Static task
static1
Behavioral task
behavioral1
Sample
d26347c84c3998939fea4fef1c8858117cba5c1828ccf582590adaee6ba95825.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d26347c84c3998939fea4fef1c8858117cba5c1828ccf582590adaee6ba95825.exe
Resource
win10v2004-20220812-en
General
-
Target
d26347c84c3998939fea4fef1c8858117cba5c1828ccf582590adaee6ba95825
-
Size
168KB
-
MD5
61ffd4ffe93af3ee198c439251b4f730
-
SHA1
8aec35e6328c468bac2b9f149a19fbe9e44157a7
-
SHA256
d26347c84c3998939fea4fef1c8858117cba5c1828ccf582590adaee6ba95825
-
SHA512
a9f633b9bb8117c4f6873f98a4b2e6bc4f00067a252b112e399f1874b524d5b8043f8b4c18152d0f73071eaf6f0811c8c585acfbf479be2f3a60b8008ad9633b
-
SSDEEP
1536:SRjHZewPG8UHSVkfDy4fOJJr1T7Y08m6Zu0eU4ptqwgWpiti1yhQ9G1GGJou:+kwxWAfr1/KbeU4bKE0i1P9ju
Malware Config
Signatures
Files
-
d26347c84c3998939fea4fef1c8858117cba5c1828ccf582590adaee6ba95825.exe windows x86
390ea1e1a0a83ad4918d76109f91a97c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
UnmapViewOfFile
FindFirstFileA
SetErrorMode
GetFileAttributesA
CreateDirectoryA
GetTempFileNameA
SetCurrentDirectoryW
GetModuleFileNameW
CloseHandle
CreateThread
LocalFree
FormatMessageW
LocalAlloc
GetCurrentProcess
GetProcAddress
GetModuleHandleW
GetLastError
CreateMutexW
GetVersionExW
GetVersion
LoadLibraryW
DeleteCriticalSection
WaitForSingleObject
lstrlenW
LeaveCriticalSection
EnterCriticalSection
GetFileAttributesW
GetTempPathA
GetCurrentDirectoryW
InitializeCriticalSection
lstrcpyW
HeapFree
HeapAlloc
GetProcessHeap
IsDBCSLeadByte
CopyFileW
CreateDirectoryW
GetWindowsDirectoryW
GetEnvironmentVariableW
DeleteFileW
SetFileAttributesW
WideCharToMultiByte
MultiByteToWideChar
lstrlenA
GetDriveTypeW
ExpandEnvironmentStringsW
FreeLibrary
LoadLibraryExW
DeviceIoControl
CreateFileA
TerminateProcess
OpenProcess
FindClose
FindNextFileW
FindFirstFileW
CreateProcessW
lstrcatW
SetEvent
CreateEventW
ResetEvent
WriteFile
SetCommState
GetCommState
SetCommTimeouts
ReadFile
ExitThread
WaitForMultipleObjects
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetModuleHandleA
GetStartupInfoA
SetLastError
GetDiskFreeSpaceW
OpenFileMappingA
CreateFileMappingA
MapViewOfFile
GetVersionExA
CreateEventA
DebugBreak
ExitProcess
SetFilePointer
DeleteFileA
FileTimeToDosDateTime
FileTimeToLocalFileTime
GetSystemDirectoryW
CreateFileW
GetWindowsDirectoryA
lstrcatA
VirtualAlloc
user32
ReleaseDC
LoadStringA
GetDC
SystemParametersInfoW
wsprintfW
GetParent
PostMessageW
DialogBoxParamW
ShowWindow
SetWindowPos
ScreenToClient
GetWindowRect
GetWindowLongW
EnumChildWindows
LoadImageW
RedrawWindow
EnableWindow
EndDialog
GetDlgItem
SendMessageA
SetWindowLongW
LoadIconW
SetFocus
SendDlgItemMessageW
GetSysColor
InvalidateRect
SetWindowLongA
GetWindowLongA
IsWindow
CopyRect
GetClientRect
MessageBoxA
SetTimer
FindWindowW
RegisterClassExW
LoadStringW
MessageBoxW
CreateWindowExW
GetMessageW
TranslateMessage
DispatchMessageW
CharLowerW
SendMessageW
SetForegroundWindow
EnumThreadWindows
PostQuitMessage
DefWindowProcW
ExitWindowsEx
LoadCursorW
gdi32
GetDeviceCaps
CreateFontIndirectW
AddFontResourceW
GetStockObject
msvcrt
_mbsrchr
__lconv_init
_mbschr
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_cexit
_XcptFilter
_exit
_c_exit
setlocale
_mbsinc
_controlfp
wcsrchr
wcschr
wcscat
wcscpy
wcslen
wcsncpy
_ftol
strtoul
memmove
towlower
_wtoi
iswspace
free
_wcsnicmp
_wcsicmp
_except_handler3
wcsncmp
comdlg32
GetOpenFileNameW
advapi32
RegEnumKeyW
LookupPrivilegeValueW
OpenProcessToken
LookupAccountSidW
RegQueryValueW
RegEnumKeyExW
RegSetValueExW
RegOpenKeyW
RegOpenKeyExW
AdjustTokenPrivileges
RegQueryValueExW
RegCloseKey
AllocateAndInitializeSid
EqualSid
FreeSid
GetTokenInformation
shell32
SHGetFileInfoW
SHGetDesktopFolder
SHGetPathFromIDListW
SHGetSpecialFolderLocation
SHBrowseForFolderW
SHGetMalloc
ole32
OleUninitialize
OleInitialize
CoInitialize
CoTaskMemAlloc
CoTaskMemFree
CoCreateInstance
CLSIDFromString
CoUninitialize
shlwapi
StrCmpIW
PathAppendW
PathIsRootW
StrCpyNW
StrCmpNIW
StrCatW
StrCpyW
PathCombineW
StrDupW
PathIsDirectoryW
SHGetValueW
StrChrIW
StrCmpW
Sections
.text Size: 141KB - Virtual size: 140KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 888B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ