Static task
static1
Behavioral task
behavioral1
Sample
3f18f52b02f045e47197cb7b946200894756dae1c0f1510884ec9b0cb8e046b2.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
3f18f52b02f045e47197cb7b946200894756dae1c0f1510884ec9b0cb8e046b2.exe
Resource
win10v2004-20230220-en
General
-
Target
3f18f52b02f045e47197cb7b946200894756dae1c0f1510884ec9b0cb8e046b2
-
Size
1.6MB
-
MD5
88029ba38cd4fd47abf1642b6ce244bc
-
SHA1
1934404514726923ff034c8cb19e87a49c8e346b
-
SHA256
3f18f52b02f045e47197cb7b946200894756dae1c0f1510884ec9b0cb8e046b2
-
SHA512
c516ec55c490b833cfa7f1c6ccb823008d2118376ff0e7d4752a6eac8c6ad2b432b872c213c34175551647c160a73f24c351992ca3c0a3eba1703907d7ba6554
-
SSDEEP
24576:lxkW1Amub4RP5EM5yVaX1PXocKKfWk8m99PGBQbgiHMYrTv6zKiwE:lx9VEM5SRcKKuvkgBQkyTv6DwE
Malware Config
Signatures
Files
-
3f18f52b02f045e47197cb7b946200894756dae1c0f1510884ec9b0cb8e046b2.exe windows x86
e4dc60bf9cd0ba4fd024e0381fc43466
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateFileA
RemoveDirectoryW
lstrcatW
DeviceIoControl
GetCurrentProcessId
CreateProcessW
LoadLibraryExW
lstrcmpiW
CreateDirectoryW
WriteFile
GetModuleHandleExW
Process32NextW
OpenProcess
Process32FirstW
CreateToolhelp32Snapshot
GetSystemInfo
GetModuleHandleA
GetEnvironmentVariableW
GetStartupInfoW
SetCurrentDirectoryW
CreateThread
ExitThread
SuspendThread
SetEvent
GetFileAttributesExW
QueryPerformanceCounter
QueryPerformanceFrequency
InterlockedCompareExchange
ResetEvent
VirtualFreeEx
ReadProcessMemory
WriteProcessMemory
VirtualAllocEx
GetLongPathNameW
FindClose
FindNextFileW
FindFirstFileW
GlobalMemoryStatusEx
WritePrivateProfileStringW
lstrcmpiA
lstrcmpA
SetEnvironmentVariableA
CompareStringW
CompareStringA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
GetTimeZoneInformation
GetLocaleInfoW
FlushFileBuffers
GetConsoleMode
GetConsoleCP
SetStdHandle
IsValidLocale
WaitForSingleObject
GetACP
GetUserDefaultLCID
GetDateFormatA
GetTimeFormatA
GetStringTypeW
GetStringTypeA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
InitializeCriticalSectionAndSpinCount
InterlockedExchange
SetConsoleCtrlHandler
LCMapStringA
GetStartupInfoA
GetFileType
SetHandleCount
LCMapStringW
GetCurrentThread
IsValidCodePage
GetOEMCP
GetCPInfo
GetModuleFileNameA
GetStdHandle
HeapCreate
FatalAppExitA
ExitProcess
RtlUnwind
IsDebuggerPresent
UnhandledExceptionFilter
TlsFree
TlsAlloc
ReleaseMutex
HeapWalk
HeapLock
OpenThread
HeapUnlock
TlsSetValue
OutputDebugStringW
TlsGetValue
GetFileSizeEx
SetFilePointerEx
SetEndOfFile
LocalFileTimeToFileTime
GetSystemTimeAsFileTime
SystemTimeToFileTime
VirtualAlloc
VirtualFree
IsProcessorFeaturePresent
LoadLibraryA
GetProcessHeap
HeapSize
HeapReAlloc
HeapFree
HeapAlloc
HeapDestroy
SetUnhandledExceptionFilter
LocalAlloc
GetLocaleInfoA
GetTickCount
LocalFree
CreateMutexW
GetModuleHandleW
GetVersionExW
GetFileSize
lstrlenA
MultiByteToWideChar
DeleteFileW
GetFileAttributesW
SetFileAttributesW
GetSystemTime
Sleep
TerminateProcess
GetPrivateProfileStringW
RaiseException
CreateFileW
SetFilePointer
ReadFile
WideCharToMultiByte
InitializeCriticalSection
InterlockedIncrement
DeleteCriticalSection
MulDiv
lstrcmpW
CreateEventW
GetLastError
CloseHandle
lstrlenW
GetCurrentProcess
FlushInstructionCache
SetLastError
GetCurrentThreadId
LoadLibraryW
GetProcAddress
FreeLibrary
GetVersion
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
FreeResource
LeaveCriticalSection
EnterCriticalSection
FindResourceExW
LoadResource
LockResource
SizeofResource
FindResourceW
InterlockedDecrement
GetModuleFileNameW
EnumSystemLocalesA
user32
OffsetRect
EqualRect
EnumWindows
BringWindowToTop
WaitForInputIdle
GetActiveWindow
GetWindowLongW
UnregisterClassA
SendMessageW
PostMessageW
SetTimer
KillTimer
GetParent
ReleaseDC
GetDC
LoadImageW
RegisterClassW
GetClassInfoW
PostQuitMessage
DestroyWindow
DefWindowProcW
CallWindowProcW
CreateWindowExW
SetWindowLongW
MoveWindow
GetClientRect
ShowWindow
IsDialogMessageW
IsWindow
RegisterClassExW
LoadCursorW
GetClassInfoExW
RegisterWindowMessageW
SetWindowTextW
GetWindowTextW
GetWindowTextLengthW
BeginPaint
EndPaint
DestroyAcceleratorTable
GetSysColor
GetWindow
GetFocus
SetFocus
IsChild
FillRect
RedrawWindow
SetWindowPos
GetClassNameW
CharNextW
GetDesktopWindow
CreateAcceleratorTableW
ClientToScreen
ScreenToClient
ReleaseCapture
SetCapture
InvalidateRect
InvalidateRgn
GetDlgItem
GetMonitorInfoW
MonitorFromPoint
GetWindowRect
CopyRect
UpdateLayeredWindow
GetWindowDC
FindWindowW
LockSetForegroundWindow
SetForegroundWindow
AttachThreadInput
FindWindowExW
SendMessageTimeoutW
GetWindowThreadProcessId
GetForegroundWindow
DispatchMessageW
TranslateMessage
GetMessageW
LoadIconW
IsWindowVisible
EnableWindow
IsWindowEnabled
IsZoomed
IsIconic
DrawTextW
PeekMessageW
EndDialog
MapWindowPoints
MonitorFromWindow
PtInRect
SetCursor
wsprintfW
DialogBoxParamW
GetSystemMetrics
SetRectEmpty
MessageBoxW
UpdateWindow
GetCapture
WindowFromPoint
IntersectRect
GetClassLongW
GetCursorPos
gdi32
StretchBlt
CreateCompatibleBitmap
SelectObject
GetStockObject
SetDIBColorTable
DeleteDC
GetDeviceCaps
CreateFontIndirectW
ExtTextOutW
SetBkColor
SetStretchBltMode
CreateSolidBrush
GetObjectA
GetClipBox
ExcludeClipRect
OffsetViewportOrgEx
SetViewportOrgEx
IntersectClipRect
SetTextColor
GetTextColor
SetBkMode
TextOutW
GetTextExtentPoint32W
GetObjectW
CreateDIBSection
BitBlt
DeleteObject
GetTextMetricsW
CreateCompatibleDC
advapi32
RegDeleteValueW
RegOpenKeyExA
RegSetValueExA
RegCreateKeyExA
RegQueryValueExA
RegEnumValueW
OpenThreadToken
OpenProcessToken
LookupPrivilegeValueW
AdjustTokenPrivileges
RegQueryInfoKeyW
RegEnumKeyExW
RegDeleteKeyW
RegCreateKeyExW
RegSetValueExW
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
RegEnumKeyExA
shell32
SHChangeNotify
SHFileOperationW
ord165
SHCreateDirectoryExW
SHGetSpecialFolderPathW
ShellExecuteW
ShellExecuteExW
SHGetFileInfoW
ole32
CoInitialize
CoUninitialize
OleLockRunning
CoTaskMemAlloc
StringFromGUID2
CoCreateInstance
CLSIDFromString
CLSIDFromProgID
CoGetClassObject
CoSetProxyBlanket
CoInitializeSecurity
CoInitializeEx
OleInitialize
OleUninitialize
CreateStreamOnHGlobal
CoTaskMemFree
CoTaskMemRealloc
oleaut32
GetErrorInfo
SetErrorInfo
CreateErrorInfo
VariantChangeType
SysAllocStringLen
SysStringLen
LoadTypeLi
LoadRegTypeLi
SysFreeString
SysAllocString
SafeArrayGetLBound
SafeArrayGetUBound
SafeArrayCreate
VarUI4FromStr
SafeArrayAccessData
SafeArrayUnaccessData
DispCallFunc
VariantClear
VariantInit
SysAllocStringByteLen
SysStringByteLen
OleCreateFontIndirect
gdiplus
GdipCreateFromHDC
GdipDeleteGraphics
GdipDrawImageRectRect
GdipAlloc
GdipLoadImageFromStream
GdipLoadImageFromStreamICM
GdipFree
GdipDisposeImage
GdipCloneImage
GdiplusStartup
GdiplusShutdown
GdipCreateFontFromDC
GdipGetImageEncoders
GdipGetImageEncodersSize
GdipBitmapSetResolution
GdipBitmapUnlockBits
GdipBitmapLockBits
GdipSetPropertyItem
GdipGetAllPropertyItems
GdipGetPropertySize
GdipImageSelectActiveFrame
GdipImageGetFrameCount
GdipImageGetFrameDimensionsList
GdipImageGetFrameDimensionsCount
GdipSetImagePalette
GdipGetImagePixelFormat
GdipGetImageRawFormat
GdipGetImageFlags
GdipGetImageVerticalResolution
GdipGetImageHorizontalResolution
GdipSaveImageToFile
GdipCloneBitmapAreaI
GdipCreateBitmapFromStreamICM
GdipCreateBitmapFromStream
GdipCreateBitmapFromFileICM
GdipCreateBitmapFromFile
GdipCreateBitmapFromScan0
GdipGetImageHeight
GdipGetImageWidth
GdipDrawImageRectRectI
GdipDrawImageRectI
GdipSetInterpolationMode
GdipGetImageGraphicsContext
GdipDrawLineI
GdipReleaseDC
GdipDeletePen
GdipCreatePen1
GdipDeleteFont
GdipCreateFontFromLogfontA
shlwapi
SHGetValueW
PathRemoveFileSpecW
PathFindFileNameW
StrStrIW
PathRemoveExtensionW
PathFileExistsW
SHSetValueA
PathIsDirectoryW
PathAppendW
SHSetValueW
PathCombineW
SHDeleteValueW
SHDeleteKeyW
StrToIntExW
SHGetValueA
PathIsRootW
UrlGetPartW
comctl32
InitCommonControlsEx
msimg32
AlphaBlend
psapi
EnumProcessModules
GetModuleFileNameExW
version
GetFileVersionInfoW
GetFileVersionInfoSizeW
VerQueryValueA
VerQueryValueW
imm32
ImmDisableIME
setupapi
SetupIterateCabinetW
wintrust
WTHelperProvDataFromStateData
WinVerifyTrust
crypt32
CertGetNameStringW
rasapi32
RasGetConnectStatusW
RasEnumConnectionsW
netapi32
Netbios
Sections
.text Size: 1.0MB - Virtual size: 1.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 163KB - Virtual size: 162KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 21KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 121KB - Virtual size: 120KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 33KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
xolkw Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
xhkbh Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
fmnsn Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
rgatv Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
qeknd Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
iwlfk Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ctqxq Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
hrqqx Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
aodjf Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
grxem Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
mnsbt Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
aehtb Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
cmpnik Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ruoipl Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
gwqewl Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
rgkwem Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
drnsln Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
tsbmsn Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
jugkbo Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
rlrghp Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
dcvcop Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
haetvq Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
drlpdr Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
dacjkr Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
mwcjrs Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
tjrqbt Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
dffaju Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
xhwtqu Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
wqgpxv Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
qsnkfw Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
mwqgmw Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
xtqetx Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
iuoxca Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
cfahkb Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
iuolrb Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
qlbhac Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
jffchd Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
jimbod Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
acjave Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
niftef Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
kboslf Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
xxjpsg Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
tlkrbh Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
wccrii Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ajatqi Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ldfmbj Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
iucrl Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE