Static task
static1
Behavioral task
behavioral1
Sample
f2efb315dc44c9f16da940e8391aab42cca3bb5de83136dd9f8c9b3d1a042237.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
f2efb315dc44c9f16da940e8391aab42cca3bb5de83136dd9f8c9b3d1a042237.exe
Resource
win10v2004-20230220-en
General
-
Target
f2efb315dc44c9f16da940e8391aab42cca3bb5de83136dd9f8c9b3d1a042237
-
Size
1.7MB
-
MD5
0487c58f2bf7823100bceed59461be9f
-
SHA1
708dcf88e22729176d6d097958fb9a3d1fc0196a
-
SHA256
f2efb315dc44c9f16da940e8391aab42cca3bb5de83136dd9f8c9b3d1a042237
-
SHA512
475c28fc540456b1196258ac1cf0f17568cef1bbf4b7e23aa87d92ed457f0adfa7c1d1c45eb7fcf797e761b0657bb1b72505a3dacc1f736546700e3978b7e91f
-
SSDEEP
24576:HqbWKEBDlCto8TwyQzJ6TphymwZ0yGrMBuH/rjO8WxFuJ6SJwTHZEaCCbVTawaCX:KCKE0EJ6TLRxAAPzxJvE5Ewr
Malware Config
Signatures
Files
-
f2efb315dc44c9f16da940e8391aab42cca3bb5de83136dd9f8c9b3d1a042237.exe windows x86
dc896fd4b54fe940f67cf678f35bf805
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentThreadId
lstrlenW
GetLastError
InterlockedIncrement
InterlockedDecrement
lstrcmpiW
SetLastError
FreeLibrary
MultiByteToWideChar
SizeofResource
LoadResource
FindResourceW
LoadLibraryExW
CreateEventW
CreateDirectoryW
FindClose
FindNextFileW
FindFirstFileW
GetWindowsDirectoryA
WriteFile
ReadFile
ConnectNamedPipe
CreateNamedPipeW
WritePrivateProfileStringW
CopyFileW
CreateFileW
SetFileAttributesW
CreateThread
InterlockedCompareExchange
HeapFree
GetProcessHeap
HeapAlloc
LoadLibraryA
IsProcessorFeaturePresent
VirtualFree
VirtualAlloc
FlushInstructionCache
GetFullPathNameA
VirtualQuery
LoadLibraryW
lstrlenA
DebugBreak
IsBadReadPtr
HeapValidate
GetFullPathNameW
SetCurrentDirectoryA
GetCurrentDirectoryA
PeekNamedPipe
GetFileInformationByHandle
SystemTimeToFileTime
LocalFileTimeToFileTime
SetFileTime
SetCurrentDirectoryW
SetEnvironmentVariableW
GetVersionExW
FormatMessageW
LocalFree
UnmapViewOfFile
CreateFileMappingW
MapViewOfFile
GetTempFileNameW
MoveFileW
GetCurrentDirectoryW
SetVolumeLabelW
GetModuleHandleW
GetProcAddress
GetCurrentProcess
GetDiskFreeSpaceExW
OutputDebugStringA
Sleep
DeleteFileW
CreateProcessW
WaitForSingleObject
GetExitCodeProcess
CloseHandle
GetDriveTypeW
GetDiskFreeSpaceW
GetFileSize
SetEnvironmentVariableA
CompareStringW
CompareStringA
SetEndOfFile
GetTimeZoneInformation
CreateFileA
WriteConsoleW
DeleteCriticalSection
InitializeCriticalSection
GetTickCount
LeaveCriticalSection
EnterCriticalSection
RaiseException
WideCharToMultiByte
GetPrivateProfileIntW
GetPrivateProfileStringW
GetModuleFileNameW
OutputDebugStringW
GetTempPathW
GetDriveTypeA
InterlockedExchange
GetStartupInfoW
RtlUnwind
GetFileAttributesW
ExitProcess
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RemoveDirectoryW
MoveFileA
FileTimeToSystemTime
FileTimeToLocalFileTime
FindFirstFileA
FindNextFileA
LCMapStringA
LCMapStringW
GetCPInfo
GetStringTypeW
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
GetCurrentThread
HeapCreate
HeapDestroy
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
FatalAppExitA
SetConsoleCtrlHandler
InitializeCriticalSectionAndSpinCount
GetACP
GetOEMCP
IsValidCodePage
SetFilePointer
HeapReAlloc
HeapSize
GetModuleHandleA
GetConsoleCP
GetConsoleMode
GetLocaleInfoA
GetStringTypeA
GetTimeFormatA
GetDateFormatA
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
GetLocaleInfoW
SetStdHandle
FlushFileBuffers
WriteConsoleA
GetConsoleOutputCP
user32
OemToCharBuffA
wsprintfW
SetWindowLongW
SendMessageW
ShowWindow
SetDlgItemTextW
MessageBoxW
UnregisterClassA
GetClassLongW
SetClassLongW
DefWindowProcW
GetActiveWindow
DialogBoxParamW
LoadBitmapW
GetParent
GetWindow
GetWindowRect
MonitorFromWindow
GetMonitorInfoW
GetClientRect
MapWindowPoints
SetWindowPos
EndPaint
BeginPaint
GetWindowLongW
DestroyWindow
CharNextW
EndDialog
CharToOemBuffA
advapi32
GetTokenInformation
OpenProcessToken
RegDeleteKeyW
RegDeleteValueW
RegCloseKey
RegCreateKeyExW
RegOpenKeyExW
RegSetValueExW
RegQueryInfoKeyW
RegEnumKeyExW
ole32
CoCreateInstance
CoTaskMemFree
CoUninitialize
CoInitialize
CoTaskMemRealloc
CoTaskMemAlloc
oleaut32
VarUI4FromStr
SysFreeString
comctl32
InitCommonControlsEx
gdi32
SetBkColor
SetTextColor
SetBkMode
DeleteObject
DeleteDC
BitBlt
SelectObject
GetObjectW
CreateCompatibleDC
CreateSolidBrush
Sections
.text Size: 467KB - Virtual size: 467KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 82KB - Virtual size: 81KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 192KB - Virtual size: 191KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ