Static task
static1
Behavioral task
behavioral1
Sample
38f9e0ff9e94f139185e0afc3c2779527fce29d0c1c7f105bc5429b86fb90577.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
38f9e0ff9e94f139185e0afc3c2779527fce29d0c1c7f105bc5429b86fb90577.exe
Resource
win10v2004-20230220-en
General
-
Target
38f9e0ff9e94f139185e0afc3c2779527fce29d0c1c7f105bc5429b86fb90577
-
Size
4.9MB
-
MD5
f223d0090c6f2d810b3afd0a0cc2fe06
-
SHA1
ca2002fa2588d10404d71f659ff65fb5478d4405
-
SHA256
38f9e0ff9e94f139185e0afc3c2779527fce29d0c1c7f105bc5429b86fb90577
-
SHA512
9c0d61207ee3afe54d8d7b283c336e2e0e18c8c1934770aaf7063f853fa274a2a35384326dcb9fea454a5f4d59da9f9a571cf0e74df6df44acf72492f0b99669
-
SSDEEP
49152:ih6u7DArVH2dYxzv5fpG0ILmTvWo2rsRYXIsVv1pZ1CZtYX5W60TYBjWsbw/91:ih6QDsS8T5fpG0Ihrp/pZ1C+hG
Malware Config
Signatures
Files
-
38f9e0ff9e94f139185e0afc3c2779527fce29d0c1c7f105bc5429b86fb90577.exe windows x86
41600e1d3fb3aa3e8d1c19a5525f8f8d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapFree
InterlockedCompareExchange
UnlockFile
LockFile
OutputDebugStringW
UnlockFileEx
GetProcessHeap
GetSystemTimeAsFileTime
FormatMessageA
InitializeCriticalSection
WideCharToMultiByte
HeapDestroy
LeaveCriticalSection
GetFileAttributesA
HeapCreate
HeapValidate
ReadFile
MultiByteToWideChar
FlushFileBuffers
GetTempPathW
HeapSize
LockFileEx
EnterCriticalSection
GetDiskFreeSpaceW
LoadLibraryA
CreateFileMappingA
CreateFileMappingW
GetDiskFreeSpaceA
GetSystemInfo
GetFileAttributesExW
OutputDebugStringA
GetVersionExA
GetTempPathA
GetSystemTime
AreFileApisANSI
DeleteFileA
CompareStringW
FlushInstructionCache
lstrcmpiW
GetCurrentThreadId
WinExec
GetACP
FindFirstFileW
GetLongPathNameW
SetFileTime
GetFileTime
ResumeThread
TerminateThread
OpenThread
GetExitCodeThread
SuspendThread
GetTempFileNameW
MoveFileExW
CreateDirectoryW
CopyFileW
GetCurrentDirectoryW
MoveFileW
RemoveDirectoryW
GetWindowsDirectoryW
SetFileAttributesW
FindClose
FindNextFileW
SetEvent
ResetEvent
GlobalLock
InterlockedExchangeAdd
QueryDosDeviceW
GetLogicalDriveStringsW
GetVolumeInformationW
GetExitCodeProcess
GlobalMemoryStatusEx
GetVersion
InterlockedDecrement
GetCurrentThread
GetComputerNameW
DeviceIoControl
QueryPerformanceCounter
WritePrivateProfileStringW
GetModuleFileNameW
GetPrivateProfileStringW
GetFileSizeEx
FileTimeToSystemTime
GetEnvironmentVariableW
InterlockedExchange
SetEnvironmentVariableA
WriteConsoleW
SetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetTimeZoneInformation
GetOEMCP
IsValidCodePage
ReadConsoleW
GetConsoleMode
GetConsoleCP
SetFilePointerEx
GetFileType
GetStdHandle
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
GetStartupInfoW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
UnhandledExceptionFilter
RtlUnwind
LoadLibraryExW
ExitThread
CreateThread
GetCommandLineW
GetModuleHandleExW
ExitProcess
GetLocalTime
GetCPInfo
VirtualFree
VirtualAlloc
IsProcessorFeaturePresent
InterlockedPushEntrySList
InterlockedPopEntrySList
InitializeSListHead
IsDebuggerPresent
EncodePointer
GetStringTypeW
SystemTimeToFileTime
HeapAlloc
SetEndOfFile
UnmapViewOfFile
MapViewOfFile
CreateFileW
FormatMessageW
GetProcAddress
GetVersionExW
GetModuleHandleW
GetCurrentProcess
LocalFree
Sleep
GetTickCount
LockResource
GetFileAttributesW
SizeofResource
LoadResource
FindResourceW
GetCurrentProcessId
CloseHandle
CreateToolhelp32Snapshot
Process32NextW
WaitForMultipleObjects
Process32FirstW
SetFilePointer
GetFileSize
CreateFileA
HeapReAlloc
GetFullPathNameA
GetFullPathNameW
LoadLibraryW
FreeLibrary
ReleaseMutex
SetUnhandledExceptionFilter
CreateMutexW
ExpandEnvironmentStringsW
lstrlenW
DeleteFileW
WaitForSingleObject
CreateProcessW
GlobalFree
GlobalUnlock
GlobalAlloc
WriteFile
TerminateProcess
OpenProcess
SetLastError
DeleteCriticalSection
DecodePointer
GetLastError
RaiseException
CreateEventW
InitializeCriticalSectionAndSpinCount
user32
CreateDialogParamW
LoadBitmapW
PeekMessageW
TranslateMessage
SetForegroundWindow
LoadImageW
IsChild
GetMessageW
UnregisterClassW
IsWindow
PostMessageW
SystemParametersInfoW
GetDesktopWindow
ReleaseDC
GetSystemMetrics
IsWindowVisible
DispatchMessageW
GetSystemMenu
DeleteMenu
PostQuitMessage
GetFocus
DrawFocusRect
EndPaint
DestroyWindow
GetDC
GetWindowThreadProcessId
MessageBoxW
FindWindowExW
SendDlgItemMessageW
GetDlgItem
GetWindowTextW
CloseDesktop
IsWindowEnabled
EnumDesktopWindows
CreateDesktopW
GetWindow
GetMonitorInfoW
SetCursor
GetWindowTextLengthW
ScreenToClient
CharNextW
FillRect
SetCapture
DrawTextW
DialogBoxParamW
LoadCursorW
SetFocus
BeginPaint
PtInRect
GetCapture
OffsetRect
GetClassNameW
GetCursorPos
GetActiveWindow
CreateWindowExW
ReleaseCapture
UpdateWindow
CallWindowProcW
DefWindowProcW
ClientToScreen
InvalidateRect
GetSysColor
ShowWindow
EnableWindow
GetDlgCtrlID
MoveWindow
SetTimer
GetWindowRect
KillTimer
GetParent
GetClientRect
LoadIconW
GetWindowLongW
MonitorFromWindow
SetWindowLongW
EndDialog
SetWindowPos
SendMessageW
MapWindowPoints
SetWindowTextW
SetRectEmpty
gdi32
CreateDIBSection
GetDeviceCaps
GetDIBits
CreateDCW
SetBkMode
DeleteObject
SelectObject
DeleteDC
ExtTextOutW
RealizePalette
CreateFontW
SelectPalette
GetObjectW
SetTextAlign
GetStockObject
SetTextColor
CreateSolidBrush
CreateFontIndirectW
CreateCompatibleDC
StretchBlt
advapi32
RegDeleteKeyW
RegQueryValueExW
RegCloseKey
RegOpenKeyExW
RegDeleteValueW
RegSetValueExW
OpenProcessToken
GetTokenInformation
AllocateAndInitializeSid
FreeSid
OpenThreadToken
LookupAccountSidW
GetUserNameW
CheckTokenMembership
RegCreateKeyExW
shell32
ShellExecuteExW
SHGetSpecialFolderLocation
SHGetFileInfoW
SHGetFolderPathW
SHFileOperationW
SHGetPathFromIDListW
SHBrowseForFolderW
ShellExecuteW
SHChangeNotify
ole32
CoInitialize
CoCreateInstance
CoInitializeEx
CoUninitialize
CoTaskMemFree
oleaut32
SysAllocString
VariantClear
VariantInit
SysFreeString
comctl32
_TrackMouseEvent
InitCommonControlsEx
ImageList_Create
wininet
InternetSetOptionW
HttpSendRequestW
InternetOpenW
InternetCloseHandle
HttpEndRequestW
HttpOpenRequestW
HttpQueryInfoW
InternetWriteFile
InternetConnectW
InternetReadFile
InternetCrackUrlW
HttpSendRequestExW
Sections
.text Size: 1.6MB - Virtual size: 1.6MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 252KB - Virtual size: 252KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2.0MB - Virtual size: 2.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024KB - Virtual size: 411.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 64KB - Virtual size: 63KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ