Static task
static1
Behavioral task
behavioral1
Sample
d6bb2456bdeb2d67c9db8f9a569cfc1956c6e76084312888ad4a100eeb36299e.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
d6bb2456bdeb2d67c9db8f9a569cfc1956c6e76084312888ad4a100eeb36299e.exe
Resource
win10v2004-20220901-en
General
-
Target
d6bb2456bdeb2d67c9db8f9a569cfc1956c6e76084312888ad4a100eeb36299e
-
Size
1.9MB
-
MD5
9029fed2ca6935ac6404585c405377a5
-
SHA1
656090ae5bfc51e63cf8aa5d533a056939b74623
-
SHA256
d6bb2456bdeb2d67c9db8f9a569cfc1956c6e76084312888ad4a100eeb36299e
-
SHA512
c6cca2690e8e796c32a5c8926f1415e273b226a107897c4bc7c0fe2c0dfcb1d1881a589fa2f247ea6bea121b35d1913f3d38e6003831ec809ab23ea0ab05555a
-
SSDEEP
12288:ksf7THARCXfIvoAGBoD/HpXlXKoemvYQqLWRc0qpb0qD0xc9nQi90H:9jv1UHpXl6LmvYJLYq2qDF5
Malware Config
Signatures
Files
-
d6bb2456bdeb2d67c9db8f9a569cfc1956c6e76084312888ad4a100eeb36299e.exe windows x86
914f48205872e2a197aaae4775f619b3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
EventRegister
EventUnregister
EventWrite
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
RegDeleteValueW
RegSetValueExW
RegCreateKeyExW
RegEnumValueW
RegQueryInfoKeyW
RegEnumKeyExW
RegDeleteKeyW
ConvertSidToStringSidW
LookupAccountNameW
TraceMessage
LookupAccountSidW
RegEnumKeyW
GetSecurityInfo
GetAclInformation
GetAce
GetLengthSid
InitializeAcl
AddAce
AddAccessAllowedAceEx
SetSecurityInfo
QueryServiceConfigW
DeleteService
CreateServiceW
StartServiceW
OpenSCManagerW
OpenServiceW
ControlService
EnumDependentServicesW
QueryServiceStatus
CloseServiceHandle
GetNamedSecurityInfoW
ConvertStringSidToSidW
SetEntriesInAclW
SetNamedSecurityInfoW
LookupPrivilegeValueW
AdjustTokenPrivileges
InitiateShutdownW
RegOpenKeyExA
OpenProcessToken
GetTokenInformation
AllocateAndInitializeSid
EqualSid
FreeSid
RegQueryValueExA
kernel32
GetExitCodeThread
QueryDosDeviceW
GetVersion
DeviceIoControl
DebugBreak
GetDriveTypeW
lstrlenW
SetErrorMode
GetUserDefaultLangID
ReadFile
GlobalAlloc
GlobalLock
GlobalUnlock
GetLongPathNameW
OpenEventW
WritePrivateProfileStringW
DeleteFileA
GetComputerNameW
CompareStringW
MoveFileExW
CreateProcessW
WaitForMultipleObjects
GetExitCodeProcess
FindNextFileW
GetShortPathNameW
GetDiskFreeSpaceExW
GetNumberFormatW
GetLocaleInfoW
CopyFileW
SetFileAttributesW
GetFileTime
FileTimeToSystemTime
GetTimeZoneInformation
GetModuleHandleW
GetVersionExA
GetFileAttributesW
CreateFileA
GetWindowsDirectoryA
SetFilePointer
GetLocalTime
GetSystemDefaultLangID
SetCurrentDirectoryW
GetTempPathA
GetFileSize
WriteFile
SetLastError
GetUserDefaultLCID
GetUserGeoID
CreateDirectoryW
RemoveDirectoryW
GetVersionExW
WideCharToMultiByte
MultiByteToWideChar
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
GetModuleHandleA
SetUnhandledExceptionFilter
GetStartupInfoA
InterlockedCompareExchange
LockResource
Sleep
InterlockedExchange
CloseHandle
FindClose
FindFirstFileW
GetCurrentDirectoryW
GlobalFree
GetCommandLineW
GetModuleFileNameW
GetSystemInfo
ReleaseMutex
CreateMutexW
GetSystemDirectoryW
GetWindowsDirectoryW
MoveFileW
CreateFileW
GetTempPathW
LoadResource
FindResourceW
DeleteFileW
ExpandEnvironmentStringsW
GetSystemWindowsDirectoryW
CreateThread
RegisterApplicationRestart
HeapSetInformation
GetProcAddress
LoadLibraryW
FreeLibrary
LoadLibraryExW
LocalFree
LocalAlloc
InitializeCriticalSection
WaitForSingleObject
CreateEventW
DeleteCriticalSection
ResetEvent
LeaveCriticalSection
EnterCriticalSection
SetEvent
InterlockedIncrement
InterlockedDecrement
lstrlenA
GetLastError
GetFileAttributesA
gdi32
GetTextMetricsW
CreatePen
GetTextFaceA
ExtTextOutW
CreateFontA
CreateSolidBrush
CreateCompatibleDC
CreateFontIndirectW
SetMapMode
SelectObject
GetObjectW
DeleteDC
DeleteObject
SetBkColor
SetBkMode
SetTextColor
GetStockObject
PatBlt
GetDeviceCaps
user32
IsWindow
SetWindowPos
GetClientRect
GetDesktopWindow
CharNextA
CharNextW
LoadStringA
MessageBoxW
LoadStringW
PostMessageW
SetWindowTextW
FindWindowW
LockSetForegroundWindow
SendMessageW
SetFocus
MoveWindow
MapWindowPoints
PeekMessageW
PostThreadMessageW
CallWindowProcW
DestroyCursor
GetActiveWindow
GetScrollInfo
SetScrollInfo
ScrollWindow
LoadCursorW
SetCursor
GetMessageW
IsDialogMessageW
TranslateMessage
DispatchMessageW
LoadIconW
SetForegroundWindow
UpdateWindow
PostQuitMessage
BeginPaint
CreateDialogParamW
GetWindowLongW
SetWindowLongW
EndPaint
GetSystemMetrics
DestroyWindow
SetTimer
KillTimer
GetSystemMenu
EnableMenuItem
LoadImageW
GetSysColor
InvalidateRect
CheckRadioButton
IsDlgButtonChecked
SendDlgItemMessageW
CreateWindowExW
FindWindowExW
RegisterWindowMessageA
EnableWindow
ShowWindow
SystemParametersInfoW
DrawTextW
DrawFocusRect
DefWindowProcW
GetDlgItem
GetWindowRect
GetParent
GetDC
ReleaseDC
msvcrt
?terminate@@YAXXZ
_controlfp
_unlock
__dllonexit
wcstok
_wtoi
_purecall
strstr
strrchr
ceil
_itow
free
malloc
memcpy
_wcsupr
calloc
wcstol
time
_stricmp
_endthread
iswalnum
towupper
iswdigit
bsearch
_except_handler4_common
wcsncmp
memmove
towlower
iswspace
_vsnprintf
_beginthreadex
_wtol
__set_app_type
__p__fmode
_wcsnicmp
_ftol2
swscanf
wcsrchr
_wcslwr
??_U@YAPAXI@Z
_lock
_onexit
__p__commode
__setusermatherr
_amsg_exit
_initterm
memset
_ftol2_sse
wcschr
??3@YAXPAX@Z
_acmdln
exit
_ismbblead
_XcptFilter
_exit
_cexit
wcspbrk
wcsstr
_wcsicmp
??2@YAPAXI@Z
__getmainargs
??_V@YAXPAX@Z
_strlwr
_vsnwprintf
atl
ord32
pdh
PdhCollectQueryData
PdhOpenQueryW
PdhAddCounterW
PdhCloseQuery
PdhGetFormattedCounterValue
ole32
CoRegisterClassObject
CoTaskMemFree
CoRevokeClassObject
CoCreateInstance
CLSIDFromString
CoUninitialize
CoInitialize
OleUninitialize
OleInitialize
PropVariantClear
CreateStreamOnHGlobal
CoInitializeEx
oleaut32
SystemTimeToVariantTime
SysAllocString
VariantTimeToSystemTime
VariantInit
VariantClear
SysAllocStringLen
SysFreeString
SysStringLen
comctl32
ord345
InitCommonControlsEx
shell32
CommandLineToArgvW
SHGetFolderPathW
SHChangeNotify
SHGetPathFromIDListW
ord102
SetCurrentProcessExplicitAppUserModelID
ShellExecuteW
ShellExecuteExW
SHGetFolderLocation
SHGetMalloc
SHGetSpecialFolderLocation
gdiplus
GdipImageRotateFlip
GdipCreateBitmapFromFile
GdipCreateBitmapFromFileICM
GdipCreateBitmapFromHBITMAP
GdipDisposeImage
GdiplusShutdown
GdiplusStartup
GdipCloneImage
GdipCreateHBITMAPFromBitmap
GdipAlloc
GdipFree
wininet
InternetCrackUrlW
setupapi
SetupGetBinaryField
SetupGetLineTextW
SetupFindFirstLineW
SetupGetLineCountW
SetupGetStringFieldW
SetupFindNextLine
SetupIterateCabinetA
SetupCloseInfFile
wintrust
WTHelperGetProvSignerFromChain
WinVerifyTrust
WTHelperProvDataFromStateData
urlmon
UrlMkSetSessionOption
ObtainUserAgentString
shlwapi
PathAddBackslashA
PathFindExtensionW
PathAddBackslashW
ord158
PathGetCharTypeA
PathGetCharTypeW
PathFindFileNameW
SHDeleteKeyW
crypt32
CertVerifyCertificateChainPolicy
userenv
ExpandEnvironmentStringsForUserW
LoadUserProfileW
UnloadUserProfile
secur32
GetUserNameExW
version
VerQueryValueW
GetFileVersionInfoSizeW
GetFileVersionInfoW
mpr
WNetCancelConnection2W
WNetAddConnection2W
WNetGetConnectionW
mf
MFGetSupportedSchemes
Sections
.text Size: 452KB - Virtual size: 451KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 6KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1.4MB - Virtual size: 1.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 61KB - Virtual size: 63KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE