantClear
VariantInit
SysStringByteLen
SysAllocStringLen
SysAllocString
SysFreeString
VariantCopy
SysStringLen
oledlg
OleUIBusyW
dbghelp
MiniDumpWriteDump
oleacc
LresultFromObject
CreateStdAccessibleObject
Sections
.text Size: 717KB - Virtual size: 717KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 131KB - Virtual size: 131KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 35.3MB - Virtual size: 35.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 34KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ