Static task
static1
Behavioral task
behavioral1
Sample
66110636529a359ff5056c4f041bfb69b1cb7706e7dd953c7ecdb93405e6a2ac.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
66110636529a359ff5056c4f041bfb69b1cb7706e7dd953c7ecdb93405e6a2ac.exe
Resource
win10v2004-20230220-en
General
-
Target
66110636529a359ff5056c4f041bfb69b1cb7706e7dd953c7ecdb93405e6a2ac
-
Size
1.0MB
-
MD5
26f319be505e199d2feffb4f43e71ec6
-
SHA1
1afb1067be87a41549a4cdf15c3a68aa2240c0f9
-
SHA256
66110636529a359ff5056c4f041bfb69b1cb7706e7dd953c7ecdb93405e6a2ac
-
SHA512
c614c30e29dd13e589afaf5ebc936021da629c044700b5b4f4400b4d7d636e84e14c851fcc5ad359800f8412df1685df0157111c0c118ceed1a4dd58d01d9b3c
-
SSDEEP
24576:9diXuOZBi3vNvyfkK5vLxrVX/pwTbjP/sjBOSTtet:9dinqyvLRpR6bzsjBOSTt
Malware Config
Signatures
Files
-
66110636529a359ff5056c4f041bfb69b1cb7706e7dd953c7ecdb93405e6a2ac.exe windows x86
aa0ffe6753dfa259b85c08e853754bf9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalLock
GlobalAlloc
lstrcmpW
GlobalReAlloc
WideCharToMultiByte
lstrlenA
WaitForMultipleObjects
DeviceIoControl
GetCurrentProcessId
OpenProcess
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
GlobalMemoryStatus
CreateThread
GetCurrentThread
ExitThread
TerminateThread
InterlockedExchange
WriteFile
InterlockedCompareExchange
SetEnvironmentVariableA
CompareStringW
CompareStringA
GetDriveTypeA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
GetLocaleInfoW
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
GetStringTypeW
GetStringTypeA
FlushFileBuffers
GetConsoleMode
GetConsoleCP
SetStdHandle
GetModuleHandleA
QueryPerformanceCounter
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
LCMapStringA
LCMapStringW
GlobalUnlock
PeekNamedPipe
GetFileInformationByHandle
GetFullPathNameW
HeapCreate
GetTimeZoneInformation
InitializeCriticalSectionAndSpinCount
GetModuleFileNameA
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
SetFilePointer
RtlUnwind
GetStartupInfoW
GetDriveTypeW
CreateDirectoryW
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
ExitProcess
TlsFree
DeleteAtom
FindAtomW
TlsAlloc
ReleaseMutex
AddAtomW
OpenThread
GetAtomNameW
TlsSetValue
TlsGetValue
GetSystemTime
LocalFree
FormatMessageW
OutputDebugStringW
SetFilePointerEx
SetEndOfFile
LocalFileTimeToFileTime
GetSystemTimeAsFileTime
SystemTimeToFileTime
CreateFileA
VirtualAlloc
VirtualFree
IsProcessorFeaturePresent
LoadLibraryA
GetProcessHeap
HeapSize
HeapReAlloc
HeapFree
HeapAlloc
HeapDestroy
GetVersionExW
GetSystemDirectoryW
GetSystemWindowsDirectoryW
CreateMutexW
LoadLibraryExW
MultiByteToWideChar
GetLastError
GetPrivateProfileIntW
ReadFile
GetFileSizeEx
CreateFileW
WritePrivateProfileStringW
GlobalFree
TerminateProcess
GetLocalTime
lstrcmpiW
SetErrorMode
GetPrivateProfileStringW
GetModuleHandleW
FlushInstructionCache
GetCurrentProcess
SetLastError
FindResourceExW
GetTickCount
FreeResource
FindResourceW
LoadResource
SizeofResource
LockResource
MulDiv
RaiseException
CloseHandle
ExpandEnvironmentStringsW
FileTimeToSystemTime
FileTimeToLocalFileTime
GetFileAttributesExW
FindClose
FindNextFileW
FindFirstFileW
SetEnvironmentVariableW
GetEnvironmentVariableW
RemoveDirectoryW
DeleteFileW
SetFileAttributesW
GetFileAttributesW
GetTempPathW
SetEvent
Sleep
ResetEvent
CopyFileW
GetModuleFileNameW
CreateEventW
DeleteCriticalSection
InitializeCriticalSection
EnterCriticalSection
GetProcAddress
FreeLibrary
LeaveCriticalSection
LoadLibraryW
lstrlenW
InterlockedDecrement
InterlockedIncrement
GetCurrentThreadId
WaitForSingleObject
GetCurrentDirectoryA
user32
GetLastInputInfo
GetIconInfo
GetForegroundWindow
UnregisterClassA
ShowScrollBar
GetShellWindow
GetWindowInfo
MapWindowPoints
EnumDisplaySettingsW
MonitorFromPoint
GetAncestor
MessageBoxW
SendMessageW
KillTimer
WindowFromPoint
PtInRect
GetClassLongW
FillRect
GetCursorPos
GetClientRect
PrivateExtractIconsW
wsprintfW
EqualRect
GetKeyState
ReleaseDC
GetDC
IntersectRect
EndPaint
GetActiveWindow
GetScrollInfo
BeginPaint
ScreenToClient
SetTimer
GetWindowThreadProcessId
DialogBoxIndirectParamW
GetWindowTextLengthW
GetWindowTextW
IsChild
GetFocus
GetClassNameW
GetSysColor
DestroyWindow
CreateAcceleratorTableW
InvalidateRgn
GetDesktopWindow
DestroyAcceleratorTable
DestroyIcon
PeekMessageW
GetMessageW
TranslateMessage
DispatchMessageW
CharNextW
CopyRect
ClientToScreen
SetForegroundWindow
SetActiveWindow
BringWindowToTop
FlashWindow
AdjustWindowRectEx
EndDialog
SetWindowRgn
FindWindowW
IsZoomed
GetWindow
MonitorFromWindow
GetMonitorInfoW
SetWindowTextW
TrackMouseEvent
LoadIconW
GetWindowDC
SystemParametersInfoW
UpdateLayeredWindow
RegisterWindowMessageW
GetWindowRect
MoveWindow
SetWindowPos
GetClassInfoExW
RegisterClassExW
CreateWindowExW
ShowWindow
IsWindow
IsWindowVisible
SetLayeredWindowAttributes
RedrawWindow
GetDlgCtrlID
GetSystemMetrics
CallWindowProcW
DefWindowProcW
GetWindowLongW
SetWindowLongW
SetFocus
DrawIconEx
LoadImageW
DrawTextW
SetCursor
LoadCursorW
GetCapture
SetCapture
ReleaseCapture
PostMessageW
InvalidateRect
OffsetRect
GetParent
UpdateWindow
GetDlgItem
gdi32
SetBkMode
IntersectClipRect
DeleteDC
DeleteObject
CreateCompatibleDC
CreateCompatibleBitmap
SelectObject
OffsetViewportOrgEx
SetViewportOrgEx
BitBlt
ExcludeClipRect
GetClipBox
TextOutW
StretchBlt
SetStretchBltMode
CreateSolidBrush
GetTextMetricsW
CombineRgn
CreateRectRgn
CreateRoundRectRgn
GetDeviceCaps
GetStockObject
CreatePolygonRgn
GetDIBits
SelectClipRgn
GetTextColor
CreateFontIndirectW
CreateDIBSection
GetObjectW
GetTextExtentPoint32W
SetTextColor
advapi32
RegDeleteValueW
RegCreateKeyExW
RegSetValueExW
RegEnumKeyExW
RegQueryInfoKeyW
RegDeleteKeyW
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
RegQueryValueExA
shell32
ShellExecuteW
SHGetFolderPathW
ExtractIconW
SHGetFileInfoW
ord165
ole32
CoUninitialize
OleInitialize
CLSIDFromString
CoGetClassObject
CreateStreamOnHGlobal
OleLockRunning
StringFromGUID2
OleUninitialize
CoCreateInstance
CoTaskMemAlloc
CoTaskMemRealloc
CoTaskMemFree
CoInitialize
CLSIDFromProgID
oleaut32
SysAllocStringLen
LoadTypeLi
LoadRegTypeLi
OleCreateFontIndirect
VarUI4FromStr
SystemTimeToVariantTime
VariantTimeToSystemTime
VariantClear
VariantInit
SysFreeString
SysStringLen
SysAllocString
GetErrorInfo
shlwapi
PathFileExistsW
StrStrW
StrRStrIW
StrCmpNIW
PathIsDirectoryW
PathFindExtensionW
PathFindFileNameW
StrCmpIW
PathAppendW
StrCpyW
SHGetValueW
PathCombineW
PathRemoveFileSpecW
PathAddBackslashW
comctl32
InitCommonControlsEx
msimg32
AlphaBlend
version
GetFileVersionInfoW
GetFileVersionInfoSizeW
VerQueryValueW
psapi
GetModuleFileNameExW
imm32
ImmDisableIME
Sections
.text Size: 595KB - Virtual size: 594KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 119KB - Virtual size: 118KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 17KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 92KB - Virtual size: 92KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 35KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
dfhdv Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
fmnsg Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ewtln Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
pugmu Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
rbhhd Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
aerxj Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
vgdrq Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
wcolw Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
bcmdf Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
hfhwl Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
rgats Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
useob Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
sbahhk Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
hfkbol Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
xeouvl Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
dmsqem Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
wlknkn Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ogmgrn Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
nwhdao Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
tlwxhp Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
vxctnp Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ueonuq Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
eoikdr Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
svefkr Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
tlbcrs Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
qeajat Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
hpiriu Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
uobmpu Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
bmkiwv Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
qxtefw Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
hrnbmw Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
wewvsx Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
nnuqba Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
rlfaja Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
wccfrb Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ecobac Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
vjwvgd Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
kbosnd Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
hwtsve Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
mgpndf Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
gtvlkf Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
amsjrg Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
oxvlbh Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
kpgkii Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
imnnpi Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
jrlfaj Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ifajk Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE