Static task
static1
Behavioral task
behavioral1
Sample
78fb8d34cf3e034fbbaefd8f7587bd364a000a1e12c4a6fa45e192d56b93a25a.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
78fb8d34cf3e034fbbaefd8f7587bd364a000a1e12c4a6fa45e192d56b93a25a.exe
Resource
win10v2004-en-20220112
General
-
Target
78fb8d34cf3e034fbbaefd8f7587bd364a000a1e12c4a6fa45e192d56b93a25a
-
Size
364KB
-
MD5
57e3d794b333f6ba4d2a968a54c7f7d8
-
SHA1
e850e2963deaea7e6d43c1390f4d69b20ed62a67
-
SHA256
78fb8d34cf3e034fbbaefd8f7587bd364a000a1e12c4a6fa45e192d56b93a25a
-
SHA512
427820fb45cfd1a95e37fd36da5c48917547eb6c1ed727f3d9dbaec337cc2ad43d74e4d043fb603a078e42205822bf1055fa1c04707845ceeced5ef03f30127f
-
SSDEEP
6144:Sx0s5c9jrLrLrLZMEQ9V6wZqEZw0eNsd198V50DErNNg/ydlb4fQ6wFMvMK:mMAwmlDYNg6dNoQl+vD
Malware Config
Signatures
Files
-
78fb8d34cf3e034fbbaefd8f7587bd364a000a1e12c4a6fa45e192d56b93a25a.exe windows x86
c9d651bda19cba7b717568752a72eb25
Code Sign
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
MessageBoxA
GetForegroundWindow
DestroyWindow
PostQuitMessage
ShutdownBlockReasonCreate
DefWindowProcA
AdjustWindowRect
AnimateWindow
MessageBoxW
ShutdownBlockReasonDestroy
RegisterClassExW
CreateWindowExW
GetMessageA
TranslateMessage
DispatchMessageA
DeferWindowPos
ReleaseDC
EnumChildWindows
wsprintfW
wsprintfA
CloseWindow
gdi32
SetPixel
DeleteObject
SelectPalette
SetPaletteEntries
GetDeviceCaps
kernel32
LoadLibraryA
TlsSetValue
lstrcpyA
lstrcatA
GetLastError
GetProcAddress
lstrlenW
CreateDirectoryW
HeapAlloc
TlsGetValue
LocalAlloc
lstrcpynW
lstrcatW
FindNextFileW
lstrcmpW
FindClose
GetTickCount
VirtualFree
ExitThread
CreateThread
CloseHandle
OutputDebugStringW
ExitProcess
VirtualAlloc
CreateFileW
WriteFile
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
GetModuleHandleW
GetSystemDirectoryW
CreateProcessW
GetShortPathNameW
GetModuleHandleA
Sleep
lstrlenA
GetCurrentProcessId
VirtualQuery
VirtualProtect
IsBadReadPtr
FreeLibrary
lstrcmpA
AllocConsole
GetStdHandle
WriteConsoleW
UnmapViewOfFile
lstrcmpiW
lstrcpyW
SetFileAttributesW
MoveFileExW
FindFirstFileW
WaitForMultipleObjects
GetDriveTypeW
GetTickCount64
SetThreadExecutionState
GetCommandLineW
CreateMutexW
GetFileSizeEx
IsProcessorFeaturePresent
ReadFile
CreateFileMappingW
MapViewOfFile
GetCurrentProcess
LocalFree
GetUserDefaultUILanguage
InitializeCriticalSection
DeleteCriticalSection
SetLastError
EnterCriticalSection
LeaveCriticalSection
TerminateThread
GlobalAlloc
GlobalFree
Beep
GetVersionExA
ExpandEnvironmentStringsW
WaitForSingleObject
SetFilePointerEx
advapi32
LsaClose
LsaFreeMemory
LsaAddAccountRights
EncryptionDisable
LsaCreateTrustedDomainEx
CryptDecrypt
CryptEncrypt
CryptImportKey
GetSidSubAuthority
GetSidSubAuthorityCount
EqualDomainSid
CryptReleaseContext
CryptDestroyKey
CryptExportKey
CryptGenKey
CryptAcquireContextW
AreAllAccessesGranted
LookupAccountSidW
LsaQueryTrustedDomainInfo
CryptGenRandom
shell32
ShellExecuteExW
SHGetFolderPathW
secur32
LsaConnectUntrusted
netapi32
DsRoleGetPrimaryDomainInformation
DsRoleFreeMemory
shlwapi
StrStrW
StrToIntA
mpr
WNetOpenEnumW
WNetEnumResourceW
WNetCloseEnum
WNetAddConnection2W
ws2_32
shutdown
closesocket
connect
htons
inet_addr
WSAGetLastError
WSACleanup
socket
WSAStartup
inet_pton
send
gethostbyname
inet_ntoa
recv
wininet
InternetReadFile
InternetCloseHandle
HttpQueryInfoA
HttpSendRequestA
HttpOpenRequestA
InternetConnectA
InternetCrackUrlA
InternetOpenA
crypt32
CryptBinaryToStringW
CryptBinaryToStringA
CryptStringToBinaryA
ole32
CoInitializeEx
CoUninitialize
CoCreateInstance
oleaut32
VariantClear
VariantInit
Sections
.text Size: 232KB - Virtual size: 232KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 64KB - Virtual size: 63KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 66KB - Virtual size: 66KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE