Static task
static1
Behavioral task
behavioral1
Sample
d8726d8cd6ecb2a1c02de2ff22a24ef2ea7aee0c3f0682496992f512d4d56278.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
d8726d8cd6ecb2a1c02de2ff22a24ef2ea7aee0c3f0682496992f512d4d56278.exe
Resource
win10v2004-20220812-en
General
-
Target
d8726d8cd6ecb2a1c02de2ff22a24ef2ea7aee0c3f0682496992f512d4d56278
-
Size
304KB
-
MD5
04d629ac2b925b27426ea808524d4350
-
SHA1
2fc0d8976c416087201130669e5ce4aae7be7123
-
SHA256
d8726d8cd6ecb2a1c02de2ff22a24ef2ea7aee0c3f0682496992f512d4d56278
-
SHA512
0c08c9da5a68d3a79e86126a5f366768494b00a22b747b51d856d2598cf1b3c98d91294a295e5f6446dcf0994e40080389b5cb7c4d81175e93b6f9bee0ded57a
-
SSDEEP
6144:aFjYc2JeUHN/xZ8DjNUZXsFOrdRyiiUtuEt1+uT:aFjRFg/xqROrDyJ4BrT
Malware Config
Signatures
Files
-
d8726d8cd6ecb2a1c02de2ff22a24ef2ea7aee0c3f0682496992f512d4d56278.exe windows x86
f0573bfc7c2c7bc58efc19d57907c99c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ReleaseMutex
PulseEvent
HeapFree
HeapAlloc
GetProcessHeap
GetCurrentProcess
ReadFile
DisconnectNamedPipe
FlushFileBuffers
ConnectNamedPipe
CreateNamedPipeA
GetModuleHandleA
lstrcpyA
CompareStringW
CompareStringA
GetLocaleInfoW
GetTimeZoneInformation
GetSystemInfo
VirtualProtect
SetStdHandle
SetConsoleCtrlHandler
InitializeCriticalSection
LCMapStringW
LCMapStringA
OpenMutexA
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
GetDateFormatA
GetTimeFormatA
GetStringTypeW
MultiByteToWideChar
GetStringTypeA
HeapReAlloc
VirtualAlloc
GetCPInfo
GetOEMCP
GetACP
EnterCriticalSection
FatalAppExitA
LeaveCriticalSection
IsBadCodePtr
IsBadWritePtr
IsBadReadPtr
RaiseException
SetUnhandledExceptionFilter
VirtualFree
HeapCreate
CreateMutexA
ReleaseSemaphore
CreateSemaphoreA
DeviceIoControl
FindFirstFileA
LoadLibraryA
DeleteFileA
FindClose
MoveFileA
CopyFileA
GetSystemDirectoryA
GetCurrentProcessId
GetVersionExA
GetModuleFileNameA
GetSystemTime
ExitProcess
OutputDebugStringA
GetCurrentThreadId
GetTickCount
TerminateProcess
Sleep
CallNamedPipeA
OpenEventA
WaitForSingleObject
CreateThread
GetSystemPowerStatus
CreateEventA
ResetEvent
SetEvent
CreateProcessA
GetPrivateProfileStringA
CreateFileA
SetFilePointer
WriteFile
TerminateThread
WaitForMultipleObjects
CloseHandle
GetLastError
GetProcAddress
FreeLibrary
IsValidCodePage
RtlUnwind
GetCommandLineA
GetStartupInfoA
TlsAlloc
SetLastError
GetCurrentThread
TlsFree
TlsSetValue
TlsGetValue
HeapSize
InterlockedExchange
VirtualQuery
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
DeleteCriticalSection
HeapDestroy
SetEnvironmentVariableA
user32
WindowFromDC
MapWindowPoints
IntersectRect
SystemParametersInfoA
GetWindowRect
MsgWaitForMultipleObjects
GetCursorPos
GetDesktopWindow
SetForegroundWindow
WaitForInputIdle
MessageBoxA
PostMessageA
GetMessageA
TranslateMessage
DispatchMessageA
IsWindow
DestroyWindow
FindWindowA
RegisterClassA
CreateWindowExA
ShowWindow
DefWindowProcA
GetSystemMetrics
SetWindowPos
GetCursor
LoadCursorA
SetCursor
UnregisterHotKey
RegisterHotKey
RegisterWindowMessageA
KillTimer
SetTimer
ChangeDisplaySettingsA
EnumDisplaySettingsA
BroadcastSystemMessageA
gdi32
GetClipBox
GetDeviceCaps
ExtEscape
DeleteDC
CreateDCA
advapi32
OpenProcessToken
GetLengthSid
ImpersonateLoggedOnUser
GetUserNameA
RevertToSelf
RegDeleteKeyA
RegQueryInfoKeyA
RegEnumKeyExA
RegEnumValueA
SetServiceStatus
RegisterServiceCtrlHandlerA
StartServiceCtrlDispatcherA
RegisterEventSourceA
ReportEventA
DeleteService
CreateServiceA
RegCreateKeyA
OpenSCManagerA
OpenServiceA
CloseServiceHandle
DeregisterEventSource
RegOpenKeyExA
RegQueryValueExA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
RegDeleteValueA
AllocateAndInitializeSid
FreeSid
InitializeSecurityDescriptor
SetSecurityDescriptorOwner
InitializeAcl
AddAccessAllowedAce
SetSecurityDescriptorDacl
Sections
.text Size: 192KB - Virtual size: 191KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 72KB - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE