Static task
static1
Behavioral task
behavioral1
Sample
1aab1086c13b779938383a1c094b493e5ce5bb7a0e2871433867489ddb177388.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1aab1086c13b779938383a1c094b493e5ce5bb7a0e2871433867489ddb177388.exe
Resource
win10v2004-20220812-en
General
-
Target
1aab1086c13b779938383a1c094b493e5ce5bb7a0e2871433867489ddb177388
-
Size
422KB
-
MD5
6658d0d8a97c58a91e93f4e920a4f760
-
SHA1
f3213d3557e1bd5ee3bef3d6f74685db38c08d2a
-
SHA256
1aab1086c13b779938383a1c094b493e5ce5bb7a0e2871433867489ddb177388
-
SHA512
69067152fd10b68ae12e356f67379661e0745adf666ab43f424fbc4e27e3f08e70d1d25800fd8784d3ecaabf9128f25a9d41f8765597fe0295c9c0e7efae16c0
-
SSDEEP
6144:X8cAp9F451sTPO4WHs/QC1DDmXPw6bpRIfoaJnSh+8uaCvWgd9BgbamznRkfb:Xkx4vsNWAcXPjpaJv1b
Malware Config
Signatures
Files
-
1aab1086c13b779938383a1c094b493e5ce5bb7a0e2871433867489ddb177388.exe windows x86
9da6372eb5ab9eefaa9b12ff32677455
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FreeResource
GetSystemWindowsDirectoryA
LocalFileTimeToFileTime
FreeLibrary
QueueUserWorkItem
CreateEventA
OpenWaitableTimerA
CreatePipe
SwitchToThread
WaitForMultipleObjectsEx
DebugSetProcessKillOnExit
DeleteFileA
SetHandleCount
WriteFileGather
VirtualQueryEx
AddAtomA
GetLongPathNameA
VirtualProtectEx
LeaveCriticalSection
GetCommConfig
SetEndOfFile
SetupComm
GetWindowsDirectoryA
FreeUserPhysicalPages
ClearCommError
LocalHandle
PeekNamedPipe
VirtualProtect
GetCommTimeouts
GetProcessIoCounters
UnlockFileEx
GetTempPathA
QueueUserAPC
GetProcessWorkingSetSize
SetFileApisToANSI
SetThreadAffinityMask
HeapLock
LocalAlloc
SetEnvironmentVariableA
CompareStringW
CompareStringA
ReadFile
GetProcessHeap
GetStringTypeW
GetStringTypeA
GetLocaleInfoA
HeapSize
LCMapStringW
LCMapStringA
GetTimeZoneInformation
MultiByteToWideChar
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
CreateFileA
FlushFileBuffers
SetStdHandle
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
GetCurrentProcessId
GetTickCount
GlobalCompact
BuildCommDCBAndTimeoutsA
CreateRemoteThread
FindAtomA
LocalUnlock
GetTempFileNameA
MapViewOfFile
SetMailslotInfo
GetComputerNameA
GetModuleHandleA
WaitForSingleObject
GetProcAddress
GetLastError
HeapFree
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetSystemTimeAsFileTime
HeapAlloc
RtlUnwind
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
GetDriveTypeA
FindFirstFileA
GetModuleHandleW
Sleep
ExitProcess
RaiseException
GetCommandLineA
GetStartupInfoA
CloseHandle
EnterCriticalSection
GetStdHandle
GetFileType
DeleteCriticalSection
SetFilePointer
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
WriteFile
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
GetModuleFileNameA
GetFullPathNameA
GetCurrentDirectoryA
InterlockedExchange
LoadLibraryA
InitializeCriticalSectionAndSpinCount
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
CreateDirectoryA
user32
GetWindowLongA
SetRectEmpty
EndDeferWindowPos
CheckRadioButton
SetDoubleClickTime
GetScrollPos
MapWindowPoints
OpenDesktopA
GetMonitorInfoA
SetMenuItemInfoA
GetMenuBarInfo
GetGuiResources
FlashWindowEx
SetSysColors
GetMenuContextHelpId
GetListBoxInfo
GetMessageTime
OemKeyScan
ShowScrollBar
CloseWindow
ShowCaret
SetSystemCursor
RealGetWindowClassA
LoadIconA
SwitchToThisWindow
ShowCursor
EnableScrollBar
TileWindows
RegisterClipboardFormatA
GetAncestor
GetClipboardOwner
GetSystemMetrics
advapi32
OpenEventLogA
LookupPrivilegeNameA
GetUserNameA
SetSecurityDescriptorSacl
EncryptFileA
RegisterEventSourceA
LookupAccountNameA
DecryptFileA
CloseEventLog
LogonUserExA
FreeSid
Sections
.text Size: 290KB - Virtual size: 290KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 33KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 97KB - Virtual size: 105KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE