Static task
static1
Behavioral task
behavioral1
Sample
9203405e001c2a0630f45bde5b0a2898cb689e97dc4c3c1fd0e1786f5bbe122c.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
9203405e001c2a0630f45bde5b0a2898cb689e97dc4c3c1fd0e1786f5bbe122c.exe
Resource
win10v2004-20220812-en
General
-
Target
9203405e001c2a0630f45bde5b0a2898cb689e97dc4c3c1fd0e1786f5bbe122c
-
Size
312KB
-
MD5
6ed27d3ecba8e58f9767e7efdafef8b0
-
SHA1
71a00579003d07c9e6ab060b36962e166e273f41
-
SHA256
9203405e001c2a0630f45bde5b0a2898cb689e97dc4c3c1fd0e1786f5bbe122c
-
SHA512
92ffb867185ac34822e2dd65a4661ea1e9ae4b5834ea56d2526c2ecf35b694af32e4e3b63a1d1cc5cac79f994b768f773ae0aa350d7894c4caeb3300eb2f5b7f
-
SSDEEP
6144:toY7MPilUNK19ROxCyE/0AsBomiU5uEDKfeBdC:txMNNyfOxzOjsa5U/2fey
Malware Config
Signatures
Files
-
9203405e001c2a0630f45bde5b0a2898cb689e97dc4c3c1fd0e1786f5bbe122c.exe windows x86
4e7e59ef0159c0572d0a3ece37ef2775
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
_lopen
GetComputerNameW
GetFileAttributesA
CreateIoCompletionPort
GetACP
SetErrorMode
OutputDebugStringA
FileTimeToLocalFileTime
LocalReAlloc
SetFileTime
TryEnterCriticalSection
WritePrivateProfileStructA
GetTickCount
SizeofResource
SetEnvironmentVariableW
SetStdHandle
SetThreadLocale
PulseEvent
VirtualUnlock
LocalAlloc
CreateProcessA
GetDiskFreeSpaceW
MoveFileW
EnumSystemCodePagesA
InitializeCriticalSection
CreateDirectoryExA
OutputDebugStringW
QueryDosDeviceA
ExitProcess
FreeResource
lstrcpynA
GetUserDefaultLangID
EnumResourceNamesA
GetLargestConsoleWindowSize
IsProcessorFeaturePresent
SetEvent
VirtualFree
GetCommandLineA
VirtualAlloc
GetProfileIntA
user32
InvalidateRect
SetCaretPos
MsgWaitForMultipleObjectsEx
CopyImage
ScreenToClient
SetWinEventHook
SetWindowContextHelpId
LoadMenuIndirectW
SetCapture
SetMessageQueue
SetProcessWindowStation
MessageBoxW
EnableMenuItem
LoadBitmapW
GetMenuState
EnumDisplaySettingsExW
CascadeWindows
IsCharLowerA
GetScrollRange
DefFrameProcA
CloseClipboard
GetDlgCtrlID
CreateDesktopA
GetSysColorBrush
GetMessageA
EnumThreadWindows
DestroyCursor
GetKeyboardLayout
LoadAcceleratorsW
LoadCursorA
MessageBeep
SwitchToThisWindow
CharLowerBuffA
GetCaretBlinkTime
SendInput
SetDlgItemTextA
SetCursorPos
OpenDesktopW
ShowScrollBar
IsClipboardFormatAvailable
ToUnicode
LoadMenuIndirectA
MessageBoxExA
MapVirtualKeyA
IsCharUpperA
GetKeyNameTextW
RegisterDeviceNotificationA
IsCharAlphaA
PeekMessageA
CreateIcon
gdi32
CloseMetaFile
GetStretchBltMode
StrokePath
EndPath
comdlg32
PageSetupDlgW
GetFileTitleW
GetSaveFileNameW
advapi32
EnumServicesStatusA
LookupPrivilegeValueW
RegCloseKey
CryptDeriveKey
ClearEventLogW
AbortSystemShutdownW
QueryServiceStatus
MakeAbsoluteSD
BuildTrusteeWithNameW
CryptGenKey
GetSecurityDescriptorGroup
RegEnumKeyW
GetServiceKeyNameW
GetSecurityDescriptorControl
AccessCheck
RegOpenKeyExA
CryptReleaseContext
RegConnectRegistryA
OpenProcessToken
SetKernelObjectSecurity
RegOpenKeyW
StartServiceW
RegNotifyChangeKeyValue
NotifyChangeEventLog
CreateProcessAsUserW
ObjectCloseAuditAlarmA
InitializeSid
DuplicateToken
CryptGetHashParam
InitializeSecurityDescriptor
shell32
SHFileOperationA
ole32
OleSetClipboard
CoReleaseMarshalData
CreateBindCtx
OleConvertIStorageToOLESTREAM
Sections
aaiwmcs Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
eoeous Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
kycqmms Size: 284KB - Virtual size: 281KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
msimkey Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ