Static task
static1
Behavioral task
behavioral1
Sample
5eaf5d22f937189275b6fae1257fc682194ca768a91d7b5e897770ad008f7112.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
5eaf5d22f937189275b6fae1257fc682194ca768a91d7b5e897770ad008f7112.exe
Resource
win10v2004-en-20220112
General
-
Target
5eaf5d22f937189275b6fae1257fc682194ca768a91d7b5e897770ad008f7112
-
Size
84KB
-
MD5
e1e6cc20c8ac3d45b335605cb3ebad92
-
SHA1
60ceafc423200bb22495998aaada0df0b43b3d11
-
SHA256
5eaf5d22f937189275b6fae1257fc682194ca768a91d7b5e897770ad008f7112
-
SHA512
0837073758f5453d564fceb91daa70a28381ced357a8d041480b7f44ae9dfc4ff4c161643ac259ef4d69ee967e1a9d340c9d1ec2d76afedbb3e267f788403f18
-
SSDEEP
1536:R/sbWFuHHegxNzOWMLQV6en+A6zX5ffnPsM3LC:tsSs+gPzxMLQken+LzJXnPsC
Malware Config
Signatures
Files
-
5eaf5d22f937189275b6fae1257fc682194ca768a91d7b5e897770ad008f7112.exe windows x86
89997a3d8402e315e3bfd97b7b8b3f9d
Code Sign
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
GetTokenInformation
RegOpenKeyExW
OpenProcessToken
SetSecurityDescriptorOwner
RegCreateKeyExW
SetEntriesInAclW
GetSecurityDescriptorDacl
OpenThreadToken
GetSecurityDescriptorOwner
FreeSid
RegSetValueExW
RegQueryValueW
SetSecurityDescriptorGroup
RegQueryValueExW
CopySid
IsValidSid
AllocateAndInitializeSid
GetLengthSid
RegCloseKey
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
comdlg32
ChooseFontW
gdi32
CreateFontIndirectW
GetTextExtentExPointW
DeleteDC
EndDoc
GetObjectW
SelectObject
DeleteObject
SetBkMode
StartDocW
GetDeviceCaps
SetMapMode
EndPage
StartPage
GetStockObject
GetTextMetricsW
CreateDCW
TextOutW
kernel32
FindNextFileW
MoveFileW
Sleep
LocalFree
TerminateProcess
HeapFree
UnmapViewOfFile
CreateMutexW
MapViewOfFileEx
SystemTimeToFileTime
QueryPerformanceCounter
HeapCreate
GetTempFileNameW
MulDiv
FindClose
GetTempPathW
LoadLibraryW
GetCurrentProcessId
CreateEventW
ReleaseMutex
GetCurrentThread
CreateDirectoryW
GetComputerNameW
HeapAlloc
CreateFileW
GetProfileIntW
GetProcessHeap
GetCurrentProcess
GetCurrentThreadId
CopyFileW
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetTickCount
CreateFileMappingW
WriteFile
GetUserDefaultUILanguage
GetCurrentThreadId
ReadFile
VirtualProtect
ExpandEnvironmentStringsW
GetFileAttributesW
VirtualFree
lstrlenW
GetTickCount
FindFirstFileW
GetSystemTime
GetFileSize
MapViewOfFile
WaitForSingleObject
GetSystemTimeAsFileTime
DeleteCriticalSection
FreeLibrary
OpenMutexW
InitializeCriticalSection
WaitForMultipleObjects
GetProcAddress
SetUnhandledExceptionFilter
SetEnvironmentVariableW
lstrlenA
GetLastError
lstrcpyW
SetFilePointer
GetCurrentThreadId
WideCharToMultiByte
UnhandledExceptionFilter
SetEndOfFile
MultiByteToWideChar
GetVersionExW
VirtualAlloc
GetCurrentProcessId
SetLastError
DeleteFileW
CloseHandle
msvcrt
_wsplitpath
iswspace
wcsstr
iswcntrl
strncpy
wcschr
strrchr
swprintf
iswalpha
_wcsicmp
_wcsnset
wcscpy
wcsrchr
wcsncmp
wcsncpy
_snwprintf
wcslen
wcscmp
_wcsdup
wcscat
_mbscpy
ole32
CoCreateInstance
CoInitialize
shell32
ShellExecuteExW
user32
EndDialog
IsDlgButtonChecked
UpdateWindow
EnableWindow
wsprintfW
GetWindowTextW
GetWindowContextHelpId
SetWindowTextW
InvalidateRect
WinHelpW
LoadStringW
CreateWindowExW
BeginPaint
MessageBoxW
CheckDlgButton
EndPaint
DialogBoxParamW
MessageBeep
SendMessageW
winspool.drv
OpenPrinterW
EnumPrintersW
ClosePrinter
GetPrinterW
Sections
.text Size: 35KB - Virtual size: 35KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 39KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ