Static task
static1
Behavioral task
behavioral1
Sample
5f6bf5bc30cd0fcf5f6b70c6b7b093748cca0a8ed23d3552b49d496dd270d7cf.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
5f6bf5bc30cd0fcf5f6b70c6b7b093748cca0a8ed23d3552b49d496dd270d7cf.exe
Resource
win10v2004-20220901-en
General
-
Target
5f6bf5bc30cd0fcf5f6b70c6b7b093748cca0a8ed23d3552b49d496dd270d7cf
-
Size
504KB
-
MD5
748628638568e7753ee8e3d02e7776c0
-
SHA1
69fe1ef398462662388a0b2d5bc4270ecc7ff223
-
SHA256
5f6bf5bc30cd0fcf5f6b70c6b7b093748cca0a8ed23d3552b49d496dd270d7cf
-
SHA512
2d9c8278e4f002e68693132b2d6e67ac9ace4c8f144a457faa1a7a3c3069506e3dea0182a932694d2edafdcd32701e7d6604bd8873d96133af9eeaba858e9481
-
SSDEEP
6144:cgXrELu7aUkFKc3yDLQ3H61Kpeb5AMAb5UirLquxCxvS5dz4AuuMVyik3231/rdj:cgbELJe8tu55P66x
Malware Config
Signatures
Files
-
5f6bf5bc30cd0fcf5f6b70c6b7b093748cca0a8ed23d3552b49d496dd270d7cf.exe windows x64
c49391075978bee9ba7ead282ad73826
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
setupapi
SetupDiGetDeviceRegistryPropertyA
SetupDiEnumDeviceInfo
SetupDiGetClassDevsA
SetupDiGetDeviceInstanceIdA
SetupDiClassGuidsFromNameA
SetupDiGetINFClassA
SetupDiGetDeviceInstallParamsA
SetupDiCallClassInstaller
SetupDiEnumDriverInfoA
SetupDiBuildDriverInfoList
SetupDiSetDeviceInstallParamsA
SetupDiRegisterDeviceInfo
SetupDiSetDeviceRegistryPropertyA
SetupDiCreateDeviceInfoA
SetupDiCreateDeviceInfoList
SetupDiDestroyDriverInfoList
SetupDiSetSelectedDevice
SetupDiGetDriverInfoDetailA
SetupDiRemoveDevice
SetupDiDestroyDeviceInfoList
comctl32
ord17
shlwapi
PathAppendA
PathIsDirectoryA
kernel32
CreateProcessA
FindClose
FindNextFileA
SetLastError
FindFirstFileA
GetSystemDirectoryA
GetProcAddress
GetModuleHandleA
Sleep
GetModuleFileNameA
SetCurrentDirectoryA
GetFullPathNameA
DeleteFileA
SetFileAttributesA
GetFileAttributesA
GetVersionExA
GetComputerNameA
GetUserDefaultLangID
GetCurrentDirectoryA
GetWindowsDirectoryA
GetCurrentProcess
ReleaseMutex
CreateDirectoryA
MapViewOfFile
CreateFileMappingA
CreateMutexA
UnmapViewOfFile
GetTimeFormatA
GetLocalTime
OutputDebugStringA
MoveFileExA
LocalAlloc
GetCurrentThread
FreeLibrary
SetEnvironmentVariableA
Module32First
CreateToolhelp32Snapshot
Process32Next
Process32First
TerminateProcess
OpenProcess
CloseHandle
DeviceIoControl
CreateFileA
GetPrivateProfileStringA
WaitForSingleObject
GlobalUnlock
GlobalLock
GlobalAlloc
CopyFileA
GetCurrentProcessId
GetCurrentThreadId
RemoveDirectoryA
WriteFile
SetFilePointer
RtlVirtualUnwind
DeleteCriticalSection
GetFileType
GetStdHandle
SetHandleCount
LeaveCriticalSection
EnterCriticalSection
RtlPcToFileHeader
RaiseException
LCMapStringW
WideCharToMultiByte
LCMapStringA
RtlCaptureContext
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
FlsAlloc
FlsFree
TlsFree
FlsSetValue
SetStdHandle
FlsGetValue
IsValidCodePage
GetOEMCP
GetACP
WinExec
GetLastError
FormatMessageA
LocalFree
LoadLibraryA
InitializeCriticalSection
GetConsoleCP
GlobalFree
GetExitCodeProcess
GetConsoleMode
FlushFileBuffers
HeapSetInformation
HeapCreate
HeapSize
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
ReadFile
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
MultiByteToWideChar
GetCPInfo
GetStartupInfoA
GetProcessHeap
CompareStringW
CompareStringA
SetEndOfFile
HeapReAlloc
HeapAlloc
GetCommandLineA
RtlUnwindEx
RtlLookupFunctionEntry
ExitProcess
HeapFree
user32
EndDeferWindowPos
LoadImageA
UpdateWindow
MessageBoxA
LoadStringA
GetWindowRect
ShowWindow
DeferWindowPos
GetClientRect
GetSystemMetrics
SetWindowPos
SendMessageA
CopyRect
GetParent
CheckDlgButton
SetDlgItemTextA
GetDlgItem
EnableWindow
EndDialog
IsDlgButtonChecked
LoadBitmapA
EnumWindows
DialogBoxParamA
GetWindowInfo
ExitWindowsEx
CreateWindowExA
OffsetRect
GetDesktopWindow
BeginDeferWindowPos
GetWindowThreadProcessId
advapi32
RegEnumValueA
OpenSCManagerA
OpenServiceA
ControlService
QueryServiceStatus
DeleteService
CloseServiceHandle
ImpersonateSelf
OpenThreadToken
AllocateAndInitializeSid
InitializeSecurityDescriptor
GetLengthSid
InitializeAcl
AddAccessAllowedAce
SetSecurityDescriptorDacl
SetSecurityDescriptorGroup
SetSecurityDescriptorOwner
IsValidSecurityDescriptor
AccessCheck
RevertToSelf
FreeSid
RegDeleteValueA
RegEnumKeyExA
RegQueryInfoKeyA
RegDeleteKeyA
LookupPrivilegeValueA
OpenProcessToken
AdjustTokenPrivileges
RegSetValueExA
GetUserNameA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
RegCreateKeyExA
shell32
SHGetSpecialFolderPathA
SHGetFolderPathA
ole32
CoUninitialize
CoCreateInstance
CoInitialize
CoSetProxyBlanket
oleaut32
SysStringLen
SysFreeString
SysAllocStringLen
Sections
.text Size: 130KB - Virtual size: 129KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 51KB - Virtual size: 50KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 305KB - Virtual size: 305KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE