Static task
static1
Behavioral task
behavioral1
Sample
d516485152fbc3010b5708f85771ab9a8f3ee0e525651bc18702b686ff49f54f.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
d516485152fbc3010b5708f85771ab9a8f3ee0e525651bc18702b686ff49f54f.exe
Resource
win10v2004-20220812-en
General
-
Target
d516485152fbc3010b5708f85771ab9a8f3ee0e525651bc18702b686ff49f54f
-
Size
164KB
-
MD5
06ab5e26e0b33560667e1eadffc6b450
-
SHA1
33b1592fdf61897cc4e5e74e03044cf7b8d015d9
-
SHA256
d516485152fbc3010b5708f85771ab9a8f3ee0e525651bc18702b686ff49f54f
-
SHA512
125fb32d00fc301267e49e9ef14ca27bdec3526350cbfda5e4c7df502ff64100af1290daa26da6d162271837874c6ad52f5745d69acb908cff89102a9b2966f4
-
SSDEEP
3072:q07mY0Eh0S4f+5ZeTn3UZkgkMGc0J2DV2TyKmfFkeM+:q0CY0Eh0SL4n3UZXsp2pnKmfCT+
Malware Config
Signatures
Files
-
d516485152fbc3010b5708f85771ab9a8f3ee0e525651bc18702b686ff49f54f.exe windows x86
df8e062498b88cbf55a339965293ae7c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalUnlock
GlobalFree
GetProcessHeap
HeapAlloc
HeapFree
CreateEventA
GetLocalTime
ExitProcess
VirtualAllocEx
WriteProcessMemory
CreateRemoteThread
GetCurrentProcess
SetLastError
ReleaseMutex
GetLastError
SetFilePointer
ReadFile
WriteFile
CloseHandle
RemoveDirectoryA
LocalFree
GetDriveTypeA
CreateDirectoryA
GetVersionExA
lstrcmpA
WideCharToMultiByte
MultiByteToWideChar
lstrcatA
GetTickCount
OpenEventA
SetErrorMode
GetModuleHandleA
GetStartupInfoA
OutputDebugStringA
GetProcAddress
GetPrivateProfileSectionNamesA
VirtualAlloc
EnterCriticalSection
VirtualFree
DeleteCriticalSection
Sleep
SetEvent
WaitForSingleObject
LoadLibraryA
CreateMutexA
user32
WindowFromPoint
SetCursorPos
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
GetSystemMetrics
LoadCursorA
SetCapture
GetAsyncKeyState
GetCursorPos
SetProcessWindowStation
OpenWindowStationA
GetProcessWindowStation
GetWindowThreadProcessId
IsWindowVisible
CloseDesktop
GetThreadDesktop
ReleaseDC
GetKeyState
IsWindow
DispatchMessageA
TranslateMessage
GetForegroundWindow
GetWindowTextA
CharNextA
GetMessageA
SetRect
SendMessageA
CloseWindow
CreateWindowExA
PostMessageA
OpenDesktopA
gdi32
DeleteDC
CreateDIBSection
SelectObject
BitBlt
CreateCompatibleBitmap
GetDIBits
DeleteObject
advapi32
FreeSid
DeleteService
CloseServiceHandle
RegQueryValueA
RegCloseKey
LsaOpenPolicy
LsaRetrievePrivateData
LsaClose
LookupAccountNameA
IsValidSid
QueryServiceStatus
OpenServiceA
OpenSCManagerA
RegSetValueExA
RegCreateKeyA
SetNamedSecurityInfoA
GetNamedSecurityInfoA
SetEntriesInAclA
RegQueryValueExA
RegOpenKeyA
RegCreateKeyExA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegSetKeySecurity
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
AddAccessAllowedAce
InitializeAcl
GetLengthSid
AllocateAndInitializeSid
RegEnumValueA
RegEnumKeyExA
RegDeleteValueA
RegDeleteKeyA
CreateProcessAsUserA
SetTokenInformation
DuplicateTokenEx
LookupAccountSidA
GetTokenInformation
ControlService
shell32
SHGetSpecialFolderPathA
SHGetFileInfoA
msvcrt
_strnicmp
calloc
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
??1type_info@@UAE@XZ
_strupr
_beginthreadex
strncat
strtok
_errno
atoi
strncmp
strcat
rename
strrchr
_except_handler3
free
memset
??2@YAPAXI@Z
??3@YAXPAX@Z
memcpy
__CxxFrameHandler
_CxxThrowException
memmove
ceil
_ftol
strlen
strstr
memcmp
strcpy
strchr
malloc
strcmp
shlwapi
SHDeleteKeyA
ws2_32
listen
WSAStartup
sendto
recvfrom
__WSAFDIsSet
gethostname
accept
getsockname
inet_addr
inet_ntoa
send
ntohs
WSACleanup
setsockopt
connect
bind
getpeername
select
closesocket
socket
gethostbyname
htons
msvcp60
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBDABV?$allocator@D@1@@Z
?c_str@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEPBDXZ
wtsapi32
WTSQuerySessionInformationA
WTSFreeMemory
WTSQueryUserToken
userenv
CreateEnvironmentBlock
msvfw32
ICSeqCompressFrameEnd
ICSendMessage
psapi
EnumProcessModules
Sections
.text Size: 124KB - Virtual size: 122KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 332B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ