Static task
static1
Behavioral task
behavioral1
Sample
432312f2a33151e227a68bf200189a40277870b3cd88057058f37a377425bb3e.exe
Resource
win7-20220812-en
General
-
Target
432312f2a33151e227a68bf200189a40277870b3cd88057058f37a377425bb3e
-
Size
451KB
-
MD5
7aecb0a49a93610e581583bf3566d340
-
SHA1
ed5a58cb32566017d8259484bfd4953fa64bdce5
-
SHA256
432312f2a33151e227a68bf200189a40277870b3cd88057058f37a377425bb3e
-
SHA512
431e7703bd362ef862d65a24d26ff8e262a3b9c34be3eb45b79fb73d99862222cb62314973b3c5ed7b224f62ab7d1d2fe421d49f356dd41e33b74a35552d7c5e
-
SSDEEP
12288:Aq66cLdFWoGkXjEi356po1g0IyQhxVkJnJS:Aq66joRXj53Ko+0VQhxqBJS
Malware Config
Signatures
Files
-
432312f2a33151e227a68bf200189a40277870b3cd88057058f37a377425bb3e.exe windows x86
d92af21f467a097abfd88c2d9b9c88b3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadLibraryW
SetEnvironmentVariableA
GetLastError
GetProcessHeap
HeapFree
HeapAlloc
CreateDirectoryW
SetLastError
MapViewOfFile
UnmapViewOfFile
CreateFileW
CreateFileMappingW
OpenFileMappingW
CloseHandle
OutputDebugStringW
GetCommandLineW
GetCurrentProcess
GetModuleHandleW
GetModuleFileNameW
GetTempPathW
GetProcAddress
GetCurrentProcessId
InterlockedIncrement
InterlockedCompareExchange
WideCharToMultiByte
MultiByteToWideChar
CreateProcessW
MoveFileExW
WaitForSingleObject
GlobalAlloc
CopyFileW
GetExitCodeProcess
FileTimeToSystemTime
GlobalFree
GetFileTime
GetCurrentThreadId
DeleteFileW
SetFileAttributesW
SetFilePointer
WriteFile
FormatMessageW
ExitThread
CreateEventW
WaitForMultipleObjects
DuplicateHandle
LocalFree
CreateThread
FindFirstFileW
FindClose
LocalAlloc
FindNextFileW
InitializeCriticalSectionAndSpinCount
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
GetSystemDirectoryW
RemoveDirectoryW
CreateMutexW
OpenMutexW
ReleaseMutex
GetFileSize
Sleep
ReadFile
FlushFileBuffers
DeleteFileA
HeapReAlloc
GetSystemTimeAsFileTime
GetStartupInfoW
FileTimeToLocalFileTime
GetDriveTypeW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedDecrement
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RaiseException
RtlUnwind
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
HeapCreate
VirtualFree
VirtualAlloc
ExitProcess
GetStdHandle
GetModuleFileNameA
HeapSize
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetStartupInfoA
QueryPerformanceCounter
GetTickCount
GetFullPathNameW
GetCurrentDirectoryA
GetTimeZoneInformation
LCMapStringA
LCMapStringW
GetModuleHandleA
GetStringTypeA
GetStringTypeW
GetTimeFormatA
GetDateFormatA
GetLocaleInfoA
FreeLibrary
LoadLibraryA
GetConsoleCP
GetConsoleMode
GetDriveTypeA
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CreateFileA
CompareStringA
CompareStringW
user32
DefWindowProcW
EndPaint
DestroyWindow
GetWindowRect
GetWindowDC
SetForegroundWindow
DialogBoxParamW
GetParent
TrackMouseEvent
GetClientRect
BeginPaint
SystemParametersInfoW
GetForegroundWindow
GetWindowLongW
GetWindowTextW
ReleaseDC
SetWindowLongW
EndDialog
SetWindowPos
CheckDlgButton
IsDlgButtonChecked
CreateWindowExW
MessageBoxW
SendMessageW
CallWindowProcW
GetSystemMetrics
GetDC
InvalidateRect
gdi32
CreateSolidBrush
GetStockObject
SelectObject
DeleteObject
SetBkMode
CreateFontIndirectW
GetTextExtentPoint32W
GetObjectW
version
VerQueryValueW
GetFileVersionInfoSizeW
GetFileVersionInfoW
imm32
ImmDisableIME
comctl32
InitCommonControlsEx
advapi32
RegCloseKey
RegEnumKeyW
RegCreateKeyExW
RegQueryValueExW
BuildExplicitAccessWithNameW
GetSecurityDescriptorSacl
GetSidLengthRequired
SetEntriesInAclW
SetSecurityInfo
ConvertStringSecurityDescriptorToSecurityDescriptorW
InitializeAcl
GetNamedSecurityInfoW
SetNamedSecurityInfoW
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
AddAccessAllowedAceEx
LookupAccountSidW
GetTokenInformation
OpenProcessToken
RegSetValueExW
RegOpenKeyExW
RegQueryInfoKeyW
shell32
ShellExecuteExW
SHGetSpecialFolderPathW
SHFileOperationW
ShellExecuteW
Sections
.text Size: 265KB - Virtual size: 265KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 83KB - Virtual size: 83KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 17KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 79KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE