Static task
static1
Behavioral task
behavioral1
Sample
33c0e3992305160b1540bf70ed94da3070b6a064d6b2eb6aa59f7139610db035.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
33c0e3992305160b1540bf70ed94da3070b6a064d6b2eb6aa59f7139610db035.exe
Resource
win10v2004-20230220-en
General
-
Target
33c0e3992305160b1540bf70ed94da3070b6a064d6b2eb6aa59f7139610db035
-
Size
419KB
-
MD5
99ec22a7396449a904ef4afc6598351a
-
SHA1
659289ce18f1cb1d8211e5e18dc0f75fe9322867
-
SHA256
33c0e3992305160b1540bf70ed94da3070b6a064d6b2eb6aa59f7139610db035
-
SHA512
ed84bcf7739fc712275f334ead0ade5e8ad3790f1414ba10b7188b97437a5e1aea1899db2b5e847f4aa4811df36544ddc8631e6466c95e5d3afcfb57ad670fd6
-
SSDEEP
3072:d8oAPH6BdWT0N7JdQ8oH4SefaqNxTQPBFMmNWU4k/uwgUo9Bpqc8rz3nYDddy:EvdO1dQ8JxsPBhuwQq7Y
Malware Config
Signatures
Files
-
33c0e3992305160b1540bf70ed94da3070b6a064d6b2eb6aa59f7139610db035.exe windows x86
d3f8a801fb6b4a9d7396a2e13daaf730
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
ShellExecuteW
CommandLineToArgvW
SHGetFolderPathW
ShellExecuteExW
kernel32
OpenEventW
EnterCriticalSection
LeaveCriticalSection
VirtualAllocEx
WriteProcessMemory
CreateRemoteThread
GetExitCodeThread
OpenFileMappingW
MapViewOfFile
GetProcessId
UnmapViewOfFile
IsProcessInJob
QueryInformationJobObject
LoadLibraryW
GetCommandLineW
HeapDestroy
HeapSize
HeapReAlloc
HeapFree
HeapAlloc
GetProcessHeap
SizeofResource
LockResource
LoadResource
FindResourceW
FindResourceExW
ProcessIdToSessionId
GetCurrentProcessId
GetSystemDirectoryW
SetLastError
MultiByteToWideChar
LoadLibraryA
GetSystemDirectoryA
ExpandEnvironmentStringsA
CreateEventW
HeapCreate
SetEvent
GetLocalTime
DeviceIoControl
InitializeCriticalSection
RaiseException
IsDebuggerPresent
WaitForSingleObject
GlobalFree
WriteFile
CreateFileW
GlobalAlloc
ReadFile
GetModuleFileNameW
ExpandEnvironmentStringsW
TlsSetValue
TlsGetValue
TlsFree
FreeLibrary
TlsAlloc
LoadLibraryExW
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
GetLastError
GetCurrentProcess
TerminateProcess
Sleep
CreateProcessW
GetVersionExW
CloseHandle
OpenProcess
GetModuleHandleW
GetProcAddress
LCMapStringW
RtlUnwind
InitializeSListHead
QueryPerformanceCounter
GetStartupInfoW
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
OutputDebugStringW
GetStringTypeW
WaitForSingleObjectEx
ResetEvent
OpenThread
GetCurrentThreadId
CreateMutexW
ReleaseMutex
HeapWalk
HeapUnlock
HeapLock
SetFilePointerEx
GetFileSizeEx
SystemTimeToFileTime
GetSystemTimeAsFileTime
LocalFileTimeToFileTime
CreateFileA
WideCharToMultiByte
user32
GetWindowThreadProcessId
IsWindow
SendMessageW
MessageBoxW
GetActiveWindow
WaitForInputIdle
FindWindowW
advapi32
RegQueryValueExA
RegEnumKeyExW
RevertToSelf
CreateProcessAsUserW
ImpersonateLoggedOnUser
DuplicateTokenEx
GetTokenInformation
OpenProcessToken
LookupAccountSidW
AdjustTokenPrivileges
LookupPrivilegeValueW
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
ole32
CoCreateInstance
CoInitializeSecurity
CoInitializeEx
CoSetProxyBlanket
StringFromGUID2
CoUninitialize
CoInitialize
oleaut32
SysFreeString
VariantClear
SysAllocString
shlwapi
SHGetValueW
PathCombineW
PathFileExistsW
PathRemoveFileSpecW
PathAppendW
PathFindFileNameW
ws2_32
WSCEnumProtocols
WSAStartup
WSACleanup
WSCGetProviderPath
WSCDeinstallProvider
imm32
ImmDisableIME
psapi
EnumProcesses
GetModuleFileNameExW
wtsapi32
WTSFreeMemory
WTSQuerySessionInformationW
userenv
DestroyEnvironmentBlock
CreateEnvironmentBlock
msvcrt
__uncaught_exception
_CIpow
abort
memchr
??0exception@@QAE@ABQBD@Z
isspace
___lc_handle_func
memcmp
_cexit
__wgetmainargs
atexit
__setusermatherr
_initterm
_exit
_c_exit
__p__commode
__CxxFrameHandler
_wcslwr
__pctype_func
___mb_cur_max_func
wcstol
strtol
??1exception@@UAE@XZ
setlocale
_lock
_unlock
_iob
iswctype
?what@exception@@UBEPBDXZ
??0exception@@QAE@ABV0@@Z
_beginthreadex
_wcstoui64
__dllonexit
__set_app_type
_wcmdln
_control87
_XcptFilter
_fmode
mbtowc
strrchr
_isatty
fflush
_fileno
memcpy
_CIlog10
ceil
_clearfp
?terminate@@YAXXZ
_errno
_CxxThrowException
memset
memmove
malloc
calloc
localeconv
ldexp
strtod
free
??0exception@@QAE@XZ
___lc_codepage_func
??2@YAPAXI@Z
_wtoi
exit
??_V@YAXPAX@Z
??_U@YAPAXI@Z
_wcsnicmp
_wcsicmp
wcschr
wcsstr
??3@YAXPAX@Z
fputc
fwrite
tolower
msvcp60
_Getcvt
_Getctype
_Wcrtomb
_Mbrtowc
Sections
.text Size: 142KB - Virtual size: 141KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 30KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
uxvct Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
luque Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
gpdmk Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
qxhkr Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
bhtlb Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
xtqeh Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
txquo Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
cfmnu Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ndmid Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
kbcaj Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
vosxq Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
wekpx Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ctqlfk Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
lbhfmk Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
mslbtl Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
xeoucm Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
avsqim Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
mbmkpn Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
uongwo Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
qbccfo Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
rnnwlp Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
xctqsq Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
mdvlbq Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
gkwhhr Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
erecos Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
mpbmwt Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
hdougt Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
qempnu Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
wvvluv Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
jiahdv Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
wekdjw Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
pndaqx Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
lbjuxx Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
vjaaha Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
drngpb Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
sbvewc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
cvcaec Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
wqsvld Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
xjiuse Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
fcrqbe Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
mgpnif Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
oiikpg Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
kftlwh Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
lucmgh Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
mwemni Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
mbaewj Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ugwl Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE