Static task
static1
Behavioral task
behavioral1
Sample
966bd30b88546d93d15fdfb19db4ef7b1a1e48e9ad247e814ab4f702e647a2a9.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
966bd30b88546d93d15fdfb19db4ef7b1a1e48e9ad247e814ab4f702e647a2a9.exe
Resource
win10v2004-20220812-en
General
-
Target
966bd30b88546d93d15fdfb19db4ef7b1a1e48e9ad247e814ab4f702e647a2a9
-
Size
832KB
-
MD5
805f229edd935d7e238887e1987637a0
-
SHA1
ca2ba8251956c835f50798cc785f5500ce66d302
-
SHA256
966bd30b88546d93d15fdfb19db4ef7b1a1e48e9ad247e814ab4f702e647a2a9
-
SHA512
1d249c43443fc31cbe6bdfe1ddb5e4bc385e1a71fb7473402383548c13a2990ced89aa3ef40a1f040005824e00c8c9c82ec82d54944567170717e938e91b2e8a
-
SSDEEP
12288:CzTi6mbZbR6QJ6yZUoxXl2YnoF8oX4EBMTIGMnOXGwnSvzFoaZGc6yFe:6LmbLj5Xx126oF5IEqFzXGwnQog
Malware Config
Signatures
Files
-
966bd30b88546d93d15fdfb19db4ef7b1a1e48e9ad247e814ab4f702e647a2a9.exe windows x86
f5e34d60e1959c532faeb17a6aa82b10
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapReAlloc
HeapSize
InitializeCriticalSection
GetCurrentThread
TlsGetValue
DeleteCriticalSection
WideCharToMultiByte
WriteFile
SetStdHandle
SetHandleCount
GetStdHandle
GetEnvironmentVariableA
GetModuleFileNameA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
SetEndOfFile
SetUnhandledExceptionFilter
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetVersionExA
SetLastError
MultiByteToWideChar
LCMapStringA
GetCurrentThreadId
IsBadReadPtr
IsBadCodePtr
GetStringTypeA
GetStringTypeW
GetCPInfo
GetACP
GetOEMCP
GetProcAddress
LoadLibraryA
CompareStringA
CompareStringW
SetEnvironmentVariableA
HeapFree
LeaveCriticalSection
EnterCriticalSection
TlsAlloc
TlsSetValue
GetStartupInfoA
LCMapStringW
GetCurrentProcess
TerminateProcess
InterlockedIncrement
InterlockedDecrement
ExitProcess
GetCommandLineA
FlushFileBuffers
RaiseException
CreateFileA
GetFileType
SetFilePointer
HeapAlloc
ReadFile
CloseHandle
GetFileAttributesA
GetSystemTime
GetLocalTime
GetSystemTimeAsFileTime
GetTimeZoneInformation
RtlUnwind
Sleep
GetLastError
CreateProcessA
GetVersion
GetEnvironmentStringsW
GetEnvironmentStrings
GetModuleHandleA
ResumeThread
CreateThread
GetVolumeInformationA
GetDriveTypeA
GetWindowsDirectoryA
FindFirstFileW
GetFullPathNameW
CreateDirectoryA
GetEnvironmentVariableW
MoveFileW
DeleteFileW
DeleteFileA
GetCurrentProcessId
GetFileAttributesW
ExitThread
GetCurrentDirectoryW
LocalFree
FormatMessageA
GetShortPathNameA
ReleaseSemaphore
WaitForSingleObject
OpenSemaphoreA
CreateSemaphoreA
FreeLibrary
SetErrorMode
SetHandleInformation
ReleaseMutex
CreateMutexA
GetTickCount
ResetEvent
CreateEventA
SetEvent
GetCommandLineW
QueryPerformanceCounter
SetEnvironmentVariableW
QueryPerformanceFrequency
GetPrivateProfileStringA
FindFirstFileA
FindNextFileW
FindNextFileA
FindClose
GetProcessTimes
SetThreadPriority
DeviceIoControl
SleepEx
GetFileInformationByHandle
PeekNamedPipe
MoveFileA
GetPrivateProfileIntA
FileTimeToSystemTime
FileTimeToLocalFileTime
GetDriveTypeW
GetCurrentDirectoryA
GetFullPathNameA
CreateFileW
user32
GetWindowTextLengthA
SendMessageA
CreateDialogParamA
SetWindowTextA
SetFocus
EnableWindow
GetWindowTextA
MessageBeep
EndDialog
GetWindowLongA
RedrawWindow
PostMessageA
DestroyWindow
InvalidateRect
SetForegroundWindow
IsWindowEnabled
IsDialogMessageA
DispatchMessageA
TranslateMessage
GetMessageA
PeekMessageA
ReleaseDC
GetDC
MoveWindow
ScreenToClient
GetWindowRect
CallWindowProcA
SetWindowLongA
LoadBitmapA
LoadCursorA
GetActiveWindow
GetSystemMetrics
GetParent
SetDlgItemTextA
GetDlgItemTextW
GetDlgItemTextA
GetFocus
GetClientRect
CreateDialogIndirectParamA
DialogBoxIndirectParamA
GetDlgItem
SendDlgItemMessageA
GetCursor
MessageBoxA
SetCursor
ShowCursor
ShowWindow
SetMenuItemInfoA
wsprintfA
CheckRadioButton
advapi32
RegEnumValueA
DeleteService
QueryServiceConfigA
OpenSCManagerA
CreateServiceA
CloseServiceHandle
OpenServiceA
ChangeServiceConfigA
RegCreateKeyExA
RegSetValueExA
RegOpenKeyExA
RegCloseKey
RegEnumKeyExA
RegQueryValueExA
RegDeleteValueA
RegDeleteKeyA
StartServiceA
ControlService
RegSetValueExW
GetUserNameA
RegQueryValueExW
GetUserNameW
gdi32
CreateFontIndirectA
GetStockObject
GetTextMetricsA
SelectObject
DeleteObject
shell32
ShellExecuteA
comctl32
ImageList_Create
ImageList_GetImageCount
ImageList_Add
ord17
wsock32
closesocket
send
gethostname
htons
netapi32
Netbios
comdlg32
GetOpenFileNameA
GetSaveFileNameA
Sections
.text Size: 484KB - Virtual size: 482KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 64KB - Virtual size: 91KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
_TEXT_HA Size: 68KB - Virtual size: 66KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 104KB - Virtual size: 100KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
�=��?� Size: 88KB - Virtual size: 88KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE