Static task
static1
Behavioral task
behavioral1
Sample
de9b3c01991e357a349083f0db6af3e782f15e981e2bf0a16ba618252585923a.exe
Resource
win7-20230220-en
General
-
Target
de9b3c01991e357a349083f0db6af3e782f15e981e2bf0a16ba618252585923a
-
Size
319KB
-
MD5
2cc79806701f1a6e877c29b93f06f1bb
-
SHA1
261f2e39597ebff967e98e5a261166f9594ab632
-
SHA256
de9b3c01991e357a349083f0db6af3e782f15e981e2bf0a16ba618252585923a
-
SHA512
ac93609ecbbb474c64ec00a8ef864afde3d0064b0100b122f8a726f7b21cf8fb69740c5f66b0a68b3e91d4cd33fd997a04fb7cc4add919f19a93a33afb227995
-
SSDEEP
6144:hwGhBoTGz8Af7N1TY5837ogq3toQKLcHeAAdVr0Bm6A7wWFRKrERjGtoiea8y3fR:VhBoTGz8Af7N1TY5837ogq3toQKLcHeM
Malware Config
Signatures
Files
-
de9b3c01991e357a349083f0db6af3e782f15e981e2bf0a16ba618252585923a.exe windows x64
7f252ab32d95da3c51f0ac0ae737d3b1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
GetFileAttributesW
GlobalUnlock
GetLastError
GetCurrentDirectoryW
GlobalFree
CreateSemaphoreW
WriteFile
WaitForSingleObject
GlobalLock
CreateDirectoryW
LocalFree
DeleteCriticalSection
InitializeCriticalSection
GetCommandLineW
GetFullPathNameW
ReleaseSemaphore
SetFilePointer
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetStartupInfoA
Sleep
MultiByteToWideChar
ReadFile
FileTimeToSystemTime
WideCharToMultiByte
GetFileInformationByHandle
GetVolumeNameForVolumeMountPointW
CloseHandle
FindNextFileW
FindClose
EnterCriticalSection
VerifyVersionInfoW
CreateFileW
LeaveCriticalSection
FindFirstFileExW
VerSetConditionMask
DosDateTimeToFileTime
FileTimeToDosDateTime
GetProcAddress
LoadLibraryW
FreeLibrary
GlobalAlloc
SetErrorMode
user32
CreatePopupMenu
SendNotifyMessageA
SendMessageA
InvalidateRect
SetWindowTextA
SendMessageW
CreateMenu
EnableMenuItem
SetForegroundWindow
DestroyWindow
SetCursor
PostQuitMessage
IsIconic
GetWindowLongPtrW
SetMenu
IsWindowVisible
SetWindowLongPtrW
DestroyMenu
SetWindowTextW
CallWindowProcW
MoveWindow
TrackPopupMenu
DrawTextW
DrawEdge
CreateWindowExA
SetWindowPos
GetSysColorBrush
DeferWindowPos
BeginDeferWindowPos
EndDeferWindowPos
EndPaint
SetTimer
GetWindowRect
FillRect
MessageBoxA
DispatchMessageW
CheckMenuItem
DestroyIcon
InsertMenuItemA
GetSystemMetrics
MessageBoxW
CreateWindowExW
ShowWindow
ReleaseDC
SystemParametersInfoW
LoadIconW
RegisterClassExW
IsDialogMessageW
TranslateMessage
GetDC
LoadCursorW
KillTimer
DrawTextA
GetKeyState
GetClientRect
BeginPaint
OffsetRect
MonitorFromWindow
GetSysColor
GetCursorPos
GetMonitorInfoW
DefWindowProcW
CloseClipboard
SetFocus
EmptyClipboard
OpenClipboard
EnableWindow
SetClipboardData
GetMessageW
gdi32
CreateFontIndirectW
CreateSolidBrush
CreateCompatibleBitmap
CreateCompatibleDC
SetBkColor
DeleteDC
SetTextColor
BitBlt
SetBkMode
DeleteObject
GetTextMetricsW
SelectObject
comdlg32
GetOpenFileNameW
GetSaveFileNameW
shell32
CommandLineToArgvW
SHBrowseForFolderW
DragAcceptFiles
ShellExecuteW
SHGetPathFromIDListW
DragQueryFileW
DragFinish
SHGetFileInfoA
ole32
CLSIDFromString
CoTaskMemFree
CoTaskMemAlloc
CoUninitialize
CreateStreamOnHGlobal
OleInitialize
OleUninitialize
CoInitializeEx
msvcr90
?_type_info_dtor_internal_method@type_info@@QEAAXXZ
?terminate@@YAXXZ
__crt_debugger_hook
__set_app_type
_encode_pointer
_fmode
_commode
__setusermatherr
_configthreadlocale
_initterm_e
_initterm
_acmdln
exit
_cexit
_ismbblead
_exit
_XcptFilter
__C_specific_handler
__getmainargs
_amsg_exit
??3@YAXPEAX@Z
__dllonexit
_lock
_onexit
_decode_pointer
tanh
memcmp
cos
acos
floor
pow
ceil
sin
tan
tanf
log
_unlock
_wcslwr_s
sinf
_wcstoui64
realloc
wcsncpy_s
_wcsicmp
wcschr
_beginthreadex
wcsnlen
_wcsnicmp
wcscpy_s
_scwprintf
wcstombs_s
strchr
_wcsdup
memcpy_s
wcsstr
_endthreadex
free
malloc
swprintf_s
towlower
sprintf_s
gdiplus
GdipCloneImage
GdipDisposeImage
GdipAlloc
GdipLoadImageFromStreamICM
GdipFree
GdipLoadImageFromStream
GdipGetImageWidth
GdipSetInterpolationMode
GdipCreateFromHDC
GdipDrawImageI
GdipDrawImage
GdipScaleWorldTransform
GdipGetImageHeight
GdiplusStartup
GdiplusShutdown
GdipDeleteGraphics
esent
JetTerm
JetMove
JetRetrieveColumns
JetOpenTable
JetCloseTable
JetEndSession
JetDetachDatabase
JetBeginSession
JetGetSystemParameter
JetOpenDatabase
JetInit
JetCloseDatabase
JetAttachDatabase
JetGetTableColumnInfo
JetCreateInstance
JetSetSystemParameter
Sections
.text Size: 209KB - Virtual size: 208KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 80KB - Virtual size: 79KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 156B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ