Static task
static1
Behavioral task
behavioral1
Sample
77d50f99eb5cdb5f7aba7223d9868b269ff096cc90e93da4794e395593325b81.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
77d50f99eb5cdb5f7aba7223d9868b269ff096cc90e93da4794e395593325b81.exe
Resource
win10v2004-20220812-en
General
-
Target
77d50f99eb5cdb5f7aba7223d9868b269ff096cc90e93da4794e395593325b81
-
Size
186KB
-
MD5
65ca5a2204cf9fa01c801452aa4df8c0
-
SHA1
9023a214c96ec0eb3d45d1401108ca35d4eb8bca
-
SHA256
77d50f99eb5cdb5f7aba7223d9868b269ff096cc90e93da4794e395593325b81
-
SHA512
2a4ce80e53c04dd176e1bb222a4909baa944b872729cf1795436cf06de102479badad4266950742998e7f657ced78db713b57c1264bb468bbae2aa828d90e8e3
-
SSDEEP
3072:UU6AMDUTvlImPxPS6Qmn1lNq6g+SmZ82Hj:w1ouqxPS6Qmn1lNq6g+SmZ3D
Malware Config
Signatures
Files
-
77d50f99eb5cdb5f7aba7223d9868b269ff096cc90e93da4794e395593325b81.exe windows x86
d4330f00c16ff578bde9a1b87c61599b
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegSetValueExA
AllocateAndInitializeSid
OpenThreadToken
CloseServiceHandle
RegQueryInfoKeyW
GetLengthSid
RegQueryValueExA
RegOpenKeyW
OpenProcessToken
RegOpenKeyExA
OpenProcessToken
RegDeleteKeyW
GetLengthSid
InitializeAcl
RegOpenKeyExA
AllocateAndInitializeSid
RegSetValueExA
RegCreateKeyExA
InitializeSecurityDescriptor
GetTokenInformation
GetTokenInformation
CloseServiceHandle
InitializeAcl
CloseServiceHandle
GetTokenInformation
RegDeleteKeyW
RegSetValueExW
RegQueryValueExW
AdjustTokenPrivileges
OpenProcessToken
AddAccessAllowedAce
RegCreateKeyExW
OpenProcessToken
FreeSid
RegDeleteValueW
RegDeleteValueW
RegOpenKeyExW
RegDeleteValueW
RegQueryValueExW
RegEnumValueW
AddAccessAllowedAce
GetLengthSid
OpenProcessToken
AddAccessAllowedAce
OpenThreadToken
FreeSid
RegDeleteValueW
SetSecurityDescriptorDacl
OpenThreadToken
InitializeSecurityDescriptor
RegDeleteValueW
RegCreateKeyExW
RegOpenKeyExA
RegCreateKeyExW
FreeSid
RegSetValueExW
OpenProcessToken
AdjustTokenPrivileges
RegQueryValueExA
RegCreateKeyExW
RegOpenKeyExW
RegCreateKeyExA
InitializeSecurityDescriptor
GetLengthSid
OpenThreadToken
RegQueryValueExA
RegCloseKey
RegQueryValueExW
RegOpenKeyExA
RegQueryValueExW
RegDeleteKeyW
RegCreateKeyExA
RegQueryValueExW
CloseServiceHandle
AdjustTokenPrivileges
RegDeleteValueW
FreeSid
RegCreateKeyExA
RegSetValueExA
RegEnumKeyExW
RegOpenKeyW
RegDeleteValueW
FreeSid
SetSecurityDescriptorDacl
RegQueryInfoKeyW
RegEnumValueW
FreeSid
AllocateAndInitializeSid
AdjustTokenPrivileges
RegCreateKeyExA
RegCloseKey
RegEnumValueW
RegQueryValueExW
RegSetValueExA
RegQueryValueExW
RegCreateKeyExW
RegDeleteKeyW
RegCloseKey
RegQueryValueExA
RegCreateKeyExW
CloseServiceHandle
InitializeAcl
RegSetValueExW
AdjustTokenPrivileges
SetSecurityDescriptorDacl
RegEnumKeyExW
RegDeleteValueW
InitializeSecurityDescriptor
OpenThreadToken
GetTokenInformation
RegOpenKeyExA
RegOpenKeyExW
SetSecurityDescriptorDacl
RegSetValueExW
AddAccessAllowedAce
RegCreateKeyExW
FreeSid
RegDeleteKeyW
GetLengthSid
RegEnumKeyExW
RegQueryValueExW
AdjustTokenPrivileges
RegEnumValueW
RegSetValueExA
CloseServiceHandle
CloseServiceHandle
RegEnumValueW
RegCloseKey
RegSetValueExW
RegSetValueExA
RegOpenKeyW
RegCreateKeyExA
RegQueryInfoKeyW
FreeSid
SetSecurityDescriptorDacl
RegCreateKeyExW
GetLengthSid
RegOpenKeyExW
user32
SystemParametersInfoW
CharNextW
MessageBeep
EnableMenuItem
GetSystemMetrics
KillTimer
DialogBoxParamW
IsWindowVisible
EnableMenuItem
IsWindowVisible
LoadStringW
IsWindowVisible
DestroyMenu
CopyRect
GetSysColor
FindWindowW
DestroyWindow
SetWindowLongW
EndPaint
UpdateWindow
PeekMessageW
CallWindowProcW
WinHelpW
GetWindow
SendMessageW
SetTimer
GetParent
DialogBoxParamW
CopyRect
GetWindowRect
GetWindowRect
GetWindowLongW
wsprintfW
KillTimer
EnableWindow
EndPaint
CreateDialogParamW
SetCursor
PeekMessageW
OffsetRect
EndDialog
GetSubMenu
LoadStringW
wsprintfA
GetWindowTextW
EndDialog
UpdateWindow
DestroyIcon
GetFocus
SystemParametersInfoW
KillTimer
GetDC
CheckDlgButton
MessageBoxW
GetDlgItem
OffsetRect
GetMenu
GetCursorPos
GetSystemMetrics
UpdateWindow
MoveWindow
GetKeyState
GetMenu
kernel32
InterlockedIncrement
GetModuleFileNameA
LeaveCriticalSection
CloseHandle
ExitProcess
GetVersionExA
GetModuleHandleW
SetLastError
LoadLibraryW
GetACP
SetUnhandledExceptionFilter
GetCurrentProcess
ReadFile
TerminateProcess
lstrlenW
WaitForSingleObject
WideCharToMultiByte
GetCurrentProcess
GetACP
HeapFree
MultiByteToWideChar
GetCommandLineW
QueryPerformanceCounter
GetCurrentProcessId
LoadLibraryW
HeapAlloc
TerminateProcess
Sections
Size: 141KB - Virtual size: 156KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Size: 6KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 512B
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE