Static task
static1
Behavioral task
behavioral1
Sample
f5d9cbaf8a7b138903bd6503fa2c0b0304ef21d48354c0b3ca51b9eac50323c0.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
f5d9cbaf8a7b138903bd6503fa2c0b0304ef21d48354c0b3ca51b9eac50323c0.exe
Resource
win10v2004-20230221-en
General
-
Target
f5d9cbaf8a7b138903bd6503fa2c0b0304ef21d48354c0b3ca51b9eac50323c0
-
Size
831KB
-
MD5
f0ebd1052606502a6582094b6d01a6b8
-
SHA1
80e5540c7eb233a711230d33cf15ad0b4754d5e4
-
SHA256
f5d9cbaf8a7b138903bd6503fa2c0b0304ef21d48354c0b3ca51b9eac50323c0
-
SHA512
971dfffdebea15791e413a542777ceff8795193228f41afe1346e99b810f6d8151ef635a234fa4066fbfc46f4c55a3aefb017a830e0f1ca01eac794433580b07
-
SSDEEP
12288:wc34GJOGzzArGDXxIhlZyCXEjVk6ZePRaz7itK915qR5h9uqw73cDrQ1YKXvTWRx:d34GvwlZvTtjPbufrmr1KfP8sK
Malware Config
Signatures
Files
-
f5d9cbaf8a7b138903bd6503fa2c0b0304ef21d48354c0b3ca51b9eac50323c0.exe windows x86
17ae9180fac4e566babeb3e324231d1c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FreeResource
SetLastError
DeleteTimerQueueTimer
GetDiskFreeSpaceExW
lstrcmpW
OutputDebugStringW
lstrcmpA
CreateToolhelp32Snapshot
GetCurrentProcess
Process32FirstW
Process32NextW
GetLogicalDriveStringsW
QueryDosDeviceW
WaitForSingleObject
TerminateProcess
GetCurrentProcessId
FindClose
GetFullPathNameW
FindFirstFileW
lstrlenW
SetFileAttributesW
DeleteFileW
FindNextFileW
RemoveDirectoryW
ExitProcess
VirtualProtect
MoveFileExW
Sleep
SetEnvironmentVariableW
LocalFree
GetCommandLineW
GetTempFileNameW
GetLogicalDrives
GetDriveTypeW
LocalAlloc
lstrcpyA
lstrcpyW
lstrlenA
MulDiv
GetProfileIntA
GlobalAlloc
GlobalLock
WriteConsoleW
SetStdHandle
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetOEMCP
IsValidCodePage
FindFirstFileExW
CreatePipe
GetFileAttributesExW
GetExitCodeProcess
FlushFileBuffers
InterlockedDecrement
HeapDestroy
ReadConsoleW
GetConsoleMode
GetConsoleCP
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetTimeFormatW
GetDateFormatW
GetFileType
HeapReAlloc
GetStdHandle
CreateProcessA
DuplicateHandle
GetTempPathW
QueryPerformanceFrequency
FreeLibraryAndExitThread
ExitThread
CreateThread
RtlUnwind
SetFileTime
CreateDirectoryW
QueryPerformanceCounter
GetStartupInfoW
SetUnhandledExceptionFilter
UnhandledExceptionFilter
WaitForSingleObjectEx
ResetEvent
SetEvent
FormatMessageA
GetModuleFileNameA
GetCPInfo
GetLocaleInfoW
LCMapStringW
CompareStringW
GetSystemTimeAsFileTime
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
CreateEventW
GetStringTypeW
LoadLibraryExA
VirtualFree
VirtualAlloc
IsProcessorFeaturePresent
FlushInstructionCache
InterlockedPushEntrySList
InterlockedPopEntrySList
InitializeSListHead
IsDebuggerPresent
InterlockedIncrement
DeleteCriticalSection
lstrcmpiW
InitializeCriticalSectionAndSpinCount
GetCurrentThreadId
EnterCriticalSection
RaiseException
LeaveCriticalSection
ExpandEnvironmentStringsW
GetVersionExW
MultiByteToWideChar
WideCharToMultiByte
WinExec
FreeLibrary
OpenProcess
GetLastError
CreateMutexW
GetProcessHeap
HeapAlloc
GetTimeZoneInformation
HeapFree
FindResourceExW
FindResourceW
GetFileAttributesW
LoadResource
LockResource
SizeofResource
SetFilePointerEx
SetFilePointer
CloseHandle
WriteFile
ReadFile
CreateFileW
GetModuleFileNameW
GetModuleHandleExW
GetSystemDirectoryW
LoadLibraryW
SetCurrentDirectoryW
GetCurrentDirectoryW
LoadLibraryExW
GetModuleHandleW
GetACP
HeapSize
GetProcAddress
SetEndOfFile
user32
SetWindowPos
GetSystemMetrics
LoadImageW
GetWindowThreadProcessId
SendMessageW
SetWindowLongW
GetWindowLongW
SetWindowTextW
MapWindowPoints
GetClientRect
GetParent
GetWindowRect
GetMonitorInfoW
MonitorFromWindow
GetWindow
SetTimer
PostMessageW
SwitchToThisWindow
PtInRect
GetDC
ReleaseDC
UpdateLayeredWindow
IsDialogMessageW
PostQuitMessage
GetCursorPos
ScreenToClient
SetCursor
LoadCursorW
DestroyWindow
KillTimer
EndDialog
CharNextW
DefWindowProcW
GetClassInfoW
RegisterClassW
ShowWindow
DispatchMessageW
TranslateMessage
GetMessageW
PeekMessageW
UnregisterClassW
CreateDialogParamW
MessageBoxW
EnableWindow
BringWindowToTop
GetActiveWindow
ReleaseCapture
FindWindowW
SetCapture
EnumWindows
LoadStringW
ExitWindowsEx
IsRectEmpty
IsIconic
GetCaretPos
OffsetRect
DestroyCursor
ClientToScreen
ScrollWindowEx
SetCaretPos
HideCaret
ShowCaret
CreateCaret
UpdateWindow
SetScrollPos
SetScrollRange
EnableScrollBar
ShowScrollBar
InvalidateRect
InflateRect
IntersectRect
GetFocus
GetDlgItem
GetKeyState
GetDesktopWindow
GetDoubleClickTime
GetSysColor
gdi32
DPtoLP
CreateRectRgn
ExtSelectClipRgn
BitBlt
GetTextMetricsW
GdiSetBatchLimit
GetDeviceCaps
GetObjectW
GetStockObject
CreateDIBSection
DeleteObject
SelectObject
CreateCompatibleDC
DeleteDC
CreateFontIndirectW
advapi32
OpenProcessToken
SetSecurityDescriptorDacl
ControlService
StartServiceW
QueryServiceStatus
OpenServiceW
OpenSCManagerW
CloseServiceHandle
AdjustTokenPrivileges
LookupPrivilegeValueW
RegDeleteValueW
RegCreateKeyExW
RegSetValueExW
RegOpenKeyExW
RegEnumKeyExW
RegCloseKey
RegDeleteKeyW
RegQueryValueExW
RegEnumValueW
RegQueryInfoKeyW
InitializeSecurityDescriptor
shell32
SHFileOperationW
ShellExecuteExW
ord165
SHGetPathFromIDListW
CommandLineToArgvW
ShellExecuteW
SHGetSpecialFolderPathW
SHBrowseForFolderW
ole32
CoTaskMemFree
CoTaskMemRealloc
CoTaskMemAlloc
CoUninitialize
CreateStreamOnHGlobal
RegisterDragDrop
RevokeDragDrop
OleUninitialize
OleInitialize
CoInitialize
CoCreateInstance
oleaut32
SysFreeString
VarUI4FromStr
shlwapi
PathCombineW
PathIsURLW
PathRemoveFileSpecW
SHDeleteValueW
SHSetValueW
PathGetDriveNumberW
PathRemoveBackslashW
PathFileExistsW
PathIsDirectoryW
comctl32
InitCommonControlsEx
_TrackMouseEvent
msimg32
AlphaBlend
gdiplus
GdipCreateFromHDC
GdipFillRectangleI
GdipReleaseDC
GdipGetDC
GdipGetClipBoundsI
GdipGetImageHeight
GdipSetInterpolationMode
GdipGetInterpolationMode
GdipLoadImageFromStream
GdipDisposeImage
GdipCloneImage
GdipResetClip
GdipSetClipRect
GdipDeleteFont
GdipCreateFontFamilyFromName
GdipDeleteFontFamily
GdipGetGenericFontFamilySansSerif
GdipCreateFont
GdipCloneBrush
GdipDeleteBrush
GdipCreateSolidFill
GdipDrawImagePointRectI
GdipDrawString
GdipSetTextRenderingHint
GdipGetTextRenderingHint
GdipGetImageWidth
GdipSetImageAttributesColorMatrix
GdipDisposeImageAttributes
GdipCreateImageAttributes
GdipDrawImageRectRect
GdipFree
GdipAlloc
GdiplusShutdown
GdiplusStartup
GdipDeleteGraphics
wintrust
WinVerifyTrust
version
GetFileVersionInfoW
GetFileVersionInfoSizeW
VerQueryValueW
psapi
GetProcessImageFileNameW
imm32
ImmGetContext
ImmSetCompositionWindow
ImmReleaseContext
Sections
.text Size: 523KB - Virtual size: 523KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 131KB - Virtual size: 131KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 83.9MB - Virtual size: 83.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ