Static task
static1
Behavioral task
behavioral1
Sample
ba86f4b4245deb1e76a60e213e8b13a31fdb4b0d49b2d1a24c71a487cb4e1198.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ba86f4b4245deb1e76a60e213e8b13a31fdb4b0d49b2d1a24c71a487cb4e1198.exe
Resource
win10v2004-20220812-en
General
-
Target
ba86f4b4245deb1e76a60e213e8b13a31fdb4b0d49b2d1a24c71a487cb4e1198
-
Size
162KB
-
MD5
410e03a1b4496ee8268857ce8b278330
-
SHA1
9c2e3c581e62b373cbaf09d3f11b37d3c1801803
-
SHA256
ba86f4b4245deb1e76a60e213e8b13a31fdb4b0d49b2d1a24c71a487cb4e1198
-
SHA512
2d1e3e683ea6bf9e7e6c29b8c1cada492a5ffd968d7e08ae3bc87764ea17fb47d4b37d6d04181d8f8627f06e2417cb26f34a2a8a058a2ee7f2518cb541749396
-
SSDEEP
3072:QOmxZOpy4r21c0HfSoLewfmay1h4u1KS5YccFgR:/+ZOI4snHqoKORngC5o
Malware Config
Signatures
Files
-
ba86f4b4245deb1e76a60e213e8b13a31fdb4b0d49b2d1a24c71a487cb4e1198.exe windows x86
01e97d0044926412064ff246f90f6933
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
RegSetValueExW
RegCreateKeyExW
OpenProcessToken
RegQueryValueExA
RegOpenKeyExA
kernel32
GetLastError
HeapFree
HeapAlloc
GetProcessHeap
SetLastError
GetModuleFileNameW
OutputDebugStringA
GetCommandLineW
FreeLibrary
FormatMessageW
CopyFileW
GetVersion
CloseHandle
GetCurrentProcess
IsWow64Process
LocalFree
CreateProcessW
ExpandEnvironmentStringsW
RegisterApplicationRestart
CreateThread
GetProcAddress
HeapSetInformation
Sleep
GetFileAttributesW
GetLocaleInfoW
ExpandEnvironmentStringsA
UnhandledExceptionFilter
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
SetUnhandledExceptionFilter
GetStartupInfoW
InterlockedCompareExchange
InterlockedExchange
GetModuleHandleW
LoadLibraryW
GetModuleHandleA
GetStdHandle
MapViewOfFile
CreateFileMappingW
GetVersionExW
UnmapViewOfFile
GetSystemDefaultUILanguage
GetUserDefaultUILanguage
SearchPathW
LoadLibraryA
WaitForSingleObject
GetConsoleOutputCP
WriteConsoleW
WriteFile
GetConsoleMode
GetFileType
FindClose
FindNextFileW
FindFirstFileW
CreateFileW
LoadLibraryExW
LoadResource
FindResourceExW
gdi32
GetDeviceCaps
user32
LoadIconW
PostMessageW
DefWindowProcW
EnableMenuItem
CheckMenuRadioItem
CheckMenuItem
SetLayeredWindowAttributes
GetWindowPlacement
CopyRect
EndDialog
LoadStringW
IsWindow
GetFocus
DestroyWindow
ShowWindow
PostQuitMessage
WaitForInputIdle
DeleteMenu
GetMenu
GetProcessDefaultLayout
DispatchMessageW
TranslateMessage
GetMessageW
CharToOemW
LoadAcceleratorsW
GetMonitorInfoW
MonitorFromPoint
GetWindowRect
GetDlgItem
SetWindowTextW
SetWindowPos
SetFocus
DialogBoxParamW
CreateWindowExW
RegisterClassExW
GetSysColor
UpdateWindow
EnumWindows
IsIconic
GetClassNameW
GetClientRect
SendMessageW
SystemParametersInfoW
GetDesktopWindow
GetDC
ReleaseDC
TranslateAcceleratorW
msvcrt
wcsncmp
_controlfp
?terminate@@YAXXZ
__set_app_type
__p__fmode
__p__commode
__setusermatherr
_amsg_exit
_initterm
_wcmdln
exit
_wcsicmp
memcpy
wcstok
wcsrchr
wcschr
_wmakepath_s
_wsplitpath_s
_XcptFilter
_exit
_cexit
__wgetmainargs
_wcsnicmp
towlower
wcsstr
memset
_vsnwprintf
_except_handler4_common
bsearch
atl
ord41
ole32
CoInitialize
CoUninitialize
CoCreateInstance
OleInitialize
ntdll
NtOpenProcessToken
NtClose
NtQueryInformationToken
WinSqmIncrementDWORD
WinSqmAddToStream
NtOpenThreadToken
shlwapi
ord186
SHCreateStreamOnFileEx
shell32
CommandLineToArgvW
ShellExecuteExW
ord28
SHBindToParent
SHGetIDListFromObject
SHCreateDataObject
ord155
SHGetFolderPathEx
oleaut32
VarDateFromStr
VariantTimeToSystemTime
VariantChangeType
OleCreateFontIndirect
VariantInit
VariantClear
SysAllocString
SysFreeString
credui
CredUIPromptForCredentialsW
secur32
GetUserNameExW
Sections
.text Size: 51KB - Virtual size: 50KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 95KB - Virtual size: 95KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE