Static task
static1
Behavioral task
behavioral1
Sample
324bdba46dad7a6e0d2fd8c4cb3a9037d8aaf1d7827d6caab3ee3f752c8808c8.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
324bdba46dad7a6e0d2fd8c4cb3a9037d8aaf1d7827d6caab3ee3f752c8808c8.exe
Resource
win10v2004-20230220-en
General
-
Target
324bdba46dad7a6e0d2fd8c4cb3a9037d8aaf1d7827d6caab3ee3f752c8808c8
-
Size
1.6MB
-
MD5
6e9ce81d2643be60339fad94bc8730c6
-
SHA1
2119d379f64581353f6477bb0699b3807d4d6dad
-
SHA256
324bdba46dad7a6e0d2fd8c4cb3a9037d8aaf1d7827d6caab3ee3f752c8808c8
-
SHA512
7c2acef6803ce5e0d9174745481e24a93811bffaed224b9cf13cd85d4db0a8a339c1550570c0c5faa1d02f4eadf1b789a6d64755b3dfdacdecb50a0f374f3191
-
SSDEEP
24576:KVrr0JloL2aeJEA9fPcbhZ98K7jH8lYSxpQMBCjZEJ5FT0zmH2jU9s:Kf+bhIWPxpVJzT0zmm3
Malware Config
Signatures
Files
-
324bdba46dad7a6e0d2fd8c4cb3a9037d8aaf1d7827d6caab3ee3f752c8808c8.exe windows x86
59d60cc0e5eb5a5229da0dde385eb5f6
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetPrivateProfileStringW
Sleep
WritePrivateProfileStringW
GetTickCount
CreateMutexW
LoadLibraryExW
GetWindowsDirectoryW
SetUnhandledExceptionFilter
OutputDebugStringW
DeviceIoControl
GetCurrentProcessId
CreateProcessW
lstrcmpiW
GetModuleHandleExW
OpenProcess
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
GetSystemInfo
GetModuleHandleA
LocalFree
LocalAlloc
GetShortPathNameW
GetEnvironmentVariableW
GetStartupInfoW
SetCurrentDirectoryW
GlobalFree
WaitForSingleObject
SuspendThread
CreateThread
GetFileAttributesExW
GetExitCodeThread
GetACP
FormatMessageW
FlushFileBuffers
MoveFileExW
SetFilePointer
IsBadReadPtr
InterlockedExchange
InterlockedCompareExchange
CreateDirectoryA
GetFileAttributesA
DeleteFileA
SetFileAttributesA
GetFileAttributesW
SetFileAttributesW
WriteFile
lstrcmpiA
lstrcmpA
SetEnvironmentVariableA
CompareStringW
CompareStringA
GetTimeZoneInformation
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
GetLocaleInfoW
IsValidLocale
EnumSystemLocalesA
CreateDirectoryW
GetDateFormatA
GetTimeFormatA
GetStringTypeA
GetLocaleInfoA
QueryPerformanceCounter
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetStdHandle
GetConsoleMode
GetConsoleCP
InitializeCriticalSectionAndSpinCount
SetConsoleCtrlHandler
GetStartupInfoA
GetFileType
SetHandleCount
GetModuleFileNameA
GetStdHandle
GetCurrentThread
IsValidCodePage
GetOEMCP
FatalAppExitA
HeapCreate
GetStringTypeW
GetCPInfo
LCMapStringW
LCMapStringA
ResumeThread
FindNextFileA
FindFirstFileA
FileTimeToLocalFileTime
FileTimeToSystemTime
ExitProcess
RtlUnwind
IsDebuggerPresent
UnhandledExceptionFilter
ExitThread
TlsFree
TlsAlloc
ReleaseMutex
HeapWalk
HeapLock
OpenThread
HeapUnlock
TlsSetValue
TlsGetValue
GetFileSizeEx
SetFilePointerEx
SetEndOfFile
LocalFileTimeToFileTime
GetSystemTimeAsFileTime
SystemTimeToFileTime
CreateFileA
VirtualAlloc
VirtualFree
IsProcessorFeaturePresent
LoadLibraryA
GetProcessHeap
HeapSize
HeapReAlloc
HeapFree
HeapAlloc
HeapDestroy
FindFirstFileW
FindNextFileW
DeleteFileW
FindClose
lstrlenA
TerminateProcess
WideCharToMultiByte
GetModuleHandleW
GetVersion
CreateFileW
GetFileSize
ReadFile
GetVersionExW
FreeResource
MultiByteToWideChar
GetLocalTime
RaiseException
SetEvent
GlobalAlloc
GlobalLock
GlobalUnlock
InterlockedDecrement
InterlockedIncrement
MulDiv
lstrcmpW
DeleteCriticalSection
InitializeCriticalSection
SetLastError
lstrlenW
GetCurrentThreadId
CreateEventW
GetLastError
CloseHandle
GetCurrentProcess
FlushInstructionCache
LoadLibraryW
GetProcAddress
FreeLibrary
GetModuleFileNameW
FindResourceExW
FindResourceW
LoadResource
LockResource
SizeofResource
LeaveCriticalSection
EnterCriticalSection
GetUserDefaultLCID
user32
ReleaseDC
GetParent
IsChild
KillTimer
SetTimer
IsWindowVisible
UnregisterClassA
PostMessageW
SendMessageW
GetDC
DestroyWindow
SetWindowLongW
MoveWindow
GetClientRect
ShowWindow
IsDialogMessageW
IsWindow
GetClassInfoExW
LoadCursorW
GetWindowLongW
BeginPaint
EndPaint
RegisterClassExW
CallWindowProcW
CreateWindowExW
GetSysColor
CharNextW
SetWindowPos
ClientToScreen
ScreenToClient
InvalidateRect
InvalidateRgn
RedrawWindow
SetCapture
GetDlgItem
GetClassNameW
ReleaseCapture
FillRect
GetDesktopWindow
DestroyAcceleratorTable
GetWindow
GetFocus
SetFocus
GetMessageW
PeekMessageW
MessageBoxW
GetActiveWindow
IsIconic
SetRectEmpty
GetWindowRect
BringWindowToTop
SetParent
wsprintfW
GetSystemMetrics
CopyRect
MonitorFromWindow
TranslateMessage
DispatchMessageW
PostQuitMessage
CreateAcceleratorTableW
SetWindowTextW
GetWindowTextW
GetWindowTextLengthW
RegisterWindowMessageW
RegisterClassW
GetClassInfoW
UpdateWindow
FindWindowW
RemoveMenu
DestroyMenu
GetMonitorInfoW
MonitorFromPoint
WaitForInputIdle
LoadMenuW
TrackPopupMenu
LoadImageW
GetSubMenu
DrawIconEx
DialogBoxParamW
DrawTextW
GetForegroundWindow
GetWindowThreadProcessId
SetCursor
PtInRect
IntersectRect
EndDialog
DefWindowProcW
AttachThreadInput
GetClassLongW
MapWindowPoints
WindowFromPoint
OffsetRect
GetCapture
LoadIconW
SendMessageTimeoutW
SetForegroundWindow
FindWindowExW
GetCursorPos
gdi32
SetBkColor
ExtTextOutW
DeleteDC
DeleteObject
GetStockObject
SelectObject
CreateCompatibleDC
CreateDIBSection
GetTextExtentPoint32W
BitBlt
GetObjectA
StretchBlt
SetStretchBltMode
GetTextMetricsW
TextOutW
SetTextColor
GetTextColor
SetBkMode
GetClipBox
ExcludeClipRect
GetDeviceCaps
CreateSolidBrush
CreateFontIndirectW
GetObjectW
IntersectClipRect
OffsetViewportOrgEx
SetViewportOrgEx
CreateCompatibleBitmap
advapi32
RegCloseKey
RegEnumKeyExA
RegQueryValueExA
OpenThreadToken
OpenProcessToken
LookupPrivilegeValueW
AdjustTokenPrivileges
RegEnumKeyExW
RegQueryInfoKeyW
RegDeleteValueW
RegDeleteKeyW
RegCreateKeyExW
RegSetValueExW
RegOpenKeyExW
RegQueryValueExW
RegOpenKeyExA
shell32
SHGetFileInfoW
SHFileOperationW
ShellExecuteW
ord165
ShellExecuteExW
SHGetSpecialFolderPathW
SHCreateDirectoryExW
ole32
CoTaskMemFree
CoTaskMemRealloc
CoInitialize
CoUninitialize
OleUninitialize
OleInitialize
CreateStreamOnHGlobal
CoTaskMemAlloc
CoCreateInstance
CoSetProxyBlanket
CoInitializeSecurity
CoInitializeEx
CLSIDFromString
CLSIDFromProgID
CoGetClassObject
OleLockRunning
StringFromGUID2
oleaut32
SafeArrayAccessData
SafeArrayUnaccessData
LoadTypeLi
LoadRegTypeLi
DispCallFunc
SysAllocString
SysStringLen
VariantClear
VariantInit
SysFreeString
SafeArrayGetLBound
VariantChangeType
SysAllocStringLen
SafeArrayCreate
OleCreateFontIndirect
VarUI4FromStr
SysAllocStringByteLen
SysStringByteLen
GetErrorInfo
SetErrorInfo
CreateErrorInfo
SafeArrayGetUBound
gdiplus
GdipCreateBitmapFromStreamICM
GdipCreateBitmapFromStream
GdipCreateBitmapFromFileICM
GdipCreateBitmapFromFile
GdipCloneBrush
GdipGetFamily
GdipGetFamilyName
GdipFillRectangleI
GdipCreateSolidFill
GdipCreateFont
GdipDeleteFontFamily
GdipGetGenericFontFamilySansSerif
GdipCreateFontFamilyFromName
GdipDrawLineI
GdipReleaseDC
GdipDeletePen
GdipCreatePen1
GdipCloneImage
GdipCreateFontFromLogfontA
GdipCreateFontFromDC
GdipDrawImageRectRect
GdipSetInterpolationMode
GdipCreateFromHDC
GdiplusStartup
GdipDisposeImage
GdipFree
GdipLoadImageFromStreamICM
GdipLoadImageFromStream
GdipDeleteGraphics
GdipAlloc
GdipDeleteFont
GdiplusShutdown
GdipDeleteBrush
shlwapi
SHGetValueA
SHSetValueA
SHGetValueW
PathRemoveFileSpecW
PathFindFileNameW
PathFileExistsW
PathAppendW
PathCombineW
UrlGetPartW
SHSetValueW
SHDeleteValueW
PathIsRootW
PathIsDirectoryW
StrStrIW
StrToIntExW
comctl32
InitCommonControlsEx
wininet
InternetReadFile
InternetCloseHandle
InternetErrorDlg
HttpSendRequestW
HttpQueryInfoW
InternetQueryOptionW
InternetCrackUrlW
InternetOpenW
InternetSetOptionW
InternetConnectW
HttpOpenRequestW
HttpAddRequestHeadersW
HttpAddRequestHeadersA
HttpQueryInfoA
version
VerQueryValueW
GetFileVersionInfoSizeW
VerQueryValueA
GetFileVersionInfoW
wintrust
WinVerifyTrust
WTHelperProvDataFromStateData
crypt32
CertGetNameStringW
ws2_32
select
gethostbyname
netapi32
Netbios
Sections
.text Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 163KB - Virtual size: 163KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 81KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 55KB - Virtual size: 54KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 41KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
rldjw Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
sxcah Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
vgdrn Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
qqssv Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
bccmd Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
gacfk Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
hmkwq Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
rqipx Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
emwjf Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
lkrem Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
oikbt Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ppbtb Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
obhmik Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
bahhpl Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
iridvl Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
imdvem Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
psjrln Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
xjrlrn Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
hkbjao Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
hpifhp Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
dambop Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
oiwtvq Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
vododr Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
hwvjkr Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
jfrirs Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ifmpbt Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
psvxju Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
kbosqu Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ipxoxv Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
sngkfw Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
gtjfmw Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
slidtx Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
pdhwca Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
irsgkb Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
msjkrb Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ujugac Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ndachd Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
vveaod Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
vjaave Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
bvvsef Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
kfhrlf Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
jwcosg Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ffcrbh Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
xctqii Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
qipsqi Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
setlbj Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
qxtql Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE