Behavioral task
behavioral1
Sample
0074300f74c1ddb533cb66ee456cc51c2754af0cb3f32f33e46e044687f1e0a2.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
0074300f74c1ddb533cb66ee456cc51c2754af0cb3f32f33e46e044687f1e0a2.exe
Resource
win10v2004-20240802-en
General
-
Target
0074300f74c1ddb533cb66ee456cc51c2754af0cb3f32f33e46e044687f1e0a2
-
Size
380KB
-
MD5
31a284f66e2a9f8d4b9b2faae9a56adb
-
SHA1
fa440c1798e789947b9dbf4688b7e669ed58687c
-
SHA256
0074300f74c1ddb533cb66ee456cc51c2754af0cb3f32f33e46e044687f1e0a2
-
SHA512
c9b74bccfeb6d30469a37de10d2d5a0e32604b4c024c39f9bacfa7e10386b72a1c1dfec233a631dbd5e1e7cc675df4301d4d472e90ab212344e06f5be30ec065
-
SSDEEP
6144:2e1YlNk2GVPYzoBEuC8Wr9hrqc5FDlD6PX055trwL:9YlNRmFJC8y9hrqGdVt5rr
Malware Config
Signatures
Files
-
0074300f74c1ddb533cb66ee456cc51c2754af0cb3f32f33e46e044687f1e0a2.exe windows:4 windows x86 arch:x86
438bece8c96b99d017141b3f95b86408
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetNumberOfConsoleMouseButtons
lstrcatA
IsValidLanguageGroup
FreeResource
IsDBCSLeadByte
PostQueuedCompletionStatus
GetConsoleMode
DisableThreadLibraryCalls
FindNextFileW
GetVersion
WaitForSingleObjectEx
LCMapStringW
WriteProfileSectionW
GlobalFindAtomA
CopyFileExA
SetSystemPowerState
SetMailslotInfo
EnumSystemCodePagesW
FindNextFileA
GetThreadPriority
EnumDateFormatsExW
GlobalGetAtomNameW
GetStartupInfoW
GetProcessHeaps
DebugBreak
GetDiskFreeSpaceExW
TryEnterCriticalSection
SearchPathA
GlobalUnlock
UnregisterWait
GetThreadTimes
VirtualProtectEx
GetLastError
CreateMutexA
ContinueDebugEvent
ResumeThread
OutputDebugStringA
OutputDebugStringW
SetThreadContext
GetThreadContext
WaitForDebugEvent
WriteProcessMemory
UnmapViewOfFile
InitializeCriticalSection
FreeConsole
CreateThread
SuspendThread
DebugActiveProcess
SetEnvironmentVariableA
GetCurrentProcessId
MapViewOfFile
DuplicateHandle
GetCurrentProcess
CreateFileMappingA
GetVersionExA
GetProcAddress
LoadLibraryA
GetEnvironmentVariableA
VirtualProtect
VirtualAlloc
SetLastError
ReleaseMutex
WaitForSingleObject
OpenMutexA
SetErrorMode
GetShortPathNameA
GetModuleFileNameA
GetShortPathNameW
GetModuleFileNameW
GlobalLock
GlobalAlloc
WideCharToMultiByte
IsBadReadPtr
GlobalAddAtomA
GlobalAddAtomW
GlobalFree
GlobalGetAtomNameA
GlobalDeleteAtom
ExitProcess
GetLocalTime
MultiByteToWideChar
GetTempPathA
GetTempPathW
GetTempFileNameA
GetTempFileNameW
GetWindowsDirectoryA
CreateFileA
GetPrivateProfileStringA
WritePrivateProfileStringA
EnterCriticalSection
MoveFileA
CreateProcessA
GetStartupInfoA
GetCommandLineA
GetCurrentThreadId
ReadFile
GetFileSize
GetProcessHeap
FlushFileBuffers
WriteConsoleW
SetStdHandle
GetConsoleCP
SetFilePointer
HeapReAlloc
GetStringTypeW
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
GetTimeZoneInformation
LoadLibraryW
FreeLibrary
SetConsoleCtrlHandler
FatalAppExitA
IsValidCodePage
GetOEMCP
GetACP
QueryPerformanceCounter
HeapDestroy
HeapCreate
GetFileType
InitializeCriticalSectionAndSpinCount
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
HeapSize
GetLocaleInfoW
GetStdHandle
WriteFile
IsProcessorFeaturePresent
CompareStringW
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
GetCPInfo
HeapAlloc
GetDateFormatA
GetTimeFormatA
GetModuleHandleW
HeapFree
GetSystemTimeAsFileTime
RaiseException
ReadProcessMemory
LeaveCriticalSection
GetExitCodeProcess
GetCurrentThread
SetThreadPriority
Sleep
GetTickCount
VirtualQueryEx
CreateEventA
SetEvent
CloseHandle
GetModuleHandleA
DeleteFileA
GetCommandLineW
RtlUnwind
FormatMessageA
InterlockedIncrement
InterlockedDecrement
InterlockedCompareExchange
InterlockedExchange
DeleteCriticalSection
SetEndOfFile
SetFilePointerEx
CreateFileW
FindClose
RemoveDirectoryW
DeleteFileW
DeviceIoControl
GetFullPathNameW
FindFirstFileW
GetFileAttributesW
CreateDirectoryExW
CopyFileW
GetCurrentDirectoryW
SetCurrentDirectoryW
GetFileInformationByHandle
GetFileAttributesExW
GetFileTime
SetFileTime
MoveFileExW
CreateDirectoryW
AreFileApisANSI
LocalFree
user32
ChildWindowFromPointEx
UnpackDDElParam
GetMenuContextHelpId
MapVirtualKeyExA
IsZoomed
GetClassNameA
GetClassInfoExW
CharToOemBuffW
DialogBoxParamA
DialogBoxIndirectParamA
EndPaint
CountClipboardFormats
IsCharAlphaA
SystemParametersInfoW
FlashWindow
DdeReconnect
RemoveMenu
SetDebugErrorLevel
DdeFreeDataHandle
GetWindowLongW
AdjustWindowRectEx
DdeGetLastError
RegisterWindowMessageW
GetMenuStringW
GetWindowTextA
InvalidateRgn
PtInRect
GetShellWindow
SetTimer
EnumThreadWindows
CharUpperW
GetWindowWord
BeginPaint
KillTimer
GetAsyncKeyState
DefDlgProcA
DrawTextA
CreateDialogParamA
RegisterClassExA
GetWindowTextLengthA
SetWindowTextA
GetDlgItem
CreateDialogIndirectParamA
ShowWindow
UpdateWindow
InSendMessage
FreeDDElParam
DefWindowProcW
DefWindowProcA
LoadCursorA
RegisterClassW
CreateWindowExW
RegisterClassA
CreateWindowExA
GetWindowThreadProcessId
SendMessageW
PeekMessageA
EnumWindows
IsWindowUnicode
PackDDElParam
PostMessageW
PostMessageA
IsWindow
LoadStringA
LoadStringW
FindWindowA
DestroyWindow
GetDesktopWindow
GetSystemMetrics
MoveWindow
SendMessageA
SetPropA
GetPropA
WaitForInputIdle
GetMessageA
TranslateMessage
DispatchMessageA
MessageBoxA
GetKeyState
gdi32
RestoreDC
PolylineTo
BeginPath
RectInRegion
PATHOBJ_vEnumStart
GdiGetLocalDC
GdiGetCodePage
EngFillPath
GetPaletteEntries
CheckColorsInGamut
SetPaletteEntries
CreateHatchBrush
GetBitmapBits
GetStretchBltMode
SelectObject
BitBlt
DeleteObject
CreatePalette
CreateDCA
SelectPalette
RealizePalette
CreateDIBitmap
DeleteDC
CreateCompatibleDC
GetStockObject
GetEnhMetaFileBits
advapi32
RegQueryValueExW
RegOpenKeyExW
RegOpenKeyW
RegDeleteKeyW
RegCloseKey
GetUserNameW
StartServiceW
OpenServiceW
OpenSCManagerW
CloseServiceHandle
CryptVerifySignatureW
CryptDestroyHash
CryptHashData
CryptCreateHash
CryptImportKey
CryptDestroyKey
CryptReleaseContext
CryptAcquireContextW
RegOpenKeyA
shell32
SHGetFolderPathW
SHAppBarMessage
SHChangeNotify
DragAcceptFiles
SHLoadNonloadedIconOverlayIdentifiers
ShellExecuteW
SHGetMalloc
SHFreeNameMappings
SHBrowseForFolder
ExtractIconExW
SHGetInstanceExplorer
SHBrowseForFolderW
SHGetPathFromIDListA
DragQueryFileA
SHCreateProcessAsUserW
SHEmptyRecycleBinA
SHGetDataFromIDListW
SHAddToRecentDocs
Shell_NotifyIcon
Shell_NotifyIconW
ShellAboutW
SHGetIconOverlayIndexW
Shell_NotifyIconA
DragQueryFileAorW
ShellHookProc
SHInvokePrinterCommandA
SHIsFileAvailableOffline
SHFileOperationA
SHGetSpecialFolderPathA
shlwapi
StrRChrA
StrRStrIW
StrCmpNIA
StrChrIA
StrStrA
StrChrIW
StrChrA
Sections
.text Size: 292KB - Virtual size: 292KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text3 Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text2 Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 56KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ