Static task
static1
Behavioral task
behavioral1
Sample
c97d926ef490f2d9a4bec707c01b0ceb7c8fff60efe998bd74ab0d90ff733043.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c97d926ef490f2d9a4bec707c01b0ceb7c8fff60efe998bd74ab0d90ff733043.exe
Resource
win10v2004-20221111-en
General
-
Target
c97d926ef490f2d9a4bec707c01b0ceb7c8fff60efe998bd74ab0d90ff733043
-
Size
3.2MB
-
MD5
7751369b2ea265dfb5b8ae6515e8dc59
-
SHA1
01395b1f0d8887d282899337f99089e36ce694e8
-
SHA256
c97d926ef490f2d9a4bec707c01b0ceb7c8fff60efe998bd74ab0d90ff733043
-
SHA512
a6282eae7e2868e3219da0e0fa6784af5ff07a861798b5736ac3ff5166a076e2e7d5ff815bbf3ef46d9c996095458f2090c806d6f71b2a2477a4e3914eef37e3
-
SSDEEP
49152:IpvSTNdhJZ6cX9R+lu81icwZGXmB3YZu5VcbDK1q:iSBdht3YZu5Vx1q
Malware Config
Signatures
Files
-
c97d926ef490f2d9a4bec707c01b0ceb7c8fff60efe998bd74ab0d90ff733043.exe windows x86
e934fb9b44cb7070ca9a00cf3d979a1b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapFree
HeapAlloc
GetStartupInfoA
GetCommandLineA
ExitProcess
HeapReAlloc
RaiseException
GetTimeZoneInformation
HeapSize
UnhandledExceptionFilter
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
ExitThread
SetStdHandle
LCMapStringA
LCMapStringW
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
CreateFileW
CompareStringA
CompareStringW
SetEnvironmentVariableA
CreateThread
GetProfileStringA
GetDriveTypeA
RtlUnwind
MoveFileA
SetEndOfFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
CreateFileA
SetErrorMode
FileTimeToLocalFileTime
FileTimeToSystemTime
GetOEMCP
GetCPInfo
GetProcessVersion
TlsGetValue
LocalReAlloc
TlsSetValue
GlobalReAlloc
TlsFree
GlobalHandle
TlsAlloc
LocalAlloc
SizeofResource
GlobalFlags
LocalFree
lstrcpynA
MulDiv
SetLastError
lstrcmpA
ResumeThread
lstrlenA
InterlockedDecrement
InterlockedIncrement
GetVersion
lstrcatA
GlobalGetAtomNameA
lstrcmpiA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
lstrcpyA
GetModuleHandleA
GlobalLock
GlobalUnlock
LockResource
FindResourceA
LoadResource
GetACP
GetCurrentThreadId
GetFullPathNameA
GetCurrentDirectoryA
SetFileAttributesA
GetPrivateProfileStringA
GetTempPathA
DeleteFileA
GetTickCount
GetCurrentThread
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
MultiByteToWideChar
WideCharToMultiByte
WinExec
GetWindowsDirectoryA
GetLocalTime
GetCurrentProcess
CloseHandle
TerminateProcess
CreateDirectoryA
GetModuleFileNameA
GlobalAlloc
GlobalFree
Sleep
FindFirstFileA
FindNextFileA
FindClose
GetPrivateProfileIntA
GetVersionExA
FreeLibrary
LoadLibraryA
GetProcAddress
CreateMutexA
GetLastError
WritePrivateProfileStringA
GetFileType
user32
ShowWindow
CheckMenuItem
SetMenuItemBitmaps
ModifyMenuA
GetMenuState
LoadBitmapA
GetMenuCheckMarkDimensions
ValidateRect
GetMessageA
GetAsyncKeyState
MapDialogRect
PostQuitMessage
GetWindowDC
BeginPaint
EndPaint
TabbedTextOutA
DrawTextA
GrayStringA
LoadStringA
GetClassNameA
GetSysColorBrush
UpdateWindow
SendDlgItemMessageA
MapWindowPoints
GetFocus
SetFocus
AdjustWindowRectEx
IsWindowVisible
GetTopWindow
MessageBoxA
GetCapture
WinHelpA
wsprintfA
GetClassInfoA
RegisterClassA
GetMenu
GetMenuItemCount
GetMenuItemID
TrackPopupMenu
MoveWindow
GetWindowTextLengthA
GetWindowTextA
GetDlgCtrlID
DefWindowProcA
CreateWindowExA
SetWindowsHookExA
CallNextHookEx
SetPropA
UnhookWindowsHookEx
GetPropA
CallWindowProcA
RemovePropA
GetMessageTime
GetLastActivePopup
GetForegroundWindow
SetForegroundWindow
GetWindow
SetWindowPos
IntersectRect
SystemParametersInfoA
GetWindowPlacement
EndDialog
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
GetDlgItem
IsWindowEnabled
LoadCursorA
CopyIcon
RedrawWindow
IsWindow
GetMessagePos
ScreenToClient
PtInRect
SetTimer
MessageBeep
SetWindowLongA
KillTimer
RegisterWindowMessageA
FrameRect
LoadImageA
GetSysColor
DrawStateA
OffsetRect
CopyRect
InflateRect
DrawFocusRect
TrackPopupMenuEx
PostMessageA
ClientToScreen
WindowFromPoint
SendMessageA
UnregisterClassA
HideCaret
ShowCaret
ExcludeUpdateRgn
DefDlgProcA
CharNextA
IsWindowUnicode
LoadIconA
GetActiveWindow
SetCursor
GetParent
GetNextDlgTabItem
GetWindowLongA
DestroyIcon
DestroyCursor
DestroyMenu
GetDC
GetIconInfo
CreateIconIndirect
ReleaseDC
FillRect
InvalidateRect
SetWindowTextA
IsDialogMessageA
SetDlgItemTextA
GetDlgItemTextA
GetWindowRect
GetKeyState
GetCursorPos
LoadMenuA
EnableMenuItem
GetSubMenu
PeekMessageA
TranslateMessage
DispatchMessageA
IsIconic
GetSystemMetrics
GetClientRect
DrawIcon
EnableWindow
GetClassLongA
gdi32
SetBkMode
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
IntersectClipRect
MoveToEx
LineTo
GetDeviceCaps
CreatePen
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
RestoreDC
SaveDC
PatBlt
GetClipBox
GetTextCharset
GetFontData
GetTextExtentPoint32A
CreateSolidBrush
CreateFontIndirectA
GetObjectA
GetPixel
SetPixel
CreateBitmap
SelectObject
SetBkColor
SetTextColor
DeleteDC
BitBlt
CreateCompatibleDC
GetStockObject
GetDIBits
CreateCompatibleBitmap
SetDIBits
CreateDIBitmap
GetTextExtentPointA
DeleteObject
comdlg32
ChooseColorA
GetOpenFileNameA
GetSaveFileNameA
winspool.drv
DocumentPropertiesA
ClosePrinter
OpenPrinterA
advapi32
RegCloseKey
RegQueryValueA
RegOpenKeyExA
RegEnumValueA
RegCreateKeyExA
RegSetValueExA
shell32
ShellExecuteExA
SHBrowseForFolderA
SHGetPathFromIDListA
DragQueryFileA
SHGetSpecialFolderPathA
ShellExecuteA
comctl32
_TrackMouseEvent
ord17
PropertySheetA
DestroyPropertySheetPage
CreatePropertySheetPageA
ImageList_Destroy
winmm
PlaySoundA
Sections
.text Size: 2.4MB - Virtual size: 2.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 284KB - Virtual size: 283KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 452KB - Virtual size: 475KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 88KB - Virtual size: 87KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ