Static task
static1
Behavioral task
behavioral1
Sample
0f1b02cb51569c99ca5d40b3ec401c4c5d5d8f3afb59ed2369b3669ad232c603.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0f1b02cb51569c99ca5d40b3ec401c4c5d5d8f3afb59ed2369b3669ad232c603.exe
Resource
win10v2004-20220901-en
General
-
Target
0f1b02cb51569c99ca5d40b3ec401c4c5d5d8f3afb59ed2369b3669ad232c603
-
Size
186KB
-
MD5
63f9b84ae4a5dc7c11e85178daf015c0
-
SHA1
2529cd52e4ed77c47dc364c977c3a8b7abbd02d0
-
SHA256
0f1b02cb51569c99ca5d40b3ec401c4c5d5d8f3afb59ed2369b3669ad232c603
-
SHA512
7c4b9347c86685e4a60b7199ecc68cd854a4279fb428d3b021e44cbad0bfc922804338f65a03259ff7b76abbc26154e65e368e3c2d2d2380b566dbe041c5aad8
-
SSDEEP
3072:fuHpznG+WVZChf8CyX9bXETyshtt0LFBJtjiRhnwmrLmhmL7/KYEaYNv:Y5G+KCxcbXQtuNtjirLKILIaY5
Malware Config
Signatures
Files
-
0f1b02cb51569c99ca5d40b3ec401c4c5d5d8f3afb59ed2369b3669ad232c603.exe windows x86
8dd1dbb53ecff603f44594c0bd6de352
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
??2@YAPAXI@Z
??3@YAXPAX@Z
_wcsicmp
wcscpy
exit
_cexit
_XcptFilter
_exit
_c_exit
wcschr
wcscmp
iswalpha
advapi32
RegSetValueExW
RegOpenKeyExA
RegQueryValueExA
GetSecurityDescriptorDacl
GetAclInformation
GetAce
IsWellKnownSid
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
OpenProcessToken
DuplicateTokenEx
AllocateAndInitializeSid
CheckTokenMembership
FreeSid
RegCreateKeyExW
kernel32
QueryPerformanceCounter
ReleaseMutex
lstrcmpW
lstrcpynW
GetLastError
OpenProcess
CreateMutexW
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetTickCount
GetCommandLineW
GetModuleHandleA
GetStartupInfoA
GetProcAddress
Sleep
LoadLibraryA
CloseHandle
lstrcmpiW
WaitForMultipleObjects
CreateThread
GetCurrentThreadId
OpenEventW
CreateEventW
SetEvent
lstrlenW
user32
GetUserObjectSecurity
GetProcessWindowStation
MessageBoxW
LoadStringW
SetProcessWindowStation
OpenWindowStationW
CloseWindowStation
SetWindowPos
OpenInputDesktop
GetDesktopWindow
wsprintfW
EnableWindow
GetDlgItem
IsIconic
EndDialog
IsDlgButtonChecked
WinHelpW
MessageBeep
GetSystemMetrics
PostQuitMessage
ShowWindow
KillTimer
SetTimer
CheckDlgButton
DialogBoxParamW
SystemParametersInfoW
AppendMenuW
GetSystemMenu
CreateDialogParamW
DispatchMessageW
TranslateMessage
IsDialogMessageW
GetMessageW
RegisterWindowMessageW
OpenDesktopW
GetUserObjectInformationW
CloseDesktop
LoadImageW
SendMessageW
GetThreadDesktop
SetThreadDesktop
IsWindowVisible
PostMessageW
GetWindowRect
narrhook
?SetAnnouncePopup@@YGXH@Z
?SetAnnounceMenu@@YGXH@Z
?SetAnnounceWindow@@YGXH@Z
?SetEchoChars@@YGXH@Z
?SetTrackInputFocus@@YGXH@Z
?SetTrackCaret@@YGXH@Z
?UninitKeys@@YGHXZ
?UnInitMSAA@@YGHXZ
?GetCurrentText@@YGXPAGH@Z
?BackToApplication@@YGXXZ
?InitKeys@@YGHPAUHWND__@@@Z
?InitMSAA@@YGHXZ
?SetReviewLevel@@YGXH@Z
?GetTrackCaret@@YGHXZ
?GetTrackInputFocus@@YGHXZ
?GetEchoChars@@YGHXZ
?GetAnnounceWindow@@YGHXZ
?GetAnnounceMenu@@YGHXZ
?GetAnnouncePopup@@YGHXZ
?GetAnnounceToolTips@@YGHXZ
?GetReviewLevel@@YGHXZ
?SetAnnounceToolTips@@YGXH@Z
ole32
CoInitialize
CoCreateInstance
CoTaskMemFree
shell32
ShellExecuteW
ord258
comctl32
ord17
psapi
EnumProcesses
GetProcessImageFileNameW
Sections
.text Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 31KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 72KB - Virtual size: 128KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 54KB - Virtual size: 1.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE