Static task
static1
Behavioral task
behavioral1
Sample
38a8b75fa2196224795a2a1721c0a96c9bdb582d0baa3c95d9c14d7bf00edb10.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
38a8b75fa2196224795a2a1721c0a96c9bdb582d0baa3c95d9c14d7bf00edb10.exe
Resource
win10v2004-20220812-en
General
-
Target
38a8b75fa2196224795a2a1721c0a96c9bdb582d0baa3c95d9c14d7bf00edb10
-
Size
2.6MB
-
MD5
354072179e49590ab4df71f85ef60a93
-
SHA1
db31b3e1d82d4ebb0bbab062b29fddb9019a6345
-
SHA256
38a8b75fa2196224795a2a1721c0a96c9bdb582d0baa3c95d9c14d7bf00edb10
-
SHA512
23bc55079a96c141dcf05e2f81a2ce1c3a86a56a6048cfc39cf8e4c1668b5903624b738fc0b8003764f410b1c8b3cf10dc3a464a8a0d6890ce7b740c256c6415
-
SSDEEP
49152:jUw0md1gPIMRi5Tyz2zP6uUlAmUp/XtqVqQB3tJ00e5uAaRKz40ZI/:Vd1gPIZP6uwAmmdwVBoFuAaF0o
Malware Config
Signatures
Files
-
38a8b75fa2196224795a2a1721c0a96c9bdb582d0baa3c95d9c14d7bf00edb10.exe windows x86
bc1e3206e257e0bb7143eaa8e84613b5
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
version
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
kernel32
MultiByteToWideChar
LoadLibraryExW
GetModuleFileNameW
CreateProcessW
WritePrivateProfileStringW
GetPrivateProfileStringW
GetTempPathW
GetLocalTime
GetCurrentProcessId
DeviceIoControl
FindClose
FindNextFileW
CopyFileW
FindFirstFileW
GetLogicalDriveStringsW
GetSystemDirectoryW
GetFileAttributesW
GetExitCodeProcess
RemoveDirectoryW
DeleteFileW
GetTempFileNameW
lstrcatW
InterlockedExchange
MoveFileExW
MoveFileW
SetCurrentDirectoryW
GetCurrentDirectoryW
SetThreadPriority
ResumeThread
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
OpenProcess
CreateMutexW
ReadFile
GetFileSize
TlsFree
ReleaseMutex
CreateMutexA
GetModuleHandleA
LoadLibraryA
ProcessIdToSessionId
Thread32Next
SuspendThread
OpenThread
Thread32First
GlobalMemoryStatus
SystemTimeToFileTime
FileTimeToSystemTime
SetEnvironmentVariableW
WritePrivateProfileSectionW
QueryDosDeviceW
ReadProcessMemory
Module32NextW
Module32FirstW
GetPrivateProfileIntW
InterlockedCompareExchange
GetFileAttributesExW
TlsSetValue
TlsGetValue
GetCommandLineW
GetLongPathNameW
lstrcmpW
GetACP
FlushInstructionCache
GetPrivateProfileSectionW
GetTimeZoneInformation
SetFilePointer
GetStringTypeA
InitializeCriticalSectionAndSpinCount
FreeLibrary
GetLocaleInfoW
SetConsoleCtrlHandler
GetConsoleMode
GetConsoleCP
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
LCMapStringA
GetStartupInfoA
GetFileType
SetHandleCount
GetDateFormatA
GetTimeFormatA
LCMapStringW
IsValidCodePage
GetOEMCP
GetCPInfo
ExitProcess
HeapCreate
FatalAppExitA
GetModuleFileNameA
GetStdHandle
GetCurrentThread
TlsAlloc
GetStartupInfoW
ExitThread
GetSystemTimeAsFileTime
RtlUnwind
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
IsProcessorFeaturePresent
GetProcessHeap
HeapSize
HeapReAlloc
HeapFree
HeapAlloc
HeapDestroy
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
CreateFileA
SetStdHandle
SetLastError
InterlockedDecrement
FlushFileBuffers
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEndOfFile
CompareStringA
lstrlenW
SetEnvironmentVariableA
FreeResource
LocalFileTimeToFileTime
SetFilePointerEx
InterlockedIncrement
GetLastError
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
GetFileSizeEx
OutputDebugStringW
HeapUnlock
HeapLock
HeapWalk
SetFileTime
lstrcpyW
AreFileApisANSI
WideCharToMultiByte
Sleep
FindResourceExW
FindResourceW
LoadResource
LockResource
SizeofResource
RaiseException
GetWindowsDirectoryW
LoadLibraryW
GetCurrentThreadId
lstrcmpiW
CreateThread
WaitForSingleObject
TerminateThread
ExpandEnvironmentStringsW
CreateFileW
WriteFile
CloseHandle
GetDriveTypeW
GetDiskFreeSpaceExW
GetVersionExW
GetVersion
GetModuleHandleW
GetProcAddress
CompareStringW
GetLocaleInfoA
GetTickCount
CreateDirectoryW
SetFileAttributesW
DeleteCriticalSection
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
GetCurrentProcess
TerminateProcess
GetStringTypeW
user32
RegisterClassExW
MoveWindow
GetWindowRgn
EnumThreadWindows
GetSysColor
WindowFromPoint
GetSystemMetrics
SwitchToThisWindow
SetForegroundWindow
UnregisterClassA
BringWindowToTop
SendMessageTimeoutW
FindWindowW
SetCursor
FillRect
PtInRect
ReleaseCapture
GetCapture
GetDlgCtrlID
SetCapture
IsWindowEnabled
UpdateWindow
CallWindowProcW
CreateDialogParamW
SetRectEmpty
WaitForInputIdle
CharLowerBuffW
LoadCursorW
DestroyCursor
DefWindowProcW
PeekMessageW
GetMessageW
TranslateMessage
DispatchMessageW
LoadImageW
GetClassNameW
CreateCursor
PostQuitMessage
OffsetRect
CharNextW
GetCursorPos
LoadStringW
DrawTextW
GetWindow
SystemParametersInfoW
MapWindowPoints
IsWindow
AdjustWindowRectEx
IsDialogMessageW
MessageBoxW
GetDlgItem
GetParent
ChildWindowFromPoint
SetDlgItemTextW
GetDlgItemTextW
SetFocus
EnableWindow
KillTimer
SetTimer
ShowWindow
InvalidateRect
ReleaseDC
GetWindowDC
GetDC
EndPaint
BeginPaint
ScreenToClient
GetWindowRect
GetMenu
GetWindowTextLengthW
GetWindowTextW
SetWindowTextW
PostMessageW
GetWindowLongW
CreateWindowExW
SetWindowLongW
DestroyWindow
SendMessageW
ExitWindowsEx
SetWindowPos
GetClientRect
ClientToScreen
gdi32
GetPixel
DeleteDC
Rectangle
SetTextColor
SetBkMode
GetStockObject
CreateFontIndirectW
GetObjectW
DeleteObject
CreateCompatibleDC
CreateCompatibleBitmap
SelectObject
StretchBlt
CreatePen
CreateBrushIndirect
PtInRegion
CreateRectRgn
CreateDIBSection
BitBlt
SetStretchBltMode
advapi32
LookupPrivilegeValueW
AdjustTokenPrivileges
RegQueryValueExA
RegOpenKeyExW
RegQueryValueExW
RegDeleteValueW
RegEnumValueW
RegDeleteKeyW
RegCreateKeyExW
RegSetValueExW
RegCloseKey
OpenProcessToken
EqualSid
IsValidSid
FreeSid
AllocateAndInitializeSid
GetTokenInformation
GetUserNameW
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
RegEnumKeyExW
RegQueryInfoKeyW
shell32
SHGetSpecialFolderPathW
CommandLineToArgvW
SHGetPathFromIDListW
SHBrowseForFolderW
SHGetSpecialFolderLocation
ShellExecuteW
SHFileOperationW
ord165
SHGetFolderPathW
SHCreateDirectoryExW
SHChangeNotify
ShellExecuteExW
ole32
CoTaskMemAlloc
CoTaskMemFree
CoCreateInstance
CoInitialize
CoUninitialize
CoTaskMemRealloc
oleaut32
VarUI4FromStr
SysFreeString
SysAllocString
shlwapi
StrCmpNIW
SHDeleteKeyW
SHDeleteValueW
StrCmpNW
PathRemoveFileSpecW
SHSetValueW
PathFindFileNameW
PathAppendW
StrStrIW
PathCombineW
PathAddBackslashW
PathRemoveBackslashW
PathIsDirectoryW
PathFileExistsW
SHGetValueW
comctl32
_TrackMouseEvent
ImageList_Destroy
InitCommonControlsEx
ImageList_GetIconSize
ws2_32
closesocket
htons
socket
gethostbyname
connect
WSAStartup
setupapi
SetupIterateCabinetW
psapi
GetModuleFileNameExW
wintrust
WinVerifyTrust
WTHelperProvDataFromStateData
crypt32
CertGetNameStringW
wininet
InternetCloseHandle
InternetReadFile
InternetOpenUrlW
InternetOpenW
msimg32
AlphaBlend
Sections
.text Size: 637KB - Virtual size: 637KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 117KB - Virtual size: 117KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 14KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 52.2MB - Virtual size: 52.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ