Static task
static1
Behavioral task
behavioral1
Sample
836d2f73627240d67a442ae7271993e332bb533d146cee53934af85e816e6144.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
836d2f73627240d67a442ae7271993e332bb533d146cee53934af85e816e6144.exe
Resource
win10v2004-20220901-en
General
-
Target
836d2f73627240d67a442ae7271993e332bb533d146cee53934af85e816e6144
-
Size
42KB
-
MD5
6cfcec975e55862f56d5891853793f80
-
SHA1
4a3eb5442841705500a295adf7a411766e1bff05
-
SHA256
836d2f73627240d67a442ae7271993e332bb533d146cee53934af85e816e6144
-
SHA512
eeac377355bd61de69b000d8c8dad10c6b02504ca7d3fa59a43bda483a6ebcd3737156a4edd5509b078ab91082259fed02ee9a4989db3fd7f0389037dae68c7d
-
SSDEEP
768:6RMJi8jDLIDSAaQFxfftjaLacUkLGKokq3Xfy1jHYEGH+6kTsQyEgK:6RMJbDMDSA7FxffJaLaMLGQqHfy1j4ER
Malware Config
Signatures
Files
-
836d2f73627240d67a442ae7271993e332bb533d146cee53934af85e816e6144.exe windows x86
f752af36170e273f3502f811b9235c7f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
CreateWindowExW
DestroyWindow
RegisterClassExW
DefWindowProcW
LoadRemoteFonts
wsprintfW
GetSystemMetrics
GetKeyboardLayout
SystemParametersInfoW
GetDesktopWindow
LoadStringW
MessageBoxW
ExitWindowsEx
CharNextW
advapi32
RegOpenKeyExA
ReportEventW
RegisterEventSourceW
DeregisterEventSource
OpenProcessToken
RegCreateKeyExW
RegSetValueExW
GetUserNameW
RegQueryValueExW
RegOpenKeyExW
RegQueryInfoKeyW
RegCloseKey
RegQueryValueExA
crypt32
CryptProtectData
winspool.drv
SpoolerInit
ntdll
RtlLengthSid
RtlCopySid
_itow
RtlFreeUnicodeString
DbgPrint
wcslen
wcscpy
wcscat
wcscmp
RtlInitUnicodeString
NtOpenKey
NtClose
_wcsicmp
memmove
RtlConvertSidToUnicodeString
NtQueryInformationToken
netapi32
DsGetDcNameW
NetApiBufferFree
wldap32
ord46
ord88
ord14
ord12
ord145
ord73
msvcrt
__setusermatherr
_initterm
__getmainargs
_acmdln
_adjust_fdiv
_XcptFilter
_exit
_c_exit
__p__commode
__p__fmode
__set_app_type
_except_handler3
_controlfp
_cexit
exit
kernel32
CompareFileTime
LoadLibraryW
GetProcAddress
FreeLibrary
lstrcpyW
CreateProcessW
lstrlenW
GetVersionExW
LocalFree
LocalAlloc
GetEnvironmentVariableW
CloseHandle
lstrcatW
WaitForSingleObject
DelayLoadFailureHook
GetStartupInfoA
GetModuleHandleA
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
LoadLibraryA
InterlockedCompareExchange
LocalReAlloc
GetSystemTime
lstrcmpW
GetCurrentThread
SetThreadPriority
ExpandEnvironmentStringsW
SearchPathW
GetLastError
CreateThread
GetFileAttributesExW
GetSystemDirectoryW
SetCurrentDirectoryW
FormatMessageW
lstrcmpiW
GetCurrentProcess
GetUserDefaultLangID
GetCurrentProcessId
SetEvent
OpenEventW
Sleep
SetEnvironmentVariableW
Sections
.text Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 332B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 23KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE