Static task
static1
Behavioral task
behavioral1
Sample
71b684c0b52bfa1a8b79ee57b99af14a87b977489c08d002b784bdf7584993c5.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
71b684c0b52bfa1a8b79ee57b99af14a87b977489c08d002b784bdf7584993c5.exe
Resource
win10v2004-en-20220112
General
-
Target
71b684c0b52bfa1a8b79ee57b99af14a87b977489c08d002b784bdf7584993c5
-
Size
486KB
-
MD5
a66202a5f7e693196a03ebb371ab5c5f
-
SHA1
1d55ed4048f1ab5fc485776081526e758297e214
-
SHA256
71b684c0b52bfa1a8b79ee57b99af14a87b977489c08d002b784bdf7584993c5
-
SHA512
946a34003e65eafb866db270d90477bfa0828e230e42b7a998d11bddce21ca72fe31f23add3c714c4dcbb2c6c7e55df7328f662529819d3874e8973e78d4a5cf
-
SSDEEP
6144:Ufjw8p8tUwrLrLrLEWXHQtLWd5oNVFq//6751bLV50DEr0Ng/ydlb4fQ6wFMvbZC:kPWQgeVFN8DZNg6dNoQl+vU
Malware Config
Signatures
Files
-
71b684c0b52bfa1a8b79ee57b99af14a87b977489c08d002b784bdf7584993c5.exe windows x86
a1f192ee62a213683b57dc025f9cfba1
Code Sign
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
PostQuitMessage
ShutdownBlockReasonCreate
DefWindowProcA
MessageBoxW
DeferWindowPos
ShutdownBlockReasonDestroy
RegisterClassExW
CreateWindowExW
EnumChildWindows
AnimateWindow
GetForegroundWindow
GetMessageA
TranslateMessage
DispatchMessageA
ReleaseDC
CloseWindow
AdjustWindowRect
DestroyWindow
wsprintfW
gdi32
DeleteObject
SetPixel
SelectPalette
GetDeviceCaps
SetPaletteEntries
kernel32
LocalAlloc
ReadFile
CloseHandle
WriteFile
DeviceIoControl
OpenMutexW
CreateMutexW
lstrlenA
OutputDebugStringW
GetModuleHandleA
LoadLibraryA
lstrcpyA
lstrcatA
GetProcAddress
GetTickCount
WaitForSingleObject
TlsSetValue
CreateFileW
HeapAlloc
VirtualAlloc
VirtualFree
TlsGetValue
ExitThread
GetFileSize
ExitProcess
GetLastError
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
GetModuleHandleW
GetSystemDirectoryW
CreateProcessW
GetShortPathNameW
CreateFileA
Sleep
GetCurrentProcessId
VirtualQuery
VirtualProtect
IsBadReadPtr
FreeLibrary
lstrcmpA
UnmapViewOfFile
lstrcmpiW
lstrlenW
lstrcpyW
MoveFileExW
FindFirstFileW
lstrcmpW
FindNextFileW
FindClose
CreateThread
WaitForMultipleObjects
GetDriveTypeW
GetTickCount64
SetThreadExecutionState
IsProcessorFeaturePresent
SetFilePointerEx
CreateFileMappingW
MapViewOfFile
GetCurrentProcess
LocalFree
GetUserDefaultUILanguage
InitializeCriticalSection
DeleteCriticalSection
SetLastError
EnterCriticalSection
LeaveCriticalSection
TerminateThread
GlobalAlloc
GlobalFree
Beep
GetWindowsDirectoryA
MoveFileExA
GetVersionExA
ExpandEnvironmentStringsW
lstrcatW
GetFileSizeEx
advapi32
AreAllAccessesGranted
EncryptionDisable
EqualDomainSid
LsaCreateTrustedDomainEx
CryptDecrypt
CryptEncrypt
CryptImportKey
GetSidSubAuthority
GetSidSubAuthorityCount
LookupAccountSidW
CryptReleaseContext
CryptDestroyKey
CryptExportKey
CryptGenKey
CryptAcquireContextW
LsaQueryTrustedDomainInfo
CryptGenRandom
LsaClose
LsaAddAccountRights
InitializeSecurityDescriptor
LsaFreeMemory
shell32
ShellExecuteExW
SHGetFolderPathW
secur32
LsaConnectUntrusted
netapi32
DsRoleFreeMemory
DsRoleGetPrimaryDomainInformation
shlwapi
StrStrW
StrToIntA
mpr
WNetCloseEnum
WNetAddConnection2W
WNetEnumResourceW
WNetOpenEnumW
ws2_32
WSAGetLastError
shutdown
closesocket
connect
htons
inet_pton
inet_addr
WSACleanup
socket
WSAStartup
inet_ntoa
gethostbyname
recv
send
wininet
HttpOpenRequestA
InternetReadFile
InternetCloseHandle
HttpQueryInfoA
HttpSendRequestA
InternetConnectA
InternetCrackUrlA
InternetOpenA
crypt32
CryptBinaryToStringA
CryptStringToBinaryA
ole32
CoCreateInstance
CoInitializeEx
CoUninitialize
Sections
.text Size: 222KB - Virtual size: 221KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 62KB - Virtual size: 62KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 65KB - Virtual size: 64KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE