Static task
static1
Behavioral task
behavioral1
Sample
89bd0bccedbbc3a567c1e1ba1f8b4a131b2b066e12c04412549b62b27cbddf87.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
89bd0bccedbbc3a567c1e1ba1f8b4a131b2b066e12c04412549b62b27cbddf87.exe
Resource
win10v2004-20220812-en
General
-
Target
89bd0bccedbbc3a567c1e1ba1f8b4a131b2b066e12c04412549b62b27cbddf87
-
Size
179KB
-
MD5
6d5f4469e064434295826f3045408f47
-
SHA1
3edca6edceb2ee16c8ffde3cd390c29912ef7af6
-
SHA256
89bd0bccedbbc3a567c1e1ba1f8b4a131b2b066e12c04412549b62b27cbddf87
-
SHA512
47995b6e0f138cded1ea64d4380a5481460e1887480109fe337b96a85019f4803bd16d4489deaea419d009ad6788d18aed5e7de0e4c954122398a248315135a9
-
SSDEEP
3072:vhZ77Nx88AKXs9xS6g5SG7pmuqjY08V2BjnJes/+PaGSwPuytJ:vhZf38DdA5Sepmz8V215/g9PuytJ
Malware Config
Signatures
Files
-
89bd0bccedbbc3a567c1e1ba1f8b4a131b2b066e12c04412549b62b27cbddf87.exe windows x86
5ae281ff77ba221e2edc759e1f559eee
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapAlloc
HeapFree
CreateEventA
GetLocalTime
MoveFileA
ExitProcess
OpenProcess
VirtualAllocEx
WriteProcessMemory
CreateRemoteThread
GetCurrentProcess
CreateProcessA
SetLastError
GetProcAddress
GetProcessHeap
SetFilePointer
ReadFile
Sleep
WriteFile
RemoveDirectoryA
LocalAlloc
LocalFree
GetDriveTypeA
CreateDirectoryA
GetVersionExA
lstrcmpA
WideCharToMultiByte
MultiByteToWideChar
FreeLibrary
GlobalFree
GetModuleHandleA
GetStartupInfoA
SetErrorMode
ReleaseMutex
OutputDebugStringA
GetLastError
lstrcatA
GetPrivateProfileSectionNamesA
lstrlenA
SetEvent
lstrcpyA
VirtualFree
CloseHandle
LoadLibraryA
GlobalUnlock
user32
SetClipboardData
EmptyClipboard
SetCursorPos
GetSystemMetrics
LoadCursorA
ReleaseDC
SetCapture
CloseClipboard
WindowFromPoint
IsWindow
DispatchMessageA
TranslateMessage
GetKeyState
GetAsyncKeyState
GetForegroundWindow
GetWindowTextA
ExitWindowsEx
CharNextA
GetMessageA
OpenClipboard
SendMessageA
CloseWindow
CreateWindowExA
PostMessageA
OpenDesktopA
GetThreadDesktop
CloseDesktop
IsWindowVisible
GetWindowThreadProcessId
wsprintfA
GetCursorPos
SetRect
gdi32
DeleteDC
CreateDIBSection
SelectObject
BitBlt
CreateCompatibleBitmap
GetDIBits
DeleteObject
advapi32
OpenProcessToken
CloseServiceHandle
RegQueryValueA
RegCloseKey
LsaOpenPolicy
LsaRetrievePrivateData
LsaClose
LookupAccountNameA
IsValidSid
ControlService
QueryServiceStatus
OpenServiceA
OpenSCManagerA
RegSetValueExA
RegCreateKeyA
SetNamedSecurityInfoA
BuildExplicitAccessWithNameA
GetNamedSecurityInfoA
SetEntriesInAclA
RegQueryValueExA
RegOpenKeyA
RegCreateKeyExA
AdjustTokenPrivileges
LookupPrivilegeValueA
FreeSid
RegSetKeySecurity
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
AddAccessAllowedAce
InitializeAcl
GetLengthSid
AllocateAndInitializeSid
RegEnumValueA
RegEnumKeyExA
RegDeleteValueA
RegDeleteKeyA
LookupAccountSidA
GetTokenInformation
DeleteService
shell32
SHGetFileInfoA
SHGetSpecialFolderPathA
msvcrt
__getmainargs
_strnicmp
_onexit
__dllonexit
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
_strupr
_acmdln
exit
_XcptFilter
_exit
??1type_info@@UAE@XZ
calloc
_beginthreadex
strncat
strtok
??2@YAPAXI@Z
__CxxFrameHandler
_CxxThrowException
??3@YAXPAX@Z
memmove
ceil
_ftol
strstr
strchr
malloc
free
_except_handler3
strrchr
rename
atoi
strncmp
_errno
wcscpy
strncpy
shlwapi
SHDeleteKeyA
ws2_32
gethostname
__WSAFDIsSet
recvfrom
sendto
WSAStartup
listen
accept
bind
getsockname
inet_addr
inet_ntoa
send
select
closesocket
ntohs
socket
gethostbyname
htons
WSACleanup
setsockopt
connect
getpeername
msvcp60
?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?_Xran@std@@YAXXZ
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
netapi32
NetUserAdd
NetLocalGroupAddMembers
msvfw32
ICSeqCompressFrameEnd
ICSendMessage
psapi
EnumProcessModules
wtsapi32
WTSFreeMemory
WTSQuerySessionInformationA
Sections
.rdata Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 153KB - Virtual size: 157KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 316B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ