Static task
static1
Behavioral task
behavioral1
Sample
dc8d7e4ed6b99c0107bf208b61811c51593a0d4498eae9e46c6ccd309234794a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
dc8d7e4ed6b99c0107bf208b61811c51593a0d4498eae9e46c6ccd309234794a.exe
Resource
win10v2004-20220812-en
General
-
Target
dc8d7e4ed6b99c0107bf208b61811c51593a0d4498eae9e46c6ccd309234794a
-
Size
300KB
-
MD5
05a299cf4df40e14e2cbc52f0d1f0de0
-
SHA1
fdeabad8f271ae0eae1a3c30a5dbacead7eeb129
-
SHA256
dc8d7e4ed6b99c0107bf208b61811c51593a0d4498eae9e46c6ccd309234794a
-
SHA512
3b971ce49d00def56024013d0db19caf9d83b243d5d02f0efb1f64cb6f9319d776c8e5712becf626eb2a55d810e524e0b42768a6f6bee8779d0197e34c2b1f19
-
SSDEEP
6144:t7mv19oqhJqryTM5nSOEt5zpaiRhcuGE07v6+uMHWzIH:t7mYq3fQ3wNxRhTKj6oHZ
Malware Config
Signatures
Files
-
dc8d7e4ed6b99c0107bf208b61811c51593a0d4498eae9e46c6ccd309234794a.exe windows x86
4136135659ba50108f54107994521465
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
setupapi
SetupDiGetClassDevsA
SetupDiEnumDeviceInterfaces
SetupDiGetDeviceInterfaceDetailA
SetupDiDestroyDeviceInfoList
powrprof
DeletePwrScheme
WritePwrScheme
WriteProcessorPwrScheme
EnumPwrSchemes
GetActivePwrScheme
SetActivePwrScheme
wtsapi32
WTSRegisterSessionNotification
WTSUnRegisterSessionNotification
kernel32
WaitForSingleObject
CloseHandle
SetEvent
GetLastError
CreateMutexA
SetThreadPriority
SetPriorityClass
GetCurrentProcess
CreateThread
CreateEventA
DeviceIoControl
SetProcessAffinityMask
GetProcessAffinityMask
LocalFree
CreateFileA
LocalAlloc
CreateProcessA
GetVersionExA
GetSystemInfo
FreeLibrary
GetProcAddress
LoadLibraryA
lstrcpynA
GetStdHandle
AllocConsole
DisconnectNamedPipe
FlushFileBuffers
WriteFile
ReadFile
ConnectNamedPipe
ResetEvent
CreateNamedPipeA
ReleaseMutex
IsBadCodePtr
SetUnhandledExceptionFilter
GetLocaleInfoA
SetEnvironmentVariableA
CompareStringW
CompareStringA
HeapSize
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
SetFilePointer
MultiByteToWideChar
VirtualProtect
VirtualAlloc
VirtualQuery
InterlockedExchange
RtlUnwind
VirtualFree
HeapCreate
HeapDestroy
GetEnvironmentStringsW
WideCharToMultiByte
HeapAlloc
WaitForMultipleObjects
HeapReAlloc
HeapFree
GetFileAttributesA
TerminateProcess
SetHandleCount
CreatePipe
GetACP
GetOEMCP
GetCPInfo
UnhandledExceptionFilter
GetCurrentThreadId
FreeEnvironmentStringsW
GetEnvironmentStrings
ExitProcess
DuplicateHandle
SetStdHandle
GetFileType
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetModuleFileNameA
FreeEnvironmentStringsA
user32
GetProcessWindowStation
GetThreadDesktop
SetUserObjectSecurity
EndDialog
DialogBoxParamA
DestroyWindow
DefWindowProcA
BeginPaint
EndPaint
PostQuitMessage
GetCursorPos
CreatePopupMenu
InsertMenuA
SetForegroundWindow
TrackPopupMenu
DestroyMenu
CreateWindowExA
GetSystemMetrics
LoadImageA
DestroyIcon
ShowWindow
LoadIconA
LoadCursorA
RegisterClassExA
SendMessageA
LoadStringA
LoadAcceleratorsA
GetMessageA
TranslateAcceleratorA
TranslateMessage
DispatchMessageA
advapi32
InitializeSid
GetSidSubAuthority
InitializeAcl
AddAccessAllowedAce
ReportEventA
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
DeregisterEventSource
RegDeleteKeyA
RegCreateKeyExA
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
RegNotifyChangeKeyValue
RegCloseKey
GetSidLengthRequired
shell32
Shell_NotifyIconA
Sections
.text Size: 44KB - Virtual size: 41KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
��,J] Size: 224KB - Virtual size: 224KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE