Static task
static1
Behavioral task
behavioral1
Sample
30f6fa1ffbc8bded3a3ff11d927d1f504b4dda92a1948b23e9bbc0b33e33d683.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
30f6fa1ffbc8bded3a3ff11d927d1f504b4dda92a1948b23e9bbc0b33e33d683.exe
Resource
win10v2004-20220812-en
General
-
Target
30f6fa1ffbc8bded3a3ff11d927d1f504b4dda92a1948b23e9bbc0b33e33d683
-
Size
540KB
-
MD5
6fcc19928fdd328ef9b98e27c2f83b90
-
SHA1
55f8718cef104e5e426e11ac196f66f6d23db3c0
-
SHA256
30f6fa1ffbc8bded3a3ff11d927d1f504b4dda92a1948b23e9bbc0b33e33d683
-
SHA512
20f9eabf55ed1c19e810a7c07cf0592086e47fe7f0b36b706672c57b1e198280e043a2ba52dfae68160ee499c4ac1c484521c000575ce7889b12cf5e07d07abc
-
SSDEEP
12288:ybkEme1dTmqPRH6QJLBEwxOO8oPlWKdp7Sv/7mI8BcddzcfHUfT8oRFh:ALdpokGzcfHITJT
Malware Config
Signatures
Files
-
30f6fa1ffbc8bded3a3ff11d927d1f504b4dda92a1948b23e9bbc0b33e33d683.exe windows x86
ae42e702e0e913e554b7f35c61b9ccd3
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateProcessA
RemoveDirectoryA
DeviceIoControl
GetVersionExA
CreateDirectoryA
GetWindowsDirectoryA
GetProcessHeap
GetFullPathNameA
FormatMessageA
GetShortPathNameA
GetLocaleInfoA
CompareStringW
CompareStringA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
GetConsoleMode
GetConsoleCP
QueryPerformanceCounter
CreateEventA
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
HeapSize
GetFileType
SetHandleCount
GetStringTypeW
GetStringTypeA
GetStdHandle
ExitProcess
HeapReAlloc
FlushFileBuffers
VirtualFree
LCMapStringW
LCMapStringA
SetLastError
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
IsValidCodePage
GetOEMCP
GetCPInfo
GetStartupInfoA
GetCommandLineA
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RaiseException
GetDateFormatA
GetTimeFormatA
GetDriveTypeA
FileTimeToLocalFileTime
FileTimeToSystemTime
CreateThread
ExitThread
GetSystemTimeAsFileTime
RtlUnwind
SetEvent
GetSystemTime
ResumeThread
CopyFileA
TerminateThread
DeleteCriticalSection
GetFileTime
SetFileTime
SetEnvironmentVariableA
OutputDebugStringA
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
SetEndOfFile
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
GetFileSize
GetCurrentDirectoryA
SetCurrentDirectoryA
FindFirstFileA
GetFileAttributesA
SetFileAttributesA
ReleaseMutex
CreateMutexA
TerminateProcess
OpenProcess
GetCurrentProcess
GetACP
GetComputerNameA
GetTimeZoneInformation
GetVolumeInformationA
HeapDestroy
HeapCreate
HeapFree
HeapAlloc
OpenFileMappingA
GetCurrentProcessId
InterlockedIncrement
lstrlenA
WideCharToMultiByte
InterlockedDecrement
GetModuleHandleA
GetModuleFileNameA
VirtualAlloc
GetCurrentThreadId
FindNextFileA
FindClose
WaitForSingleObject
FreeLibrary
GetLastError
LoadLibraryA
GetProcAddress
LocalFree
LocalAlloc
MoveFileA
DeleteFileA
GetVersion
GetSystemDirectoryA
GetTickCount
MultiByteToWideChar
WriteFile
CreateFileA
Sleep
ReadFile
SetFilePointer
CloseHandle
GetEnvironmentStringsW
VirtualProtect
user32
GetWindowTextA
PostThreadMessageA
KillTimer
DispatchMessageA
TranslateMessage
GetMessageA
SetTimer
GetCursorPos
wsprintfA
GetForegroundWindow
ExitWindowsEx
GetSystemMetrics
CreateDialogParamA
UpdateWindow
ShowWindow
IsWindow
EndDialog
PostQuitMessage
SetCursor
MessageBoxA
LoadStringA
DestroyWindow
LoadIconA
LoadCursorA
RegisterClassA
CreateWindowExA
PostMessageA
UnregisterClassA
GetPropA
SetPropA
DefWindowProcA
GetDC
ReleaseDC
gdi32
GetStockObject
GetDeviceCaps
advapi32
RegSetValueExA
RegOpenKeyExA
RegGetKeySecurity
RegCloseKey
GetTokenInformation
GetSecurityInfo
SetEntriesInAclA
SetSecurityInfo
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
GetUserNameA
RegDeleteValueA
RegCreateKeyExA
RegDeleteKeyA
RegEnumKeyExA
RegQueryValueExA
RegEnumValueA
DeregisterEventSource
CloseServiceHandle
OpenServiceA
OpenSCManagerA
StartServiceA
QueryServiceStatus
ControlService
SetServiceStatus
ReportEventA
RegisterEventSourceA
DeleteService
RegCreateKeyA
CreateServiceA
RegisterServiceCtrlHandlerA
StartServiceCtrlDispatcherA
InitiateSystemShutdownA
RegConnectRegistryA
RegSetKeySecurity
shell32
SHGetMalloc
SHGetSpecialFolderLocation
SHGetPathFromIDListA
ole32
StringFromCLSID
CoInitialize
CoCreateInstance
CoInitializeEx
CoUninitialize
CoTaskMemFree
oleaut32
SysAllocStringLen
SysFreeString
SysAllocString
Sections
.text Size: 324KB - Virtual size: 321KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 172KB - Virtual size: 170KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 36KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 392B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ