Static task
static1
Behavioral task
behavioral1
Sample
c622c349ef324e753ef4eb8cc9cd834881d2d463304372e07bfae6479f80f269.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c622c349ef324e753ef4eb8cc9cd834881d2d463304372e07bfae6479f80f269.exe
Resource
win10v2004-20220901-en
General
-
Target
c622c349ef324e753ef4eb8cc9cd834881d2d463304372e07bfae6479f80f269
-
Size
147KB
-
MD5
e00980f173e77e9fe1b69d10f5145b5b
-
SHA1
5d4f143776b88b931ddb491a3d205138769c008a
-
SHA256
c622c349ef324e753ef4eb8cc9cd834881d2d463304372e07bfae6479f80f269
-
SHA512
be6e8c219a191e984a79966b5f809dc31c15c67ee4cd0948125e2a18a788f7218f186f40d9f5639f5d97b52c705dd444472b233dc4ab1e890465fb9d79782804
-
SSDEEP
3072:taxJXSniloQOOCcwdMacB5dHLnuoiqbREcvwhAP3LpsKt9p6yhWreC+zf:0rXV6cwJBoixAw+P3jtL6ReC+z
Malware Config
Signatures
Files
-
c622c349ef324e753ef4eb8cc9cd834881d2d463304372e07bfae6479f80f269.exe windows x86
a88052c695a4da4e64c1bea8793db742
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualAlloc
FormatMessageW
HeapDestroy
ExitProcess
GetStartupInfoW
GetCurrentProcess
VirtualAlloc
CreateFileW
QueryPerformanceCounter
InitializeCriticalSection
LoadLibraryW
SetUnhandledExceptionFilter
GetModuleHandleA
WaitForSingleObject
UnhandledExceptionFilter
LoadLibraryExW
LocalAlloc
GetSystemTimeAsFileTime
GetACP
GetProcessHeap
GetSystemTimeAsFileTime
lstrcmpiW
VirtualAlloc
WriteFile
GetCurrentThreadId
GetModuleHandleW
ExitProcess
GetTickCount
CloseHandle
shell32
SHGetSpecialFolderLocation
SHGetDesktopFolder
CommandLineToArgvW
DragAcceptFiles
ShellAboutW
ExtractIconW
SHGetDesktopFolder
DragFinish
SHGetSpecialFolderPathW
ShellExecuteExW
CommandLineToArgvW
Shell_NotifyIconW
SHGetSpecialFolderLocation
CommandLineToArgvW
Shell_NotifyIconW
SHGetDesktopFolder
SHGetDesktopFolder
SHGetPathFromIDListW
SHChangeNotify
Shell_NotifyIconW
ExtractIconExW
DragQueryFileW
DragFinish
DragAcceptFiles
user32
LoadMenuW
SetTimer
KillTimer
GetWindowTextW
PostMessageW
PtInRect
TranslateMessage
SetTimer
LoadImageW
RegisterClassW
CopyRect
GetSubMenu
SendMessageW
IsIconic
MoveWindow
MessageBoxA
GetParent
PostQuitMessage
SetRect
GetWindowRect
DispatchMessageA
SetFocus
SetFocus
ShowWindow
GetWindowRect
GetDlgItemTextW
GetMessageW
gdi32
CreateCompatibleDC
TextOutW
GetStockObject
SetBkMode
SetBkMode
ExtTextOutW
GetDeviceCaps
SetBkMode
StretchBlt
StretchBlt
CreateCompatibleBitmap
DeleteObject
GetDeviceCaps
StretchBlt
StretchBlt
SetTextColor
GetObjectW
CreateBitmap
DeleteObject
PatBlt
TextOutW
CreateFontIndirectW
GetObjectW
DeleteDC
SetTextColor
LineTo
MoveToEx
GetTextMetricsW
LineTo
GetStockObject
advapi32
RegSetValueExA
GetLengthSid
RegSetValueExA
AddAccessAllowedAce
SetSecurityDescriptorDacl
RegSetValueExW
RegCreateKeyExW
RegOpenKeyExA
RegOpenKeyW
RegQueryValueExW
AllocateAndInitializeSid
GetLengthSid
GetLengthSid
RegOpenKeyExA
AddAccessAllowedAce
AdjustTokenPrivileges
RegOpenKeyExA
RegCloseKey
CloseServiceHandle
AdjustTokenPrivileges
RegEnumValueW
RegEnumKeyExW
RegEnumValueW
RegCreateKeyExA
RegEnumKeyExW
AddAccessAllowedAce
OpenThreadToken
RegDeleteKeyW
RegSetValueExW
RegOpenKeyExW
RegCloseKey
RegOpenKeyW
Sections
.text Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 128KB - Virtual size: 132KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ