Static task
static1
Behavioral task
behavioral1
Sample
692a80636939de604972d2354396f45f26efec60ca82da7db881e5fd6c523580.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
692a80636939de604972d2354396f45f26efec60ca82da7db881e5fd6c523580.exe
Resource
win10v2004-20220901-en
General
-
Target
692a80636939de604972d2354396f45f26efec60ca82da7db881e5fd6c523580
-
Size
205KB
-
MD5
4ef825a573903c887adae2df424ec2b0
-
SHA1
0092d010b22e1bfe730d7f089bbd34cac81cc00f
-
SHA256
692a80636939de604972d2354396f45f26efec60ca82da7db881e5fd6c523580
-
SHA512
d08caae06cf8e2b7b35233d6985d05e511571e95041a3d0ce5ef66129f69d4586deda17f9362a75e0c4e242b64ed73d50b43e93e0849afaeb1f1e239363ff070
-
SSDEEP
6144:tXLEOulW0WOJE8PPPPPPPPPPPPPPPPPPPPPPPPVcwu7lI6jvp6I:tXLrulRPPPPPPPPPPPPPPPPPPPPPPPPq
Malware Config
Signatures
Files
-
692a80636939de604972d2354396f45f26efec60ca82da7db881e5fd6c523580.exe windows x86
2e24e6837249b09bb5c2f2705c5dd1d3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
netapi32
Netbios
kernel32
GetProcAddress
Sleep
MultiByteToWideChar
lstrlenA
VirtualQuery
GetModuleHandleW
GetCurrentProcess
OpenMutexW
GetTickCount
CreateMutexW
GetVersionExW
GetCurrentThreadId
GetPrivateProfileStringW
FindFirstFileW
FindClose
GetCurrentProcessId
CreateEventW
CreateProcessW
WaitForMultipleObjects
GetExitCodeProcess
CloseHandle
SetUnhandledExceptionFilter
GetModuleFileNameW
FreeLibrary
LoadLibraryExW
InterlockedCompareExchange
LeaveCriticalSection
RaiseException
EnterCriticalSection
DeleteCriticalSection
GetSystemTimeAsFileTime
QueryPerformanceCounter
IsDebuggerPresent
UnhandledExceptionFilter
TerminateProcess
GetStartupInfoW
LocalFree
InterlockedExchange
DecodePointer
EncodePointer
InitializeCriticalSectionAndSpinCount
GetProcessHeap
HeapSize
HeapReAlloc
HeapFree
HeapAlloc
HeapDestroy
InterlockedDecrement
GetLastError
FindResourceExW
FindResourceW
LoadResource
LockResource
SizeofResource
ExitProcess
HeapSetInformation
user32
RegisterClassExW
GetWindowTextW
GetWindowThreadProcessId
IsWindow
DispatchMessageW
TranslateMessage
GetMessageW
SetWindowLongW
CreateWindowExW
GetActiveWindow
SendMessageTimeoutW
GetWindowLongW
FindWindowExW
DefWindowProcW
MessageBoxW
advapi32
RegCreateKeyExW
RegQueryValueExW
RegOpenKeyExW
RegSetValueExW
RegFlushKey
RegCloseKey
shell32
SHChangeNotify
CommandLineToArgvW
ShellExecuteW
ole32
CoUninitialize
OleInitialize
CoInitialize
oleaut32
SysFreeString
SysStringLen
SysAllocString
shlwapi
SHDeleteKeyW
PathFileExistsW
StrCatW
SHDeleteValueW
msvcp100
?_Xout_of_range@std@@YAXPBD@Z
?_Xlength_error@std@@YAXPBD@Z
msvcr100
_fmode
_commode
__setusermatherr
_configthreadlocale
_initterm_e
_initterm
_wcmdln
exit
_XcptFilter
_exit
_cexit
__wgetmainargs
_crt_debugger_hook
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_except_handler4_common
_amsg_exit
?terminate@@YAXXZ
_onexit
_lock
__dllonexit
_invoke_watson
__CxxFrameHandler3
_controlfp_s
_CxxThrowException
__set_app_type
??3@YAXPAX@Z
memcpy_s
memmove_s
wcslen
wmemcpy_s
wcsnlen
_wcsicmp
wcsstr
wcschr
free
malloc
??1exception@std@@UAE@XZ
??2@YAPAXI@Z
??_V@YAXPAX@Z
memcmp
vswprintf_s
_vscwprintf
wcsrchr
strlen
calloc
_recalloc
memcpy
??0exception@std@@QAE@ABV01@@Z
?what@exception@std@@UBEPBDXZ
??0exception@std@@QAE@ABQBD@Z
memmove
memset
sprintf_s
_wputenv_s
_wcslwr
_ultow
wcscpy
_wgetenv
wcsncmp
_unlock
rvcore
create_main_thread_window
EnableMsgBus
GetRvCore
Sections
.text Size: 39KB - Virtual size: 39KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 68KB - Virtual size: 67KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 73KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE