Static task
static1
Behavioral task
behavioral1
Sample
c68d8ab7b858e2cdbb9a7f4bf08ea1548dd376493128024f6680479a839da12e.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
c68d8ab7b858e2cdbb9a7f4bf08ea1548dd376493128024f6680479a839da12e.exe
Resource
win10v2004-en-20220113
General
-
Target
c68d8ab7b858e2cdbb9a7f4bf08ea1548dd376493128024f6680479a839da12e
-
Size
777KB
-
MD5
a5de1b67af09381692eea756e05b9657
-
SHA1
ab91d51cc1e17f3f4f5d384c53f26d867b25916b
-
SHA256
c68d8ab7b858e2cdbb9a7f4bf08ea1548dd376493128024f6680479a839da12e
-
SHA512
03ebc4d716aa2927eca82225be8477f0437e2d7ab9fb9b8f4be93868ed0d4b81ef9329ea19c7eb177dae607c6fd889928984284722503675c22e5158b3c3bdf9
-
SSDEEP
12288:KPWQgeVFN8DZNg6dNoQl+vY/rRqYqG+D59yBDIWgu5BLQlZ:KuQgeZcRroQRrNqG/DIWgQBcl
Malware Config
Signatures
Files
-
c68d8ab7b858e2cdbb9a7f4bf08ea1548dd376493128024f6680479a839da12e.exe windows x86
a1f192ee62a213683b57dc025f9cfba1
Code Sign
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
PostQuitMessage
ShutdownBlockReasonCreate
DefWindowProcA
MessageBoxW
DeferWindowPos
ShutdownBlockReasonDestroy
RegisterClassExW
CreateWindowExW
EnumChildWindows
AnimateWindow
GetForegroundWindow
GetMessageA
TranslateMessage
DispatchMessageA
ReleaseDC
CloseWindow
AdjustWindowRect
DestroyWindow
wsprintfW
gdi32
DeleteObject
SetPixel
SelectPalette
GetDeviceCaps
SetPaletteEntries
kernel32
LocalAlloc
ReadFile
CloseHandle
WriteFile
DeviceIoControl
OpenMutexW
CreateMutexW
lstrlenA
OutputDebugStringW
GetModuleHandleA
LoadLibraryA
lstrcpyA
lstrcatA
GetProcAddress
GetTickCount
WaitForSingleObject
TlsSetValue
CreateFileW
HeapAlloc
VirtualAlloc
VirtualFree
TlsGetValue
ExitThread
GetFileSize
ExitProcess
GetLastError
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
GetModuleHandleW
GetSystemDirectoryW
CreateProcessW
GetShortPathNameW
CreateFileA
Sleep
GetCurrentProcessId
VirtualQuery
VirtualProtect
IsBadReadPtr
FreeLibrary
lstrcmpA
UnmapViewOfFile
lstrcmpiW
lstrlenW
lstrcpyW
MoveFileExW
FindFirstFileW
lstrcmpW
FindNextFileW
FindClose
CreateThread
WaitForMultipleObjects
GetDriveTypeW
GetTickCount64
SetThreadExecutionState
IsProcessorFeaturePresent
SetFilePointerEx
CreateFileMappingW
MapViewOfFile
GetCurrentProcess
LocalFree
GetUserDefaultUILanguage
InitializeCriticalSection
DeleteCriticalSection
SetLastError
EnterCriticalSection
LeaveCriticalSection
TerminateThread
GlobalAlloc
GlobalFree
Beep
GetWindowsDirectoryA
MoveFileExA
GetVersionExA
ExpandEnvironmentStringsW
lstrcatW
GetFileSizeEx
advapi32
AreAllAccessesGranted
EncryptionDisable
EqualDomainSid
LsaCreateTrustedDomainEx
CryptDecrypt
CryptEncrypt
CryptImportKey
GetSidSubAuthority
GetSidSubAuthorityCount
LookupAccountSidW
CryptReleaseContext
CryptDestroyKey
CryptExportKey
CryptGenKey
CryptAcquireContextW
LsaQueryTrustedDomainInfo
CryptGenRandom
LsaClose
LsaAddAccountRights
InitializeSecurityDescriptor
LsaFreeMemory
shell32
ShellExecuteExW
SHGetFolderPathW
secur32
LsaConnectUntrusted
netapi32
DsRoleFreeMemory
DsRoleGetPrimaryDomainInformation
shlwapi
StrStrW
StrToIntA
mpr
WNetCloseEnum
WNetAddConnection2W
WNetEnumResourceW
WNetOpenEnumW
ws2_32
WSAGetLastError
shutdown
closesocket
connect
htons
inet_pton
inet_addr
WSACleanup
socket
WSAStartup
inet_ntoa
gethostbyname
recv
send
wininet
HttpOpenRequestA
InternetReadFile
InternetCloseHandle
HttpQueryInfoA
HttpSendRequestA
InternetConnectA
InternetCrackUrlA
InternetOpenA
crypt32
CryptBinaryToStringA
CryptStringToBinaryA
ole32
CoCreateInstance
CoInitializeEx
CoUninitialize
Sections
.text Size: 222KB - Virtual size: 221KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 62KB - Virtual size: 62KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 65KB - Virtual size: 64KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE