Static task
static1
Behavioral task
behavioral1
Sample
08bbec006b3603c8ff5002d346fa9271b6f277c0fba5f37fb0d3dab20cdd5500.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
08bbec006b3603c8ff5002d346fa9271b6f277c0fba5f37fb0d3dab20cdd5500.exe
Resource
win10v2004-20220812-en
General
-
Target
08bbec006b3603c8ff5002d346fa9271b6f277c0fba5f37fb0d3dab20cdd5500
-
Size
195KB
-
MD5
58cc6a7dc16ad1fd437fa631f337c1f0
-
SHA1
845fa90b440b3d546c5fc9416aab11f4368c5ea5
-
SHA256
08bbec006b3603c8ff5002d346fa9271b6f277c0fba5f37fb0d3dab20cdd5500
-
SHA512
ec030359b260bcdafc3f99f1cebadfb7884bc44a8a82d03fb235fca503a6c2cb56ca9cc71e26cd67c6b01d4bd0ab8a389046a85d05b807c3596798018a6e092f
-
SSDEEP
3072:7uHpznG+WVZChf8nt61s+j19yobISspkAIA5xIC5oyVloYGJ6UxjN9K:U5G+KCyt+j1BHbAsMoyVlxG/jN0
Malware Config
Signatures
Files
-
08bbec006b3603c8ff5002d346fa9271b6f277c0fba5f37fb0d3dab20cdd5500.exe windows x86
8dd1dbb53ecff603f44594c0bd6de352
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
??2@YAPAXI@Z
??3@YAXPAX@Z
_wcsicmp
wcscpy
exit
_cexit
_XcptFilter
_exit
_c_exit
wcschr
wcscmp
iswalpha
advapi32
RegSetValueExW
RegOpenKeyExA
RegQueryValueExA
GetSecurityDescriptorDacl
GetAclInformation
GetAce
IsWellKnownSid
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
OpenProcessToken
DuplicateTokenEx
AllocateAndInitializeSid
CheckTokenMembership
FreeSid
RegCreateKeyExW
kernel32
QueryPerformanceCounter
ReleaseMutex
lstrcmpW
lstrcpynW
GetLastError
OpenProcess
CreateMutexW
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetTickCount
GetCommandLineW
GetModuleHandleA
GetStartupInfoA
GetProcAddress
Sleep
LoadLibraryA
CloseHandle
lstrcmpiW
WaitForMultipleObjects
CreateThread
GetCurrentThreadId
OpenEventW
CreateEventW
SetEvent
lstrlenW
user32
GetUserObjectSecurity
GetProcessWindowStation
MessageBoxW
LoadStringW
SetProcessWindowStation
OpenWindowStationW
CloseWindowStation
SetWindowPos
OpenInputDesktop
GetDesktopWindow
wsprintfW
EnableWindow
GetDlgItem
IsIconic
EndDialog
IsDlgButtonChecked
WinHelpW
MessageBeep
GetSystemMetrics
PostQuitMessage
ShowWindow
KillTimer
SetTimer
CheckDlgButton
DialogBoxParamW
SystemParametersInfoW
AppendMenuW
GetSystemMenu
CreateDialogParamW
DispatchMessageW
TranslateMessage
IsDialogMessageW
GetMessageW
RegisterWindowMessageW
OpenDesktopW
GetUserObjectInformationW
CloseDesktop
LoadImageW
SendMessageW
GetThreadDesktop
SetThreadDesktop
IsWindowVisible
PostMessageW
GetWindowRect
narrhook
?SetAnnouncePopup@@YGXH@Z
?SetAnnounceMenu@@YGXH@Z
?SetAnnounceWindow@@YGXH@Z
?SetEchoChars@@YGXH@Z
?SetTrackInputFocus@@YGXH@Z
?SetTrackCaret@@YGXH@Z
?UninitKeys@@YGHXZ
?UnInitMSAA@@YGHXZ
?GetCurrentText@@YGXPAGH@Z
?BackToApplication@@YGXXZ
?InitKeys@@YGHPAUHWND__@@@Z
?InitMSAA@@YGHXZ
?SetReviewLevel@@YGXH@Z
?GetTrackCaret@@YGHXZ
?GetTrackInputFocus@@YGHXZ
?GetEchoChars@@YGHXZ
?GetAnnounceWindow@@YGHXZ
?GetAnnounceMenu@@YGHXZ
?GetAnnouncePopup@@YGHXZ
?GetAnnounceToolTips@@YGHXZ
?GetReviewLevel@@YGHXZ
?SetAnnounceToolTips@@YGXH@Z
ole32
CoInitialize
CoCreateInstance
CoTaskMemFree
shell32
ShellExecuteW
ord258
comctl32
ord17
psapi
EnumProcesses
GetProcessImageFileNameW
Sections
.text Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 31KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 77KB - Virtual size: 128KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 58KB - Virtual size: 156KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE