Static task
static1
Behavioral task
behavioral1
Sample
5045cebe323a08f743bc1c52ccd927170d28d44eacbefb734bd57c7ea76db8bd.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
5045cebe323a08f743bc1c52ccd927170d28d44eacbefb734bd57c7ea76db8bd.exe
Resource
win10v2004-20220901-en
General
-
Target
5045cebe323a08f743bc1c52ccd927170d28d44eacbefb734bd57c7ea76db8bd
-
Size
60KB
-
MD5
76c88cb954f55b3ef818b37195e76a70
-
SHA1
58dfb87ec7bd975f3575404637e2fa71971a2cfa
-
SHA256
5045cebe323a08f743bc1c52ccd927170d28d44eacbefb734bd57c7ea76db8bd
-
SHA512
40d681a49cf0f6b3e36519d6b9340ed5552caa9fbb4bb9179f50a07cde80eb538db745064a8464f33a242f0468dec616cc9588a8cc629531f44e3817ca7cadf3
-
SSDEEP
1536:VH7hnZKYsSxzu/l6M6EPDXlZa+x6pJowX6JjR5+g15DvRd:RhnZZMBz7Jx6pJowqJjGoRv
Malware Config
Signatures
Files
-
5045cebe323a08f743bc1c52ccd927170d28d44eacbefb734bd57c7ea76db8bd.exe windows x86
5b673ba0f4a8b0910934ce516137137b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
fflush
__CxxFrameHandler
??2@YAPAXI@Z
memmove
wcslen
wcsncpy
_wcslwr
wcscat
_snprintf
??1type_info@@UAE@XZ
?terminate@@YAXXZ
_strdup
_strnicmp
??3@YAXPAX@Z
strncpy
free
_CxxThrowException
_except_handler3
advapi32
FreeSid
RegEnumValueA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
EqualSid
GetTokenInformation
AllocateAndInitializeSid
RegEnumKeyA
RegCreateKeyExA
RegDeleteValueA
RegDeleteKeyA
RegQueryInfoKeyA
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
RegSetValueExA
kernel32
GetLocaleInfoA
GetThreadLocale
GetCurrentDirectoryA
IsDBCSLeadByte
GetACP
GetVersionExA
LocalFree
GetFileAttributesA
lstrcpyA
CloseHandle
CreateFileA
IsBadWritePtr
lstrlenA
lstrcpynA
OpenProcess
ReleaseMutex
GetLastError
CreateMutexA
WritePrivateProfileStringA
GetPrivateProfileStringA
lstrcmpiA
RemoveDirectoryA
GetPrivateProfileIntA
LocalAlloc
DeleteFileA
GetModuleFileNameA
FreeLibrary
LoadLibraryExA
CopyFileA
SetFileAttributesA
GetTempFileNameA
GetCurrentProcessId
GetTempPathA
ExitProcess
GetCommandLineA
GetModuleHandleA
Sleep
LoadLibraryA
TerminateProcess
GetCurrentProcess
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetSystemTimeAsFileTime
InterlockedExchange
SetLastError
IsBadReadPtr
GetLongPathNameA
CreateDirectoryA
lstrcmpA
FindFirstFileA
FindNextFileA
FindClose
GetSystemDirectoryA
GetWindowsDirectoryA
GetEnvironmentVariableA
FormatMessageA
GetExitCodeProcess
CreateProcessA
MoveFileA
WriteFile
user32
PostMessageA
wsprintfA
GetWindowThreadProcessId
DestroyWindow
CharUpperA
ExitWindowsEx
MsgWaitForMultipleObjects
PeekMessageA
TranslateMessage
DispatchMessageA
CharNextA
EnumChildWindows
MessageBoxA
FindWindowA
CreateDialogParamA
SetWindowTextA
LoadStringA
shell32
SHGetMalloc
SHGetPathFromIDListA
SHGetSpecialFolderLocation
SHGetSpecialFolderPathA
ole32
CoCreateInstance
CLSIDFromString
CoUninitialize
CoInitialize
shlwapi
StrCatBuffA
PathQuoteSpacesA
PathFileExistsA
PathAppendA
SHGetValueA
StrTrimA
StrToIntA
PathAddBackslashA
StrStrIA
wnsprintfA
StrChrA
StrCmpW
PathAddBackslashW
StrRChrW
PathRemoveFileSpecA
PathIsDirectoryW
PathIsDirectoryA
PathIsDirectoryEmptyA
StrStrA
StrCmpNIA
UrlCanonicalizeA
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
wininet
InternetSetCookieA
Sections
.text Size: 38KB - Virtual size: 38KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 23KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE