Static task
static1
Behavioral task
behavioral1
Sample
a996887ef954be9e91d24a58932c69e8b5acff0eab6dfe36402eef33da9acacc.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a996887ef954be9e91d24a58932c69e8b5acff0eab6dfe36402eef33da9acacc.exe
Resource
win10v2004-20220901-en
General
-
Target
a996887ef954be9e91d24a58932c69e8b5acff0eab6dfe36402eef33da9acacc
-
Size
1.2MB
-
MD5
03b03bf95af19dc5ce8dad43fdce52ac
-
SHA1
3942b7b25bd2240dfa31eab5fcd2ed1c36644aa7
-
SHA256
a996887ef954be9e91d24a58932c69e8b5acff0eab6dfe36402eef33da9acacc
-
SHA512
4f5a042ac72164d3089a8fc3102645a60ab0f74f0a1a5ce8721642e0ae24c782d4500e2b230ac78ad9068af0398f81545d561cdbba7ebea7a07231b8be69c3cd
-
SSDEEP
6144:aFkeMEJC27O0QgBFvaySEKrE2BvQ0JQUpgyd13wx14O2aidcXPa8G/7j8jvyaF4h:wO0VvaBoqQUpgo5a6csMFYd
Malware Config
Signatures
Files
-
a996887ef954be9e91d24a58932c69e8b5acff0eab6dfe36402eef33da9acacc.exe windows x86
6a94ed4994d59f23c886dddfb8feb3de
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleFileNameA
CreateFileA
GetModuleHandleA
GetFileSize
LocalAlloc
GetSystemDirectoryA
DeleteFileA
GetLocalTime
ExitProcess
VirtualAllocEx
WriteProcessMemory
CreateRemoteThread
GetCurrentProcess
DefineDosDeviceA
ReadFile
WriteFile
RemoveDirectoryA
LocalFree
GetDriveTypeA
CreateDirectoryA
FreeLibrary
GetVersionExA
lstrcmpA
WideCharToMultiByte
MultiByteToWideChar
lstrcatA
GetPrivateProfileSectionNamesA
lstrlenA
CancelIo
MoveFileExA
SetFileAttributesA
OpenEventA
GlobalFree
GetProcessHeap
HeapAlloc
SetLastError
HeapFree
InterlockedExchange
SetEvent
lstrcpyA
ResetEvent
WaitForSingleObject
CloseHandle
CreateEventA
VirtualAlloc
GetProcAddress
EnterCriticalSection
LeaveCriticalSection
VirtualFree
DeleteCriticalSection
Sleep
InitializeCriticalSection
LoadLibraryA
GetStartupInfoA
user32
SetClipboardData
EmptyClipboard
OpenClipboard
GetSystemMetrics
LoadCursorA
CloseClipboard
SetRect
GetCursorPos
wsprintfA
GetWindowThreadProcessId
IsWindowVisible
CloseDesktop
WindowFromPoint
SetCursorPos
IsWindow
CharNextA
GetWindowTextA
SetCapture
GetKeyState
GetAsyncKeyState
GetForegroundWindow
ReleaseDC
SendMessageA
CloseWindow
CreateWindowExA
PostMessageA
OpenDesktopA
gdi32
CreateDIBSection
SelectObject
BitBlt
CreateCompatibleBitmap
GetDIBits
DeleteObject
DeleteDC
advapi32
FreeSid
SetNamedSecurityInfoA
RegCreateKeyA
RegSetValueExA
OpenSCManagerA
OpenServiceA
QueryServiceStatus
ControlService
DeleteService
CloseServiceHandle
RegQueryValueA
RegCloseKey
LsaOpenPolicy
LsaRetrievePrivateData
LsaClose
LookupAccountNameA
IsValidSid
SetEntriesInAclA
RegQueryValueExA
RegOpenKeyA
RegCreateKeyExA
RegOpenKeyExA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegSetKeySecurity
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
AddAccessAllowedAce
InitializeAcl
GetLengthSid
AllocateAndInitializeSid
RegEnumValueA
RegEnumKeyExA
RegDeleteValueA
RegDeleteKeyA
CreateProcessAsUserA
SetTokenInformation
DuplicateTokenEx
LookupAccountSidA
GetTokenInformation
GetNamedSecurityInfoA
shell32
SHGetSpecialFolderPathA
SHGetFileInfoA
ShellExecuteA
msvcrt
_strnicmp
_acmdln
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_strupr
exit
_XcptFilter
_exit
??1type_info@@UAE@XZ
calloc
_beginthreadex
strncat
strtok
_errno
atoi
strncmp
??3@YAXPAX@Z
__CxxFrameHandler
_CxxThrowException
memcpy
memmove
ceil
_ftol
strlen
strstr
memset
??2@YAPAXI@Z
strcpy
strchr
malloc
strcmp
free
_except_handler3
strrchr
rename
strcat
shlwapi
SHDeleteKeyA
ws2_32
bind
getpeername
accept
listen
sendto
recvfrom
__WSAFDIsSet
gethostname
getsockname
send
closesocket
recv
ntohs
select
WSAStartup
WSACleanup
WSAIoctl
setsockopt
connect
inet_ntoa
inet_addr
socket
gethostbyname
htons
msvcp60
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBDABV?$allocator@D@1@@Z
?c_str@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEPBDXZ
urlmon
URLDownloadToFileA
wtsapi32
WTSQuerySessionInformationA
WTSFreeMemory
WTSQueryUserToken
userenv
CreateEnvironmentBlock
msvfw32
ICSeqCompressFrameEnd
ICSendMessage
psapi
EnumProcessModules
Sections
.text Size: 148KB - Virtual size: 147KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 324KB - Virtual size: 324KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 944B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 882B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 1012B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 968B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 976B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 914B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 4KB - Virtual size: 1000B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE