Static task
static1
Behavioral task
behavioral1
Sample
4154fac85dfd4520e49ad39082acb86a61832dfc7ec068cdf9308a8882a23868.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
4154fac85dfd4520e49ad39082acb86a61832dfc7ec068cdf9308a8882a23868.exe
Resource
win10v2004-20220812-en
General
-
Target
4154fac85dfd4520e49ad39082acb86a61832dfc7ec068cdf9308a8882a23868
-
Size
684KB
-
MD5
3467c6e0456c44011968db3828162170
-
SHA1
470bd5586cb81019146aeabc3af9474f07fb1bd2
-
SHA256
4154fac85dfd4520e49ad39082acb86a61832dfc7ec068cdf9308a8882a23868
-
SHA512
e599de7fe6f7d77bc573d882e33a7415044304f099552f9e0a4811eba742c46e65c0f11167dab45bdc8eb7c38350d31edb1772a9290ad690d3e0f8c440f046c4
-
SSDEEP
6144:SHUxklmSJqAx/W60rMux/RTynDxhwbU33M6tpmAckXIX7KXJnG:SCS46/V0QwpTyDoshtp5XIL2ZG
Malware Config
Signatures
Files
-
4154fac85dfd4520e49ad39082acb86a61832dfc7ec068cdf9308a8882a23868.exe windows x86
80f601a43f0a29706d3d3d61e52da2af
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
KillTimer
PeekMessageA
DispatchMessageA
TranslateMessage
GetMessageA
DefWindowProcA
IsWindow
SendMessageA
CreateWindowExA
DestroyWindow
LoadIconA
LoadCursorA
RegisterClassExA
SetWindowTextA
SetTimer
ShowWindow
FindWindowA
LoadStringA
PostMessageA
winspool.drv
EnumJobsA
OpenPrinterA
SetJobA
GetJobA
GetPrinterDriverDirectoryA
GetPrinterDataA
ClosePrinter
kernel32
VirtualAlloc
FatalAppExitA
GetSystemTimeAsFileTime
lstrcpynA
GetModuleFileNameA
GetModuleHandleA
GetLastError
ProcessIdToSessionId
GetCurrentProcessId
CloseHandle
ReleaseMutex
GetCurrentThreadId
WaitForSingleObject
CreateMutexA
OpenMutexA
FormatMessageA
DeleteFileA
GetWindowsDirectoryA
GetTickCount
WriteFile
HeapReAlloc
GetConsoleMode
CreateFileA
GetLocalTime
WideCharToMultiByte
MultiByteToWideChar
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetCurrentProcess
GetProcAddress
GetVersionExA
LoadLibraryA
FreeLibrary
OutputDebugStringA
PeekNamedPipe
ReadFile
LocalFree
GetUserDefaultLangID
ExpandEnvironmentStringsA
SetFilePointer
GetConsoleCP
FlushFileBuffers
GetLocaleInfoA
GetStringTypeA
GetStringTypeW
GetTimeFormatA
GetDateFormatA
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
SetConsoleCtrlHandler
SetEnvironmentVariableA
GetLocaleInfoW
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetStdHandle
GetTimeZoneInformation
CreateFileW
SetEndOfFile
CompareStringA
CompareStringW
GetFileSize
InterlockedIncrement
InterlockedDecrement
InterlockedCompareExchange
InterlockedExchange
Sleep
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RaiseException
RtlUnwind
GetCommandLineA
HeapFree
HeapAlloc
GetProcessHeap
GetStartupInfoA
LCMapStringA
LCMapStringW
GetCPInfo
ExitProcess
GetStdHandle
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThread
GetACP
GetOEMCP
HeapSize
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapDestroy
HeapCreate
VirtualFree
QueryPerformanceCounter
gdi32
GetStockObject
advapi32
RegEnumValueA
SetKernelObjectSecurity
GetSecurityDescriptorDacl
SetSecurityInfo
InitializeAcl
AddAccessAllowedAce
IsValidSid
GetLengthSid
GetAce
AllocateAndInitializeSid
FreeSid
RegCreateKeyExA
RegEnumKeyExA
RegDeleteKeyA
RegSetValueExA
RegDeleteValueA
RegOpenKeyExA
RegQueryValueExA
RegFlushKey
RegCloseKey
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
Sections
.text Size: 564KB - Virtual size: 563KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 88KB - Virtual size: 85KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ