Static task
static1
Behavioral task
behavioral1
Sample
d9301c43a3322ef3f43341c507696c8b0f854c72d57d354329e325f5e8df3d15.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d9301c43a3322ef3f43341c507696c8b0f854c72d57d354329e325f5e8df3d15.exe
Resource
win10v2004-20220812-en
General
-
Target
d9301c43a3322ef3f43341c507696c8b0f854c72d57d354329e325f5e8df3d15
-
Size
178KB
-
MD5
40a111707d7188c6aaeaea7b2d15b360
-
SHA1
06ce7b48fd5166461d3914e9da1dbac1b4d47991
-
SHA256
d9301c43a3322ef3f43341c507696c8b0f854c72d57d354329e325f5e8df3d15
-
SHA512
6ea2fb1bd527c8782aa3d5f10099057f8eb3a179b8a5db977149515408cb7239c48105de641d3a06c691c1e8adecdcd18ca7c17a1e6488f56e795afd18e73eba
-
SSDEEP
3072:UiIGgQZN2TeeV1Q+5B4KRUKSigNRmyhibxduU/P1:UnGggQHftSimRmyhibx8U
Malware Config
Signatures
Files
-
d9301c43a3322ef3f43341c507696c8b0f854c72d57d354329e325f5e8df3d15.exe windows x86
46748fd63bba477213d8d88b40e7dc8f
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegQueryInfoKeyW
RegQueryValueExW
RegOpenKeyExW
RegSetValueExW
RegSetValueExA
SetSecurityDescriptorDacl
RegOpenKeyExA
RegCreateKeyExA
RegOpenKeyW
FreeSid
InitializeSecurityDescriptor
RegEnumKeyExW
RegOpenKeyW
FreeSid
RegSetValueExW
RegEnumKeyExW
RegOpenKeyExA
RegCreateKeyExA
AddAccessAllowedAce
RegCreateKeyExW
RegDeleteValueW
AddAccessAllowedAce
RegSetValueExW
RegOpenKeyExW
RegCloseKey
InitializeSecurityDescriptor
RegSetValueExA
RegQueryInfoKeyW
AdjustTokenPrivileges
OpenProcessToken
OpenProcessToken
AddAccessAllowedAce
OpenThreadToken
RegCloseKey
RegOpenKeyW
RegCreateKeyExA
RegQueryInfoKeyW
RegQueryInfoKeyW
user32
IsDlgButtonChecked
MessageBoxA
GetDC
ReleaseCapture
EndDialog
DestroyIcon
SetFocus
SendMessageA
SetWindowTextW
IsWindow
PostQuitMessage
PostMessageW
GetSubMenu
LoadStringW
GetFocus
GetWindowTextW
FindWindowW
wsprintfA
GetSubMenu
SendMessageW
ReleaseDC
kernel32
GetModuleFileNameA
GetStartupInfoA
GetSystemTimeAsFileTime
SetLastError
SetFilePointer
GetLastError
lstrcpyW
GetVersionExA
GetTickCount
HeapDestroy
Sections
Size: 148KB - Virtual size: 160KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE