Static task
static1
Behavioral task
behavioral1
Sample
d676f1ea5a753332242426de9b331283ef19b16be3113106ae2ba4f525e987a5.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d676f1ea5a753332242426de9b331283ef19b16be3113106ae2ba4f525e987a5.exe
Resource
win10v2004-20220901-en
General
-
Target
d676f1ea5a753332242426de9b331283ef19b16be3113106ae2ba4f525e987a5
-
Size
430KB
-
MD5
5e75f1fb803b8ef84cc5e4026e2a6020
-
SHA1
0b75e019ba42045eb6ffe0343ae45da55f9f3139
-
SHA256
d676f1ea5a753332242426de9b331283ef19b16be3113106ae2ba4f525e987a5
-
SHA512
dab04d1b3d17d8184147ef37e788d4bf3a640df98afc2c891de2a83f9c703db8ac01c81de4927d0a09889942f5263d23e6b84c9ec9d30bfbb34663fe3ffad3bc
-
SSDEEP
6144:IOI3WgI8srKaQcczncJK9qjkybbCgj3fQFBnnPWVZee5OhbAiB6Jfjvu:IOImILPzn+Kwjk0CsfOPWjlj/f
Malware Config
Signatures
Files
-
d676f1ea5a753332242426de9b331283ef19b16be3113106ae2ba4f525e987a5.exe windows x86
e4cd56a14f472840d6940451f793374b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
TryEnterCriticalSection
OpenMutexA
GetAtomNameA
TransmitCommChar
GetComputerNameA
CreateFiber
FreeResource
InterlockedPopEntrySList
GetCompressedFileSizeA
UnregisterWait
GetStdHandle
ReleaseSemaphore
FileTimeToDosDateTime
GetExitCodeProcess
CreateThread
GetEnvironmentVariableA
SetUnhandledExceptionFilter
EncodeSystemPointer
GetSystemTimeAsFileTime
FindFirstVolumeMountPointA
QueryDepthSList
QueueUserAPC
InterlockedPushEntrySList
QueueUserWorkItem
SetSystemPowerState
InterlockedFlushSList
SetFileShortNameA
GetCommandLineA
GetProfileStringA
GetProcAddress
GetModuleHandleA
LocalAlloc
SetEnvironmentVariableA
CompareStringW
CompareStringA
GetProcessHeap
BuildCommDCBA
GetStringTypeW
GetStringTypeA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
GetLocaleInfoA
HeapSize
LCMapStringW
LCMapStringA
GetTimeZoneInformation
CreateFileA
FlushFileBuffers
SetStdHandle
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
ReadFile
MultiByteToWideChar
GetConsoleMode
GetConsoleCP
WideCharToMultiByte
InitializeCriticalSectionAndSpinCount
LoadLibraryA
InterlockedExchange
FreeLibrary
GetProcessAffinityMask
PeekNamedPipe
GetSystemWindowsDirectoryA
GetThreadPriority
GetCurrentDirectoryA
SetEndOfFile
FindAtomA
GetLastError
HeapFree
HeapAlloc
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
IsDebuggerPresent
RtlUnwind
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
GetDriveTypeA
FindFirstFileA
GetModuleHandleW
Sleep
ExitProcess
RaiseException
GetStartupInfoA
HeapCreate
VirtualFree
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
HeapReAlloc
WriteFile
GetModuleFileNameA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
CloseHandle
SetHandleCount
GetFileType
SetFilePointer
GetFullPathNameA
CreateDirectoryA
user32
BeginPaint
UserHandleGrantAccess
UnhookWindowsHookEx
CloseClipboard
CountClipboardFormats
LoadStringA
SetLastErrorEx
SetRectEmpty
GetClipboardFormatNameA
GetMenuStringA
CharLowerBuffA
ChangeMenuA
AnyPopup
GetQueueStatus
GetScrollBarInfo
GetWindowTextA
SetWindowRgn
IsIconic
SetWindowLongA
SetWindowsHookA
MessageBoxIndirectA
CopyRect
InSendMessage
GetInputState
ActivateKeyboardLayout
GetClassInfoA
SendInput
DeregisterShellHookWindow
GetMenuState
GetAsyncKeyState
CreateCursor
GetIconInfo
SetMenu
CloseWindowStation
CloseDesktop
TrackMouseEvent
CallMsgFilterA
SetProcessWindowStation
CharPrevA
HiliteMenuItem
GetWindowWord
GetSystemMenu
GetUpdateRgn
GetLastInputInfo
SetScrollRange
advapi32
AddAuditAccessAce
ObjectDeleteAuditAlarmA
CreatePrivateObjectSecurity
ObjectCloseAuditAlarmA
SetFileSecurityA
OpenProcessToken
Sections
.text Size: 301KB - Virtual size: 300KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 34KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 94KB - Virtual size: 102KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE