Static task
static1
Behavioral task
behavioral1
Sample
88582fee0240c3446743ab5635e1a16990d985afeb8114d3587d8c16f51fa92f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
88582fee0240c3446743ab5635e1a16990d985afeb8114d3587d8c16f51fa92f.exe
Resource
win10v2004-20220812-en
General
-
Target
88582fee0240c3446743ab5635e1a16990d985afeb8114d3587d8c16f51fa92f
-
Size
1.3MB
-
MD5
808bbe38a6dbdcfb00c0fd8408ec63d0
-
SHA1
93f0980d172e05942de143c7e6d38e7171568560
-
SHA256
88582fee0240c3446743ab5635e1a16990d985afeb8114d3587d8c16f51fa92f
-
SHA512
d9ede1708f47452b60c89b3bbc935ea0a72355f7e55ab32c9911d83d33c30a4e1e524436b504d5ae074a457d5cc0b154e48dfe7beeff007e70ad7beee09592a8
-
SSDEEP
12288:UdpJ16ena4i6vTtllPaa5LiIU/fsh4V6jnB0KJFx+I3IxAOzK6+44EwgwIVM12ca:UdpJ5ZDll
Malware Config
Signatures
Files
-
88582fee0240c3446743ab5635e1a16990d985afeb8114d3587d8c16f51fa92f.exe windows x86
8056a0dd1801858eacfb684462e97775
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegCloseKey
RegSetValueExW
RegCreateKeyExW
RegEnumValueW
RegQueryInfoKeyW
RegOpenKeyExW
RegQueryValueExW
RegEnumKeyW
RegEnumKeyExW
RegDeleteKeyW
RegFlushKey
RegDeleteValueW
RegNotifyChangeKeyValue
kernel32
InitializeCriticalSection
GetFileAttributesW
GetModuleFileNameW
DeleteCriticalSection
CloseHandle
HeapFree
HeapAlloc
GetProcessHeap
lstrcpyW
lstrcmpW
GetWindowsDirectoryW
CompareFileTime
lstrlenA
GetVersionExW
WaitForMultipleObjects
WaitForSingleObject
SetEvent
GetCurrentThreadId
FreeLibrary
LoadLibraryW
Sleep
GetCommandLineW
CreateEventW
GetSystemInfo
GetFullPathNameW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoA
GetCommandLineA
GetVersionExA
HeapReAlloc
RtlUnwind
ExitThread
TlsSetValue
TlsGetValue
GetLastError
CreateThread
InterlockedDecrement
GetProcAddress
GetModuleHandleA
WriteFile
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetCurrentDirectoryW
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
TlsFree
SetLastError
TlsAlloc
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
HeapSize
LoadLibraryA
GetACP
GetOEMCP
GetCPInfo
InterlockedExchange
VirtualQuery
GetStringTypeA
GetStringTypeW
VirtualProtect
MultiByteToWideChar
IsBadReadPtr
IsBadCodePtr
SetFilePointer
LCMapStringA
LCMapStringW
GetLocaleInfoA
SetStdHandle
FlushFileBuffers
CreateFileW
SetEndOfFile
ReadFile
GetEnvironmentStrings
GetSystemDirectoryW
LeaveCriticalSection
InterlockedIncrement
EnterCriticalSection
lstrlenW
ExitProcess
gdi32
GetTextExtentPointW
user32
GetKeyState
DestroyWindow
MessageBoxA
wsprintfA
LoadStringA
SetDlgItemTextW
ShowWindow
CheckDlgButton
SetWindowTextW
ReleaseDC
GetDC
SetDlgItemInt
GetDlgItemInt
GetDlgItemTextW
CheckRadioButton
LoadIconW
SetForegroundWindow
KillTimer
SetTimer
SetFocus
CallNextHookEx
IsWindowEnabled
AdjustWindowRectEx
GetWindowRect
CreateDialogParamW
GetClientRect
UpdateWindow
PostQuitMessage
UnhookWindowsHookEx
SetWindowsHookExW
DispatchMessageW
TranslateMessage
IsDialogMessageW
PeekMessageW
MsgWaitForMultipleObjects
GetDesktopWindow
LoadStringW
MessageBoxW
GetDlgItem
SendMessageW
EnableWindow
GetWindowLongW
DialogBoxParamW
SetWindowPos
PostMessageW
EndDialog
GetFocus
wsprintfW
comctl32
ImageList_ReplaceIcon
ImageList_Create
ord17
ImageList_Destroy
comdlg32
GetSaveFileNameW
shell32
ShellExecuteW
ole32
CoInitializeSecurity
CoInitialize
CoUninitialize
CoCreateInstance
oleaut32
VariantInit
SysFreeString
SysAllocString
VariantClear
Sections
.text Size: 212KB - Virtual size: 212KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1.0MB - Virtual size: 1.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE