Static task
static1
Behavioral task
behavioral1
Sample
2307e06e7f58de5cc4eebeb85aa83a05b20b1175c41de2e5ed772be299d7e401.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
2307e06e7f58de5cc4eebeb85aa83a05b20b1175c41de2e5ed772be299d7e401.exe
Resource
win10v2004-20230220-en
General
-
Target
2307e06e7f58de5cc4eebeb85aa83a05b20b1175c41de2e5ed772be299d7e401
-
Size
819KB
-
MD5
ece8546c0d2e3f6c9d94557d739724c5
-
SHA1
ed4e530fb582788c099707ba5f6dddd32196ed59
-
SHA256
2307e06e7f58de5cc4eebeb85aa83a05b20b1175c41de2e5ed772be299d7e401
-
SHA512
8d2633a5a181c117838dadb3e317ab727875b9ca8e179b6b38087e28ecd2215f8f7fedff421a66eb67b5d394447189f0e5c16f3123d2d8c496aeb872a5e7d901
-
SSDEEP
12288:LiQqm2dxp7sv27/x5mkXz3hmAUEE25rQeNb5g+8iGc:LiQqm2dxp7sExL8A79ugbu+8v
Malware Config
Signatures
Files
-
2307e06e7f58de5cc4eebeb85aa83a05b20b1175c41de2e5ed772be299d7e401.exe windows x86
6145233d1ce692e410e225b3b4306a35
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FileTimeToSystemTime
GetStartupInfoW
CreateProcessW
GetSystemTimeAsFileTime
GetWindowsDirectoryW
GetDiskFreeSpaceExW
FreeResource
GetSystemWindowsDirectoryW
GetVersionExW
Sleep
InterlockedCompareExchange
lstrlenA
GetCommandLineW
CreateFileW
ReadFile
SetFilePointer
GetFileSize
GlobalUnlock
GlobalLock
GlobalAlloc
MulDiv
lstrcmpW
DeleteFileW
GlobalMemoryStatusEx
GetSystemInfo
GetPrivateProfileStringW
SetCurrentDirectoryW
InterlockedExchange
WaitForMultipleObjects
DeviceIoControl
GetCurrentProcessId
GetLastError
SetEnvironmentVariableA
CompareStringW
CompareStringA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
FlushFileBuffers
GetConsoleMode
GetConsoleCP
GetLocaleInfoW
GetModuleHandleA
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
FileTimeToLocalFileTime
GetStringTypeA
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetStartupInfoA
GetFileType
SetHandleCount
GetTimeZoneInformation
InitializeCriticalSectionAndSpinCount
GetModuleFileNameA
GetStdHandle
HeapCreate
IsValidCodePage
GetOEMCP
GetACP
LCMapStringW
LCMapStringA
GetCPInfo
RtlUnwind
CreateThread
ExitThread
ExitProcess
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
TlsFree
TlsAlloc
ReleaseMutex
HeapWalk
HeapLock
OpenThread
HeapUnlock
TlsSetValue
OutputDebugStringW
TlsGetValue
GetFileSizeEx
WriteFile
SetFilePointerEx
LocalFileTimeToFileTime
SystemTimeToFileTime
CreateFileA
VirtualAlloc
VirtualFree
IsProcessorFeaturePresent
LoadLibraryA
GetProcessHeap
HeapSize
HeapReAlloc
HeapFree
HeapAlloc
HeapDestroy
CreateMutexW
WideCharToMultiByte
SetEvent
GetTickCount
ResetEvent
CreateEventW
CloseHandle
WaitForSingleObject
SetThreadLocale
GetThreadLocale
FlushInstructionCache
GetCurrentProcess
SetLastError
SetErrorMode
GetSystemDirectoryW
InterlockedIncrement
InterlockedDecrement
LoadLibraryExW
lstrcmpiW
lstrlenW
FindResourceExW
FindResourceW
LoadResource
LeaveCriticalSection
LockResource
SizeofResource
DeleteCriticalSection
InitializeCriticalSection
GetModuleFileNameW
FreeLibrary
LoadLibraryW
GetProcAddress
GetModuleHandleW
GetCurrentThreadId
EnterCriticalSection
MultiByteToWideChar
RaiseException
GetStringTypeW
user32
GetCursorPos
GetWindowRect
SendMessageW
UnregisterClassA
RegisterWindowMessageW
AttachThreadInput
PtInRect
PostMessageW
GetParent
TrackMouseEvent
CallWindowProcW
IsWindow
SetWindowLongW
SetRectEmpty
SetWindowPos
GetWindowLongW
MoveWindow
KillTimer
IsWindowVisible
EnumChildWindows
GetFocus
GetActiveWindow
SetRect
GetWindowTextLengthW
GetWindowTextW
BeginPaint
EndPaint
IsChild
GetDlgItem
SetFocus
GetSysColor
CreateAcceleratorTableW
ClientToScreen
ScreenToClient
SetCapture
ReleaseCapture
FillRect
InvalidateRgn
InvalidateRect
GetDC
ReleaseDC
GetDesktopWindow
DestroyAcceleratorTable
CreateDialogParamW
GetAsyncKeyState
GetMessagePos
RedrawWindow
SwitchToThisWindow
GetWindowThreadProcessId
GetClassNameW
GetForegroundWindow
PostQuitMessage
CopyRect
GetSystemMetrics
LoadImageW
EnableWindow
DisableProcessWindowsGhosting
GetWindow
MonitorFromWindow
GetMonitorInfoW
GetClientRect
MapWindowPoints
SetWindowTextW
wsprintfW
SetForegroundWindow
BringWindowToTop
IsIconic
FindWindowW
MessageBoxW
CreateWindowExW
LoadCursorW
GetClassInfoExW
RegisterClassExW
DestroyWindow
DefWindowProcW
PeekMessageW
GetMessageW
TranslateMessage
DispatchMessageW
ShowWindow
CharNextW
SetTimer
SetActiveWindow
gdi32
GetStockObject
GetDeviceCaps
DeleteDC
BitBlt
DeleteObject
SelectObject
CreateCompatibleBitmap
CreateCompatibleDC
CreateSolidBrush
GetObjectW
advapi32
RegQueryInfoKeyW
RegCloseKey
SaferCloseLevel
CreateProcessAsUserW
SaferComputeTokenFromLevel
SaferCreateLevel
GetTokenInformation
OpenProcessToken
RegDeleteValueW
RegCreateKeyExW
RegSetValueExW
RegEnumKeyExW
RegDeleteKeyW
RegOpenKeyExW
RegQueryValueExW
RegQueryValueExA
shell32
ord165
ShellExecuteW
SHGetFolderPathW
SHGetSpecialFolderPathW
ShellExecuteExW
ole32
OleUninitialize
CoTaskMemAlloc
CoInitialize
CoCreateInstance
StringFromGUID2
OleLockRunning
CreateStreamOnHGlobal
CoGetClassObject
CLSIDFromProgID
CLSIDFromString
OleInitialize
CoUninitialize
CoTaskMemRealloc
CoTaskMemFree
oleaut32
SafeArrayGetLBound
SafeArrayUnaccessData
SafeArrayAccessData
SafeArrayCreate
LoadTypeLi
LoadRegTypeLi
SysStringLen
VariantCopy
SafeArrayLock
SafeArrayUnlock
SafeArrayRedim
SysAllocStringLen
OleCreateFontIndirect
SafeArrayDestroy
VariantInit
VariantClear
SysFreeString
VarUI4FromStr
VariantTimeToSystemTime
SystemTimeToVariantTime
SysAllocString
DispCallFunc
SafeArrayGetVartype
SafeArrayCopy
SafeArrayGetUBound
shlwapi
PathRemoveFileSpecW
StrStrIA
StrStrIW
PathStripToRootW
SHGetValueW
PathFileExistsW
PathCombineW
PathAppendW
comctl32
InitCommonControlsEx
version
VerQueryValueW
wininet
InternetOpenUrlW
InternetOpenW
InternetCloseHandle
HttpQueryInfoW
Sections
.text Size: 438KB - Virtual size: 438KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 78KB - Virtual size: 77KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 17KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 41KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 31KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
qipgw Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
bhrug Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
jwcon Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
qxtqu Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
sgdjd Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
iiucj Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
mimuq Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
nnknw Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
qipgf Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
wtnbm Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ouewt Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
xoxqb Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
vefkik Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
rgweol Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
recavl Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
gkwtem Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
xhmpln Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
vopirn Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
gdtgao Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
pngdhp Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
fcfwop Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
xctquq Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
nsemdr Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
dhdhkr Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
eaqgrs Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
lpimbt Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
hdouju Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
irippu Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
olrlwv Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
kdahfw Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
qujdmw Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
xtgatx Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
wtbtba Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
aopdja Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
sjkirb Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
beweac Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
mweahd Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
cjuvod Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
wewvve Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
xctqef Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
vodolf Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
iwxlrg Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ekbobh Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
folnii Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
bcmppi Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
usqiaj Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
xhknk Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE