Static task
static1
Behavioral task
behavioral1
Sample
b0f7db5e4bf47b1e02c1cba2de46b2b67e35c4b70fd097154b0b3715447dcb05.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b0f7db5e4bf47b1e02c1cba2de46b2b67e35c4b70fd097154b0b3715447dcb05.exe
Resource
win10v2004-20220812-en
General
-
Target
b0f7db5e4bf47b1e02c1cba2de46b2b67e35c4b70fd097154b0b3715447dcb05
-
Size
636KB
-
MD5
799930d821e8f4d0998b269344ba2af0
-
SHA1
80523961f5c17488549eef88fae5f04dc4546ea9
-
SHA256
b0f7db5e4bf47b1e02c1cba2de46b2b67e35c4b70fd097154b0b3715447dcb05
-
SHA512
057674a4c5cdaff24ae547e826b1d673c89378b0700b1047a302e165f7902cad539424d734e5681b736929db2fac185ae49d73ac375bb432dab4145d2322efac
-
SSDEEP
12288:DLCF/GzyY94ya6zPFnRAMLYaoUe5imMwvPzxmjiZeZx10PuacBs8zrgbfToSP5IF:EVoamD7LYaA5imrxmjio10uacBhzsbL6
Malware Config
Signatures
Files
-
b0f7db5e4bf47b1e02c1cba2de46b2b67e35c4b70fd097154b0b3715447dcb05.exe windows x86
515ee79062dd7d1f047f97a5ff4c6141
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
setupapi
SetupDiGetClassDevsA
SetupDiEnumDeviceInterfaces
SetupDiGetDeviceInterfaceDetailA
SetupDiDestroyDeviceInfoList
powrprof
DeletePwrScheme
WritePwrScheme
WriteProcessorPwrScheme
EnumPwrSchemes
GetActivePwrScheme
SetActivePwrScheme
wtsapi32
WTSRegisterSessionNotification
WTSUnRegisterSessionNotification
kernel32
WaitForSingleObject
CloseHandle
SetEvent
GetLastError
CreateMutexA
SetThreadPriority
SetPriorityClass
GetCurrentProcess
CreateThread
CreateEventA
DeviceIoControl
SetProcessAffinityMask
GetProcessAffinityMask
LocalFree
CreateFileA
LocalAlloc
CreateProcessA
GetVersionExA
GetSystemInfo
FreeLibrary
GetProcAddress
LoadLibraryA
lstrcpynA
GetStdHandle
AllocConsole
DisconnectNamedPipe
FlushFileBuffers
WriteFile
ReadFile
ConnectNamedPipe
ResetEvent
CreateNamedPipeA
ReleaseMutex
IsBadCodePtr
SetUnhandledExceptionFilter
GetLocaleInfoA
SetEnvironmentVariableA
CompareStringW
CompareStringA
HeapSize
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
SetFilePointer
VirtualProtect
MultiByteToWideChar
VirtualAlloc
VirtualQuery
InterlockedExchange
RtlUnwind
VirtualFree
HeapCreate
HeapDestroy
GetEnvironmentStringsW
WideCharToMultiByte
HeapAlloc
WaitForMultipleObjects
HeapReAlloc
HeapFree
GetFileAttributesA
TerminateProcess
SetHandleCount
CreatePipe
GetACP
GetOEMCP
GetCPInfo
UnhandledExceptionFilter
GetCurrentThreadId
FreeEnvironmentStringsW
GetEnvironmentStrings
ExitProcess
DuplicateHandle
SetStdHandle
GetFileType
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetModuleFileNameA
FreeEnvironmentStringsA
user32
GetProcessWindowStation
GetThreadDesktop
SetUserObjectSecurity
EndDialog
DialogBoxParamA
DestroyWindow
DefWindowProcA
BeginPaint
EndPaint
PostQuitMessage
GetCursorPos
CreatePopupMenu
InsertMenuA
SetForegroundWindow
TrackPopupMenu
DestroyMenu
CreateWindowExA
GetSystemMetrics
LoadImageA
DestroyIcon
ShowWindow
LoadIconA
LoadCursorA
RegisterClassExA
SendMessageA
LoadStringA
LoadAcceleratorsA
GetMessageA
TranslateAcceleratorA
TranslateMessage
DispatchMessageA
advapi32
InitializeSid
GetSidSubAuthority
InitializeAcl
AddAccessAllowedAce
ReportEventA
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
DeregisterEventSource
RegDeleteKeyA
RegCreateKeyExA
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
RegNotifyChangeKeyValue
RegCloseKey
GetSidLengthRequired
shell32
Shell_NotifyIconA
Sections
.text Size: 44KB - Virtual size: 41KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 568KB - Virtual size: 1.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE