Static task
static1
Behavioral task
behavioral1
Sample
857122fe3910bb478c864766c457d236763493d7036903a8b95401631af2ecbd.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
857122fe3910bb478c864766c457d236763493d7036903a8b95401631af2ecbd.exe
Resource
win10v2004-20220812-en
General
-
Target
857122fe3910bb478c864766c457d236763493d7036903a8b95401631af2ecbd
-
Size
426KB
-
MD5
623fbd862d0044c6f5677d946565a080
-
SHA1
0ee6d5dc8a0148b899567b7939fbff58ce3c2311
-
SHA256
857122fe3910bb478c864766c457d236763493d7036903a8b95401631af2ecbd
-
SHA512
96f4b7ca5967ac0e87cbb5ea943d6b0179b66955ca6cd807565a0fb46b91d7a57e7fdd666044139647c7f4b561fd1324202da7bb425066c66392db7efa97893e
-
SSDEEP
12288:9/r/HbMUnpH5zXYVj0+Qy5RVUtRo29Yz+nC:Nr/HbDnpH5zoVj0+QiRVP29V
Malware Config
Signatures
Files
-
857122fe3910bb478c864766c457d236763493d7036903a8b95401631af2ecbd.exe windows x86
7adb4d867fb776ff1b371f7cecf97932
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetVolumeLabelA
WaitForSingleObjectEx
CreateHardLinkA
SetTapeParameters
LocalFree
UnhandledExceptionFilter
CreateDirectoryA
GetCurrentProcess
VirtualFree
GetProfileIntA
SetProcessShutdownParameters
LocalFileTimeToFileTime
SetThreadContext
CreateDirectoryExA
SetFileShortNameA
HeapDestroy
SetThreadPriorityBoost
GlobalWire
WriteFile
HeapSize
DebugBreakProcess
SetComputerNameA
GetProcAddress
GetModuleHandleA
SetEnvironmentVariableA
CompareStringW
CompareStringA
GetProcessShutdownParameters
SetEndOfFile
ReadFile
GetStringTypeW
GetStringTypeA
GetLocaleInfoA
LCMapStringW
LCMapStringA
GetTimeZoneInformation
CreateFileA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
FlushFileBuffers
SetStdHandle
MultiByteToWideChar
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
BackupRead
FindFirstVolumeA
GetShortPathNameA
SetUnhandledExceptionFilter
GetFileType
GetSystemTimeAdjustment
GetSystemPowerStatus
RegisterWaitForSingleObjectEx
EnumResourceLanguagesA
CopyFileA
FreeResource
GetCurrentThreadId
SetFileAttributesA
GetProcessHeap
CloseHandle
GetLastError
HeapFree
HeapAlloc
TerminateProcess
IsDebuggerPresent
RtlUnwind
GetSystemTimeAsFileTime
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
GetDriveTypeA
FindFirstFileA
GetModuleHandleW
Sleep
ExitProcess
RaiseException
GetCommandLineA
GetStartupInfoA
HeapCreate
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
HeapReAlloc
GetStdHandle
GetModuleFileNameA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
InterlockedDecrement
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
GetFullPathNameA
GetCurrentDirectoryA
FreeLibrary
InterlockedExchange
LoadLibraryA
InitializeCriticalSectionAndSpinCount
SetHandleCount
SetFilePointer
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
LocalAlloc
user32
BringWindowToTop
ExcludeUpdateRgn
GetParent
GetKeyboardLayoutNameA
UnregisterClassA
GetMenuContextHelpId
EnumDisplayDevicesA
GetKBCodePage
GetLastInputInfo
GetClassInfoA
MapVirtualKeyA
MapVirtualKeyExA
IsWindow
GetScrollBarInfo
RegisterClassExA
SetLastErrorEx
GetWindowTextA
SwitchDesktop
CopyIcon
IsChild
CharPrevA
RegisterHotKey
CloseClipboard
DestroyIcon
TranslateMessage
SetWinEventHook
SetScrollInfo
GetClassWord
GetLastActivePopup
GetClassLongA
SetWindowsHookExA
advapi32
CreateProcessAsUserA
EncryptFileA
LookupAccountSidA
ObjectPrivilegeAuditAlarmA
SetFileSecurityA
GetCurrentHwProfileA
CreatePrivateObjectSecurityEx
ObjectCloseAuditAlarmA
GetPrivateObjectSecurity
IsValidSecurityDescriptor
OpenEncryptedFileRawA
DestroyPrivateObjectSecurity
SetKernelObjectSecurity
SetPrivateObjectSecurityEx
Sections
.text Size: 289KB - Virtual size: 289KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 33KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 102KB - Virtual size: 110KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE