Static task
static1
Behavioral task
behavioral1
Sample
8961db098cfde36195335e872fd01c118800132d4e7cd24dfbb378ea0679733a.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
8961db098cfde36195335e872fd01c118800132d4e7cd24dfbb378ea0679733a.exe
Resource
win10v2004-20220812-en
General
-
Target
8961db098cfde36195335e872fd01c118800132d4e7cd24dfbb378ea0679733a
-
Size
109KB
-
MD5
066b9cc5b6b0a4bee9c893852f721026
-
SHA1
60985e4af2534bdf688c6133e875428dd11e578a
-
SHA256
8961db098cfde36195335e872fd01c118800132d4e7cd24dfbb378ea0679733a
-
SHA512
87e96968232eb21b462a63017c77715193d406c921d28301615c56864682f6bcc716892d650fd902d4805321f5903111ab7059af433b198ce3b1bf1961c3c3f4
-
SSDEEP
1536:CPzApxossyf+wYu4aQlcaiMFfA8XG2WPZ2mWad33DAHeIHbURTCRctW:vpxcyW7hDA8X7eZoadHDI7EjtW
Malware Config
Signatures
Files
-
8961db098cfde36195335e872fd01c118800132d4e7cd24dfbb378ea0679733a.exe windows x86
15f91e870830879e2e3dc9cb025ba69c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
GetModuleHandleW
GetSystemTimeAsFileTime
SetLastError
lstrcpynA
CompareStringW
GetStringTypeExA
GetThreadLocale
GetSystemDefaultLCID
RemoveDirectoryA
GetSystemDirectoryW
FlushFileBuffers
LocalAlloc
lstrlenA
IsBadWritePtr
GetConsoleMode
GetUserDefaultLangID
FreeEnvironmentStringsA
VirtualProtect
lstrlenW
lstrcmpiA
CopyFileW
GetSystemTime
GetVersionExW
GetTempPathA
GetWindowsDirectoryA
GetModuleHandleA
MulDiv
GetCPInfo
GlobalLock
FileTimeToSystemTime
FileTimeToLocalFileTime
OutputDebugStringA
GetCurrentThread
LCMapStringA
LoadResource
WaitForMultipleObjects
DeleteFileW
GetCommandLineW
CompareStringA
DeleteFileA
EnumCalendarInfoA
GetTempFileNameA
DuplicateHandle
IsDebuggerPresent
GlobalHandle
GetACP
GetExitCodeProcess
UnhandledExceptionFilter
GetLocalTime
MultiByteToWideChar
GetTimeZoneInformation
GetOEMCP
msvcrt
__p__commode
_exit
_XcptFilter
_controlfp
__getmainargs
__p___initenv
_adjust_fdiv
__p__fmode
__set_app_type
__setusermatherr
_except_handler3
_initterm
advapi32
OpenSCManagerW
QueryServiceStatus
OpenProcessToken
CopySid
SetSecurityDescriptorOwner
RegDeleteValueW
OpenSCManagerA
RegEnumKeyExW
RegEnumValueW
RegSetValueExA
RegOpenKeyExA
IsValidSid
RegSetValueExW
InitializeAcl
LookupPrivilegeValueA
SetSecurityDescriptorGroup
GetLengthSid
CryptHashData
RegQueryInfoKeyW
SetSecurityDescriptorDacl
ControlService
RegCreateKeyExW
RegOpenKeyExW
GetUserNameA
RegCloseKey
DeleteService
CloseServiceHandle
CheckTokenMembership
OpenServiceW
DeregisterEventSource
AllocateAndInitializeSid
CryptAcquireContextA
user32
CheckMenuItem
PostQuitMessage
FillRect
DestroyWindow
RemoveMenu
GetForegroundWindow
SystemParametersInfoA
IsZoomed
FrameRect
ClientToScreen
UnhookWindowsHookEx
GetWindowTextA
GetLastActivePopup
SetClassLongA
RedrawWindow
IsIconic
SetScrollInfo
GetParent
InsertMenuItemA
SetFocus
InsertMenuA
SetRect
GetWindow
GetMenu
SetWindowLongA
IsWindowEnabled
GetMenuState
SetMenu
ShowOwnedPopups
GetIconInfo
SetPropA
UpdateWindow
CallWindowProcA
GetClientRect
RegisterWindowMessageA
GetDC
IsWindowVisible
DrawIcon
GetMenuItemID
GetMessageA
GetDesktopWindow
LoadCursorA
OemToCharA
Sections
.text Size: 1024B - Virtual size: 844B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 52KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 35KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ