Static task
static1
Behavioral task
behavioral1
Sample
1f083a0e010a9d72bf88bab332e8555f0a073453aa9ba6a4e2f6bd426d36e649.exe
Resource
win7-20220311-en
Behavioral task
behavioral2
Sample
1f083a0e010a9d72bf88bab332e8555f0a073453aa9ba6a4e2f6bd426d36e649.exe
Resource
win10v2004-en-20220113
General
-
Target
1f083a0e010a9d72bf88bab332e8555f0a073453aa9ba6a4e2f6bd426d36e649
-
Size
500KB
-
MD5
379977ee9d9923365ef8172491bcbe61
-
SHA1
408ca15f74b945df3bd31161c3b6a25100d9428e
-
SHA256
1f083a0e010a9d72bf88bab332e8555f0a073453aa9ba6a4e2f6bd426d36e649
-
SHA512
b6668389e4411764b19ba94bf05fc38714f18fee04704bddd80edc0765a4846b708b476042605b3271ff6ba2ed7eca5db717756e44989d1a9f6b4e823b402d22
Malware Config
Signatures
Files
-
1f083a0e010a9d72bf88bab332e8555f0a073453aa9ba6a4e2f6bd426d36e649.exe windows x86
3daf35a604d66da16ca2b06bb5eca137
Code Sign
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
OpenProcess
MultiByteToWideChar
GetTimeZoneInformation
K32GetModuleFileNameExA
GetLastError
GetDateFormatA
CloseHandle
GetLocalTime
K32EnumProcesses
SetFilePointerEx
VirtualAllocEx
LocalFree
GetCurrentProcessId
SystemTimeToFileTime
WideCharToMultiByte
SystemTimeToTzSpecificLocalTime
GetTempFileNameW
K32EnumProcessModules
GetSystemTime
CreateEventA
GetTickCount
DecodePointer
WriteConsoleW
GetConsoleMode
GetConsoleCP
FlushFileBuffers
HeapReAlloc
GetSystemDefaultLangID
GetProcessHeap
GetStringTypeW
GetFileType
SetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetCPInfo
GetOEMCP
IsValidCodePage
FindNextFileA
FindFirstFileExA
LCMapStringW
WaitForSingleObject
FindClose
GetTempPathW
WaitForMultipleObjects
GetCurrentProcess
FindNextFileW
FindFirstFileW
HeapSize
CompareFileTime
HeapAlloc
HeapFree
GetACP
GetModuleFileNameA
CreateFileW
WriteFile
GetStdHandle
GetModuleHandleExW
ExitProcess
LoadLibraryExW
GetProcAddress
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
RaiseException
SetLastError
RtlUnwind
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
user32
IsWindowUnicode
UpdateWindow
GetCursorPos
GetAncestor
PtInRect
GetWindowThreadProcessId
GetLastActivePopup
GetDC
IsWindowVisible
GetSystemMetrics
ArrangeIconicWindows
GetShellWindow
IsWindow
IsHungAppWindow
GetWindowTextA
IsChild
SetClassWord
GetWindowLongA
GetQueueStatus
GetForegroundWindow
EnumWindows
BringWindowToTop
SetWindowContextHelpId
GetProcessDefaultLayout
SendMessageA
SetParent
GetWindowDC
IsZoomed
GetMenuItemRect
GetCaretBlinkTime
KillTimer
GetDesktopWindow
GetMenuItemInfoA
GetClipboardFormatNameA
advapi32
RegCloseKey
SetNamedSecurityInfoA
GetSidLengthRequired
GetNamedSecurityInfoA
RegOpenKeyExA
ConvertStringSidToSidA
GetSidIdentifierAuthority
SetEntriesInAclA
shell32
SHGetFolderLocation
SHBindToParent
ole32
CoTaskMemFree
CoInitialize
StringFromCLSID
oleaut32
SysAllocStringLen
VariantInit
LoadTypeLi
VariantChangeType
dwmapi
ord102
Sections
.text Size: 155KB - Virtual size: 154KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 25KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 512B - Virtual size: 252B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 315KB - Virtual size: 315KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ