Static task
static1
Behavioral task
behavioral1
Sample
717adcc0d63590568ad4ebc429b88c98b9353be8d5869fc1d57167fc2a55133b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
717adcc0d63590568ad4ebc429b88c98b9353be8d5869fc1d57167fc2a55133b.exe
Resource
win10v2004-20220812-en
General
-
Target
717adcc0d63590568ad4ebc429b88c98b9353be8d5869fc1d57167fc2a55133b
-
Size
816KB
-
MD5
0ba36b428ea0ec0c8cfab5122283bc26
-
SHA1
03d384617104202fca9c3b6692757709e9df05d5
-
SHA256
717adcc0d63590568ad4ebc429b88c98b9353be8d5869fc1d57167fc2a55133b
-
SHA512
2b30625afaa0bfcb57b95e1986eaf988d1471047d51b843204798b669fc6f02ea8cff1bce9bdb64b8ee91e91a443bdc553c88e0e24004ab1c1cec9dd93108313
-
SSDEEP
12288:MYrrfHG4v95+gvGOsdFvxQssJF1/cKwd89giVNA05fxkXfEoog:brHdv3+9OYNxCmBivfpuZ
Malware Config
Signatures
Files
-
717adcc0d63590568ad4ebc429b88c98b9353be8d5869fc1d57167fc2a55133b.exe windows x86
6b90d7ffb0e5484bca444793ed671a81
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapAlloc
WideCharToMultiByte
ReadFile
HeapDestroy
GetStringTypeW
GetCurrentProcess
RaiseException
GetTimeFormatA
CloseHandle
IsBadWritePtr
SetUnhandledExceptionFilter
IsValidCodePage
IsBadCodePtr
TlsSetValue
GetACP
HeapCreate
ExitProcess
LeaveCriticalSection
LoadLibraryA
GetModuleFileNameA
GetProcAddress
GetCurrentThread
DebugBreak
GetEnvironmentStrings
LCMapStringA
TlsGetValue
GetSystemTimeAsFileTime
GetCurrentThreadId
EnumSystemLocalesA
SetConsoleCtrlHandler
GetLastError
UnhandledExceptionFilter
GetModuleHandleA
FreeEnvironmentStringsA
InterlockedExchange
GetLocaleInfoW
HeapReAlloc
GetCommandLineA
IsValidLocale
CompareStringA
CompareStringW
SetEnvironmentVariableA
VirtualAlloc
SetLastError
TlsFree
GetSystemInfo
FlushFileBuffers
HeapFree
GetTickCount
GetStdHandle
QueryPerformanceCounter
CreateMutexA
GetDateFormatA
WriteFile
GetLocaleInfoA
RtlUnwind
InterlockedDecrement
GetStringTypeA
SetFilePointer
MultiByteToWideChar
VirtualProtect
GetCPInfo
DeleteCriticalSection
VirtualQuery
GetEnvironmentStringsW
InterlockedIncrement
EnterCriticalSection
VirtualFree
InitializeCriticalSection
GetOEMCP
SetHandleCount
GetVersionExA
GetStartupInfoA
GetTimeZoneInformation
GetCurrentProcessId
TerminateProcess
GetUserDefaultLCID
OutputDebugStringA
GetFileType
HeapValidate
FreeEnvironmentStringsW
IsBadReadPtr
TlsAlloc
SetStdHandle
FatalAppExitA
LCMapStringW
advapi32
RegEnumKeyExA
RegQueryValueExA
OpenProcessToken
RegDeleteKeyA
SetSecurityDescriptorDacl
RegOpenKeyExA
InitializeSecurityDescriptor
RegCreateKeyExA
RegDeleteValueA
RegSetValueExA
GetSidLengthRequired
RegCloseKey
RegSetValueA
CreateProcessAsUserA
RegQueryInfoKeyA
DuplicateTokenEx
SetTokenInformation
RegCreateKeyA
ConvertStringSidToSidA
ole32
StgCreateDocfileOnILockBytes
CreateFileMoniker
OleRegGetMiscStatus
OleRun
OleLockRunning
CoRegisterMessageFilter
OleInitialize
OleFlushClipboard
CreateGenericComposite
OleUninitialize
CoTaskMemFree
OleRegEnumVerbs
RevokeDragDrop
CreateILockBytesOnHGlobal
CoRevokeClassObject
CoGetClassObject
ReleaseStgMedium
OleGetClipboard
gdi32
CreatePalette
DeleteDC
CreateRectRgnIndirect
GetDeviceCaps
DeleteObject
CreateDCA
CreatePenIndirect
SelectObject
GetObjectA
GetObjectType
wsock32
WSACleanup
user32
CreateIconIndirect
EnableWindow
DrawStateA
GetParent
RegisterClassA
ShowWindow
TranslateMessage
DestroyIcon
LoadCursorA
RegisterClassExA
InflateRect
ReleaseCapture
SetWindowLongA
LoadImageA
Sections
.text Size: 128KB - Virtual size: 125KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 448KB - Virtual size: 444KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 108KB - Virtual size: 105KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 128KB - Virtual size: 125KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ