Static task
static1
Behavioral task
behavioral1
Sample
81b23d07b580c16b60d35fcd4dc399313042394ad795f2241754ede59745b218.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
81b23d07b580c16b60d35fcd4dc399313042394ad795f2241754ede59745b218.exe
Resource
win10v2004-20220414-en
General
-
Target
81b23d07b580c16b60d35fcd4dc399313042394ad795f2241754ede59745b218
-
Size
521KB
-
MD5
6daad96aa8bb3a1dd6de3e17e37e4d04
-
SHA1
5974bbf965584a1a36c346710210bc4340f2e914
-
SHA256
81b23d07b580c16b60d35fcd4dc399313042394ad795f2241754ede59745b218
-
SHA512
5f4a042cb09bd0de477b69f19d832b58470de7328c79489ee953712c071acbac72fd0fc79f014f22f95d3173f2baea73e2086ab87c33898d6d709a3539b81324
-
SSDEEP
3072:aaJU0yU9VRyDIdp9D9d8GpfJd5DSqvOYxGZo5KKtRmHeuYHxrOxx0UBM:aasKdp95mG/2qJGuQSRoeuWxMB
Malware Config
Signatures
Files
-
81b23d07b580c16b60d35fcd4dc399313042394ad795f2241754ede59745b218.exe windows x86
09bd7858ed4ec198b5f5c8e9ff37e5d1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ReadFile
RemoveDirectoryW
RtlUnwind
SetFileAttributesW
SetFilePointer
SetHandleCount
SetLastError
SetVolumeLabelW
SetVolumeMountPointW
Sleep
TerminateProcess
TerminateThread
TlsAlloc
PeekNamedPipe
TlsSetValue
UnhandledExceptionFilter
VirtualFree
VirtualQuery
WaitForSingleObject
WaitNamedPipeA
WideCharToMultiByte
WinExec
WriteFile
lstrcpyA
lstrcpynW
lstrlen
lstrlenA
OpenProcess
MultiByteToWideChar
MoveFileWithProgressW
LocalFree
LocalAlloc
LeaveCriticalSection
LCMapStringW
LCMapStringA
InterlockedIncrement
InterlockedDecrement
InitializeCriticalSection
HeapReAlloc
HeapFree
HeapDestroy
HeapCreate
HeapAlloc
GetVolumeInformationA
GetVersionExA
GetVersion
GetTickCount
GetTempPathA
GetStringTypeW
GetStringTypeA
GetStdHandle
GetStartupInfoA
GetOEMCP
GetModuleFileNameA
GetLastError
GetFullPathNameW
GetFileType
GetFileAttributesW
GetFileAttributesA
GetEnvironmentVariableA
GetEnvironmentStringsW
GetEnvironmentStrings
GetDriveTypeA
GetCurrentThreadId
GetCurrentProcess
GetCommandLineA
GetCPInfo
GetBinaryTypeA
GetACP
FreeEnvironmentStringsW
FreeEnvironmentStringsA
FormatMessageA
FindNextFileW
FindFirstFileW
FindClose
EnterCriticalSection
DuplicateHandle
DisconnectNamedPipe
DeviceIoControl
DeleteFileW
CreateThread
CreateNamedPipeA
CreateMailslotA
CreateFileW
CreateFileA
CreateDirectoryW
CreateDirectoryA
CopyFileExW
CopyFileA
ConnectNamedPipe
CloseHandle
VirtualAlloc
GetModuleHandleW
LoadLibraryA
GetModuleHandleA
ExitProcess
TlsGetValue
GetProcAddress
user32
SetTimer
SendMessageA
OpenDesktopW
MonitorFromWindow
MessageBoxA
MessageBeep
LoadMenuW
KillTimer
IntersectRect
GetWindowModuleFileName
GetClientRect
EnableWindow
DrawIcon
CreateIconIndirect
ChangeDisplaySettingsExA
LoadIconA
GetClipboardSequenceNumber
GetDC
GetTopWindow
GetWindowTextLengthW
CharLowerW
GetSystemMetrics
GetMessageExtraInfo
CharNextA
CharNextW
IsCharUpperA
IsMenu
GetKeyboardLayout
GetWindowTextLengthA
CloseWindow
InSendMessage
DrawMenuBar
IsCharLowerW
IsCharUpperW
GetAsyncKeyState
CharUpperA
GetMessageTime
IsWindowUnicode
GetParent
EndMenu
GetInputState
PaintDesktop
GetDesktopWindow
GetForegroundWindow
CharUpperW
GetCursor
GetSysColorBrush
GetMenuCheckMarkDimensions
GetMessagePos
EnumClipboardFormats
GetWindowContextHelpId
GetShellWindow
OpenIcon
GetSysColor
ShowCaret
VkKeyScanA
DestroyMenu
IsWindowVisible
CloseDesktop
GetDialogBaseUnits
IsGUIThread
GetClipboardOwner
DestroyCursor
IsCharAlphaW
GetClipboardViewer
IsCharLowerA
CopyIcon
GetFocus
CloseClipboard
DestroyIcon
GetLastActivePopup
GetKeyboardType
VkKeyScanW
LoadCursorFromFileA
IsIconic
IsCharAlphaA
OemKeyScan
GetDoubleClickTime
ReleaseCapture
DestroyWindow
gdi32
GdiEntry7
GdiGetLocalFont
GetColorSpace
GetDeviceGammaRamp
EnumFontsA
EndFormPage
PlayMetaFile
PlgBlt
SetBrushOrgEx
GetObjectA
EngFillPath
CreateCompatibleBitmap
RealizePalette
CombineTransform
ColorMatchToTarget
ChoosePixelFormat
CLIPOBJ_cEnumStart
GetBkColor
CreateHalftonePalette
BeginPath
GdiFlush
AddFontResourceW
EndPage
WidenPath
DeleteColorSpace
GetObjectType
GetMapMode
GetROP2
GetStretchBltMode
SwapBuffers
GetPixelFormat
OffsetWindowOrgEx
GetSystemPaletteUse
EndPath
GetEnhMetaFileW
PathToRegion
GetStockObject
GetTextCharacterExtra
GetLayout
GetDCPenColor
CloseFigure
CloseEnhMetaFile
GetEnhMetaFileA
GetTextCharset
FillPath
GetPolyFillMode
DeleteObject
comdlg32
GetSaveFileNameA
advapi32
SetSecurityDescriptorDacl
SetSecurityDescriptorControl
SetFileSecurityW
RegSetValueExA
RegOpenKeyExA
RegCloseKey
OpenProcessToken
LookupPrivilegeValueA
LookupAccountNameA
IsValidSecurityDescriptor
InitializeSecurityDescriptor
InitializeAcl
GetUserNameA
GetSecurityDescriptorControl
GetLengthSid
GetFileSecurityW
AdjustTokenPrivileges
AddAccessAllowedAce
RegOpenKeyW
SetSecurityDescriptorOwner
shell32
ShellExecuteExA
SHIsFileAvailableOffline
SHGetSpecialFolderPathA
SHGetPathFromIDListA
SHGetFileInfoW
SHFreeNameMappings
SHFileOperationW
SHCreateDirectoryExW
SHBrowseForFolderA
ExtractIconA
shlwapi
StrChrW
StrChrIA
Sections
.text Size: 352KB - Virtual size: 351KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 129KB - Virtual size: 128KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ