Static task
static1
Behavioral task
behavioral1
Sample
9d86beb9d4b07dec9db6a692362ac3fce2275065194a3bda739fe1d1f4d9afc7.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
9d86beb9d4b07dec9db6a692362ac3fce2275065194a3bda739fe1d1f4d9afc7.exe
Resource
win10v2004-en-20220112
General
-
Target
9d86beb9d4b07dec9db6a692362ac3fce2275065194a3bda739fe1d1f4d9afc7
-
Size
350KB
-
MD5
a0dc59b0f4fdf6d4656946865433bcce
-
SHA1
c10fd0163c42f1149d5dcfb44e31b53a4fe6c6c9
-
SHA256
9d86beb9d4b07dec9db6a692362ac3fce2275065194a3bda739fe1d1f4d9afc7
-
SHA512
37ca081cb529aef7facea47985e88ce2a8011f2a7a89978a54152c688b77b974326ca8ab27012f0d05866a20f5fb961b65309a26fc3eb49b487f3b0e6216abff
-
SSDEEP
6144:Ufjw8p8tUwrLrLrLEWXHQtLWd5oNVFq//6751bLV50DEr0Ng/ydlb4fQ6wFMvbZ:kPWQgeVFN8DZNg6dNoQl+v
Malware Config
Signatures
Files
-
9d86beb9d4b07dec9db6a692362ac3fce2275065194a3bda739fe1d1f4d9afc7.exe windows x86
a1f192ee62a213683b57dc025f9cfba1
Code Sign
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
PostQuitMessage
ShutdownBlockReasonCreate
DefWindowProcA
MessageBoxW
DeferWindowPos
ShutdownBlockReasonDestroy
RegisterClassExW
CreateWindowExW
EnumChildWindows
AnimateWindow
GetForegroundWindow
GetMessageA
TranslateMessage
DispatchMessageA
ReleaseDC
CloseWindow
AdjustWindowRect
DestroyWindow
wsprintfW
gdi32
DeleteObject
SetPixel
SelectPalette
GetDeviceCaps
SetPaletteEntries
kernel32
LocalAlloc
ReadFile
CloseHandle
WriteFile
DeviceIoControl
OpenMutexW
CreateMutexW
lstrlenA
OutputDebugStringW
GetModuleHandleA
LoadLibraryA
lstrcpyA
lstrcatA
GetProcAddress
GetTickCount
WaitForSingleObject
TlsSetValue
CreateFileW
HeapAlloc
VirtualAlloc
VirtualFree
TlsGetValue
ExitThread
GetFileSize
ExitProcess
GetLastError
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
GetModuleHandleW
GetSystemDirectoryW
CreateProcessW
GetShortPathNameW
CreateFileA
Sleep
GetCurrentProcessId
VirtualQuery
VirtualProtect
IsBadReadPtr
FreeLibrary
lstrcmpA
UnmapViewOfFile
lstrcmpiW
lstrlenW
lstrcpyW
MoveFileExW
FindFirstFileW
lstrcmpW
FindNextFileW
FindClose
CreateThread
WaitForMultipleObjects
GetDriveTypeW
GetTickCount64
SetThreadExecutionState
IsProcessorFeaturePresent
SetFilePointerEx
CreateFileMappingW
MapViewOfFile
GetCurrentProcess
LocalFree
GetUserDefaultUILanguage
InitializeCriticalSection
DeleteCriticalSection
SetLastError
EnterCriticalSection
LeaveCriticalSection
TerminateThread
GlobalAlloc
GlobalFree
Beep
GetWindowsDirectoryA
MoveFileExA
GetVersionExA
ExpandEnvironmentStringsW
lstrcatW
GetFileSizeEx
advapi32
AreAllAccessesGranted
EncryptionDisable
EqualDomainSid
LsaCreateTrustedDomainEx
CryptDecrypt
CryptEncrypt
CryptImportKey
GetSidSubAuthority
GetSidSubAuthorityCount
LookupAccountSidW
CryptReleaseContext
CryptDestroyKey
CryptExportKey
CryptGenKey
CryptAcquireContextW
LsaQueryTrustedDomainInfo
CryptGenRandom
LsaClose
LsaAddAccountRights
InitializeSecurityDescriptor
LsaFreeMemory
shell32
ShellExecuteExW
SHGetFolderPathW
secur32
LsaConnectUntrusted
netapi32
DsRoleFreeMemory
DsRoleGetPrimaryDomainInformation
shlwapi
StrStrW
StrToIntA
mpr
WNetCloseEnum
WNetAddConnection2W
WNetEnumResourceW
WNetOpenEnumW
ws2_32
WSAGetLastError
shutdown
closesocket
connect
htons
inet_pton
inet_addr
WSACleanup
socket
WSAStartup
inet_ntoa
gethostbyname
recv
send
wininet
HttpOpenRequestA
InternetReadFile
InternetCloseHandle
HttpQueryInfoA
HttpSendRequestA
InternetConnectA
InternetCrackUrlA
InternetOpenA
crypt32
CryptBinaryToStringA
CryptStringToBinaryA
ole32
CoCreateInstance
CoInitializeEx
CoUninitialize
Sections
.text Size: 222KB - Virtual size: 221KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 62KB - Virtual size: 62KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 65KB - Virtual size: 64KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE