Static task
static1
Behavioral task
behavioral1
Sample
432ae49c3561a4c5c7f2d4a8e105c8cd137c473cb66f1f6523c7c84d79286573.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
432ae49c3561a4c5c7f2d4a8e105c8cd137c473cb66f1f6523c7c84d79286573.exe
Resource
win10v2004-20220901-en
General
-
Target
432ae49c3561a4c5c7f2d4a8e105c8cd137c473cb66f1f6523c7c84d79286573
-
Size
194KB
-
MD5
4cbc64a6a651767ddbfd8a74aa565d40
-
SHA1
d676e2b703eba4157d7d655cd5aab5684e44e07e
-
SHA256
432ae49c3561a4c5c7f2d4a8e105c8cd137c473cb66f1f6523c7c84d79286573
-
SHA512
e2a0778af03e7cf0c21fc7cf89041819977c448d60d4b13643cb76b3f2bf59192481d94436b5ad1d20fcc4eeff1914a5bf2aa2759d173461d688bb0335d84f35
-
SSDEEP
3072:tQJhIWcoyrMOckUltfvIsYDJ0H10fmn3anUf2A1v0voPcx9m+mgdGHiyYUFvE0ku:uDIv5ckUltosY1EjnKM2YcA8b0Hf5R
Malware Config
Signatures
Files
-
432ae49c3561a4c5c7f2d4a8e105c8cd137c473cb66f1f6523c7c84d79286573.exe windows x86
db7b81b02506d126d2a627b8e0d75a13
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegCloseKey
RegSetValueExW
RegQueryValueExW
RegCreateKeyExW
RegEnumValueW
RegOpenKeyExW
RegSetValueW
RegDeleteKeyW
kernel32
GetProcAddress
LoadLibraryW
lstrlenW
GetLastError
GetEnvironmentVariableW
GetVersion
GetModuleHandleW
SetErrorMode
SetFileAttributesW
GetFileAttributesW
DeleteFileW
FindClose
FindNextFileW
FindFirstFileW
SetCurrentDirectoryW
GetCurrentDirectoryW
lstrcmpW
FindFirstFileExW
GetShortPathNameW
GetSystemDefaultUILanguage
CreateDirectoryW
LocalFree
LocalAlloc
CloseHandle
CreateFileW
GetTickCount
Sleep
QueryPerformanceCounter
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
GetPrivateProfileStringW
GetNativeSystemInfo
SetLastError
LoadResource
FindResourceExW
FreeLibrary
GetSystemDirectoryW
GetVersionExW
GetModuleFileNameW
LoadLibraryExW
MapViewOfFile
CreateFileMappingW
GetLocaleInfoW
GetModuleHandleA
UnmapViewOfFile
GetUserDefaultUILanguage
FindResourceW
SearchPathW
SetUnhandledExceptionFilter
RtlUnwind
GetStartupInfoW
InterlockedCompareExchange
InterlockedExchange
user32
MessageBoxW
LoadStringW
PostMessageW
GetMenuItemInfoW
GetMenuItemCount
DestroyMenu
CreatePopupMenu
SendInput
GetCursorPos
SystemParametersInfoW
PostQuitMessage
SetWinEventHook
KillTimer
DispatchMessageW
GetMessageW
SetTimer
UnhookWinEvent
BlockInput
msvcrt
memcpy
_vsnwprintf
memset
??3@YAXPAX@Z
??2@YAPAXI@Z
_time64
_controlfp
?terminate@@YAXXZ
__set_app_type
__p__fmode
__p__commode
wcsncmp
_wcsicmp
_wcsnicmp
bsearch
_adjust_fdiv
__setusermatherr
_amsg_exit
_initterm
_wcmdln
exit
_XcptFilter
_exit
_cexit
__wgetmainargs
shell32
ord526
SHChangeNotify
SHGetSpecialFolderLocation
ord155
SHGetDesktopFolder
ord190
SHGetSpecialFolderPathW
SHBindToParent
SHParseDisplayName
SHSetLocalizedName
ord165
ole32
OleUninitialize
OleInitialize
CoTaskMemFree
CoCreateInstance
CoUninitialize
CoInitializeEx
advpack
RunSetupCommandW
ExecuteCabW
RegRestoreAllW
version
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
shlwapi
SHRegGetValueW
StrCmpIW
SHDeleteKeyW
ord225
PathAddExtensionW
PathRemoveBlanksW
SHDeleteValueW
SHSetValueW
PathAppendW
PathRemoveFileSpecW
SHCopyKeyW
StrCmpNIW
PathFileExistsW
PathCombineW
PathAddBackslashW
ord437
ord158
StrStrIW
SHRegSetUSValueW
SHGetValueW
PathRemoveExtensionW
iertutil
ord33
ord37
ord654
ord650
oleacc
AccessibleObjectFromEvent
oleaut32
SysFreeString
VariantClear
Sections
.text Size: 151KB - Virtual size: 151KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 39KB - Virtual size: 39KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
qspclei Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE