Static task
static1
Behavioral task
behavioral1
Sample
86f7297e593422f143981191edaffc8280f20c8ababa8376d6e909131accc5d8.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
86f7297e593422f143981191edaffc8280f20c8ababa8376d6e909131accc5d8.exe
Resource
win10v2004-20220812-en
General
-
Target
86f7297e593422f143981191edaffc8280f20c8ababa8376d6e909131accc5d8
-
Size
648KB
-
MD5
67b48e05b4197b7b9cfcab184192d840
-
SHA1
c5383db65d7c6d934e47a69df6ef64033b9c9907
-
SHA256
86f7297e593422f143981191edaffc8280f20c8ababa8376d6e909131accc5d8
-
SHA512
7d44b9be1e21995752ead7f08ba35bad5c70dcbb2b87a90578ac00715067016d8fc89ae649a7f1759de4871b2e5f7663e17c54c4cc840523fa52c39d8086398b
-
SSDEEP
12288:CxXM6TQHHpnL5JmPyYEQUaQjwYa6TqCVlDxVKebkiterUibMF71:AM6TQHhL5QXYtTueYi0AibMF71
Malware Config
Signatures
Files
-
86f7297e593422f143981191edaffc8280f20c8ababa8376d6e909131accc5d8.exe windows x86
593081750e50408a4864012ebf058745
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FlushFileBuffers
ConnectNamedPipe
CreateNamedPipeA
GetTickCount
LocalFree
LocalAlloc
OpenFile
GetLocalTime
Beep
GetPrivateProfileStringA
UnmapViewOfFile
OpenFileMappingA
MapViewOfFile
CreateFileMappingA
GetExitCodeThread
QueryPerformanceCounter
DisconnectNamedPipe
SetEnvironmentVariableA
CompareStringW
CompareStringA
GetLocaleInfoW
GetTimeZoneInformation
SetStdHandle
SetConsoleCtrlHandler
GetSystemInfo
VirtualProtect
IsValidCodePage
IsValidLocale
EnumSystemLocalesA
ReadFile
GetUserDefaultLCID
GetDateFormatA
GetTimeFormatA
GetStringTypeW
GetStringTypeA
GetCPInfo
GetOEMCP
OpenProcess
IsBadCodePtr
SetUnhandledExceptionFilter
InitializeCriticalSection
LCMapStringW
MultiByteToWideChar
LCMapStringA
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetStdHandle
RaiseException
IsBadWritePtr
HeapReAlloc
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
VirtualQuery
GetSystemDirectoryA
ExitThread
GetLocaleInfoA
InterlockedExchange
HeapSize
GetModuleHandleA
TlsGetValue
TlsSetValue
TlsFree
SetLastError
TlsAlloc
EnterCriticalSection
FatalAppExitA
LeaveCriticalSection
DeleteCriticalSection
GetStartupInfoA
GetCommandLineA
IsBadReadPtr
RtlUnwind
GetSystemTimeAsFileTime
GetCurrentThread
CreateProcessA
SetThreadPriority
TerminateThread
GetCurrentProcess
WideCharToMultiByte
DeleteFileA
GetProcessHeap
HeapAlloc
HeapFree
GetCurrentProcessId
CreateSemaphoreA
InterlockedDecrement
InterlockedIncrement
PulseEvent
CreateMutexA
ReleaseSemaphore
DeviceIoControl
GetVersionExA
GetSystemPowerStatus
CreateThread
GetModuleFileNameA
GetExitCodeProcess
TerminateProcess
GetSystemTime
CreateFileA
SetFilePointer
WriteFile
ExitProcess
OpenMutexA
ReleaseMutex
OutputDebugStringA
CallNamedPipeA
GetProcAddress
FreeLibrary
LoadLibraryA
OpenEventA
SetEvent
WaitForMultipleObjects
WaitForSingleObject
CreateEventA
ResetEvent
Sleep
GetCurrentThreadId
GetLastError
GetACP
CloseHandle
user32
IsWindow
EnumDisplaySettingsA
KillTimer
UnregisterDeviceNotification
SendInput
EnumWindows
SendMessageA
GetPropA
RegisterWindowMessageA
RegisterHotKey
UnregisterHotKey
GetForegroundWindow
GetDesktopWindow
GetWindowThreadProcessId
RegisterDeviceNotificationA
ExitWindowsEx
SystemParametersInfoA
OpenDesktopA
CloseDesktop
SendNotifyMessageA
MsgWaitForMultipleObjects
GetCursorPos
MonitorFromPoint
GetMonitorInfoA
GetMessageA
DispatchMessageA
TranslateMessage
BroadcastSystemMessageA
DestroyWindow
DefWindowProcA
PostMessageA
FindWindowA
RegisterClassA
CreateWindowExA
ShowWindow
MessageBoxA
EnumDisplayDevicesA
ChangeDisplaySettingsExA
ChangeDisplaySettingsA
EnumDisplaySettingsExA
GetSystemMetrics
SetWindowPos
GetCursor
LoadCursorA
SetCursor
SetTimer
gdi32
DeleteDC
CreateDCA
ExtEscape
ole32
CoInitializeSecurity
CoUninitialize
CoInitializeEx
CoCreateInstance
oleaut32
SysFreeString
SysAllocString
VariantInit
VariantClear
userenv
LoadUserProfileA
GetUserProfileDirectoryW
UnloadUserProfile
psapi
GetModuleBaseNameA
EnumProcessModules
EnumProcesses
setupapi
SetupDiEnumDeviceInfo
SetupDiGetDeviceRegistryPropertyA
SetupDiSetClassInstallParamsA
SetupDiDestroyDeviceInfoList
SetupDiGetDeviceInfoListDetailA
SetupDiGetClassDevsA
SetupDiOpenDevRegKey
CM_Get_Child_Ex
CM_Get_DevNode_Status
SetupDiGetDeviceInstanceIdA
CM_Reenumerate_DevNode
CM_Get_DevNode_Registry_PropertyA
CM_Get_Device_ID_ExA
CM_Get_Parent
SetupDiGetHwProfileList
SetupDiCallClassInstaller
advapi32
AllocateAndInitializeSid
InitializeAcl
AddAccessAllowedAce
FreeSid
StartServiceCtrlDispatcherA
RegisterServiceCtrlHandlerA
RegisterServiceCtrlHandlerExA
DeleteService
CreateServiceA
RegCreateKeyA
CreateProcessAsUserA
SetServiceStatus
RegisterEventSourceA
ReportEventA
DeregisterEventSource
StartServiceA
RegSetValueExA
QueryServiceStatus
ImpersonateLoggedOnUser
RevertToSelf
OpenSCManagerA
OpenServiceA
CloseServiceHandle
ControlService
RegDeleteValueA
RegOpenCurrentUser
RegCreateKeyExA
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
RegEnumValueA
RegEnumKeyExA
RegQueryInfoKeyA
RegDeleteKeyA
GetLengthSid
OpenProcessToken
CheckTokenMembership
AdjustTokenPrivileges
LookupPrivilegeValueA
GetUserNameA
SetThreadToken
OpenThreadToken
SetSecurityDescriptorOwner
Sections
.text Size: 452KB - Virtual size: 448KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 160KB - Virtual size: 158KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 77KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
�e�!�u� Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE