Static task
static1
Behavioral task
behavioral1
Sample
66bc4b0b11087a5dd161e963855a33732995a813cb6f0f378c0d11243fea4e88.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
66bc4b0b11087a5dd161e963855a33732995a813cb6f0f378c0d11243fea4e88.exe
Resource
win10v2004-20220812-en
General
-
Target
66bc4b0b11087a5dd161e963855a33732995a813cb6f0f378c0d11243fea4e88
-
Size
937KB
-
MD5
7134a1722cbd998c909dff2845bfb870
-
SHA1
0dc66b95dab209cb8b0e356cb6331500d0cd33b0
-
SHA256
66bc4b0b11087a5dd161e963855a33732995a813cb6f0f378c0d11243fea4e88
-
SHA512
dd491f949cc650f4e8e36c05861fd24d7e5edb06d9c780096a51ad7ae8d33d87822bcc6747d831073d29141db45c2cd94e7e08890b2c50b97873f5258aad4e7a
-
SSDEEP
3072:v+ntgmYoFdQMQ4WCMKF9Z0Z253tRjF7yj:64oFdQMtcKvZ0ZgtNs
Malware Config
Signatures
Files
-
66bc4b0b11087a5dd161e963855a33732995a813cb6f0f378c0d11243fea4e88.exe windows x86
ebb0beac410fb356e99d6baefe667c79
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
AllocateAndInitializeSid
CheckTokenMembership
EqualSid
FreeSid
GetTokenInformation
LsaLookupSids
OpenProcessToken
RegCloseKey
RegCreateKeyW
RegDeleteKeyW
RegDeleteValueW
RegEnumKeyExW
RegEnumKeyW
RegEnumValueW
RegFlushKey
RegOpenKeyExW
RegOpenKeyW
RegQueryInfoKeyW
RegQueryValueExW
RegSetValueExW
gdi32
DeleteDC
DeleteObject
LineTo
MoveToEx
SelectObject
PolyBezier
CreatePen
kernel32
AddAtomW
CloseHandle
CreateProcessW
DeleteAtom
FindClose
FindFirstFileW
FreeLibrary
GetAtomNameW
GetCurrentProcess
GetLocaleInfoW
GetProcAddress
GetSystemDefaultLCID
GetSystemDirectoryW
GetUserDefaultUILanguage
GetVersionExA
LoadLibraryExA
LoadLibraryW
LocalAlloc
LocalFree
LocalLock
LocalReAlloc
LocalUnlock
ReleaseMutex
SetErrorMode
SetEvent
SetUnhandledExceptionFilter
TerminateProcess
UnhandledExceptionFilter
WaitForSingleObject
lstrcmpW
lstrcpynW
lstrlenW
InterlockedCompareExchange
InterlockedExchange
Sleep
WideCharToMultiByte
VirtualAlloc
GetModuleHandleW
ExitProcess
DecodePointer
GetCommandLineA
HeapSetInformation
GetStartupInfoW
IsProcessorFeaturePresent
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
LeaveCriticalSection
FatalAppExitA
EnterCriticalSection
EncodePointer
GetLastError
SetConsoleCtrlHandler
IsDebuggerPresent
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
GetCurrentThread
WriteFile
GetStdHandle
GetModuleFileNameW
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapCreate
HeapDestroy
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapFree
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
HeapSize
RtlUnwind
HeapAlloc
HeapReAlloc
LCMapStringW
MultiByteToWideChar
GetStringTypeW
ole32
OleSetAutoConvert
UtGetDvtd32Info
StringFromGUID2
CoUninitialize
CoInitialize
CoCreateInstance
CoAddRefServerProcess
CLSIDFromString
rpcrt4
I_UuidCreate
NdrNonEncapsulatedUnionMemorySize
shell32
ord180
user32
UnloadKeyboardLayout
SetWindowTextW
SetWindowLongW
UnregisterClassW
WaitForInputIdle
WinHelpW
ShowWindow
SystemParametersInfoW
GetPropW
BroadcastSystemMessageW
CheckDlgButton
DestroyAcceleratorTable
DialogBoxParamW
EnableWindow
EndDialog
EnumChildWindows
EnumPropsW
FindWindowW
GetClientRect
GetDlgItem
GetForegroundWindow
GetKeyboardLayout
GetKeyboardLayoutList
GetParent
GetSysColor
GetSystemMetrics
GetWindowLongW
InvalidateRect
IsDlgButtonChecked
IsWindow
IsWindowEnabled
LoadCursorW
LoadImageW
LoadKeyboardLayoutW
LoadStringW
MessageBeep
MessageBoxW
PostMessageW
RemovePropW
SendMessageW
SetCursor
SetDlgItemTextW
SetFocus
SetPropW
Sections
.text Size: 118KB - Virtual size: 117KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 687KB - Virtual size: 686KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 129KB - Virtual size: 142KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE