Static task
static1
Behavioral task
behavioral1
Sample
86be5d2d08fdfd4d4026d663aea0ac06bfee630eba6232dae46d14f5a43ffb02.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
86be5d2d08fdfd4d4026d663aea0ac06bfee630eba6232dae46d14f5a43ffb02.exe
Resource
win10v2004-20220812-en
General
-
Target
86be5d2d08fdfd4d4026d663aea0ac06bfee630eba6232dae46d14f5a43ffb02
-
Size
324KB
-
MD5
093382bb078c14e8934b8c6fbb253564
-
SHA1
5b5d7f9db82a99a9a288a439f996dab83acabf5e
-
SHA256
86be5d2d08fdfd4d4026d663aea0ac06bfee630eba6232dae46d14f5a43ffb02
-
SHA512
9298f5bc396fcda5afef0ac35f62953e66b079c06eadf71f72fc4bff524f476df74b0a8155b65c9a38d6396f1497f2c2c160b66a68a29f06feecf73169c1e568
-
SSDEEP
6144:+Gy6cRQhJWQAWPlKALXqo1jmUZxL6xQGQm9UmM7I+6cw:+GsRQ3NAWxLXqs76ve7I+L
Malware Config
Signatures
Files
-
86be5d2d08fdfd4d4026d663aea0ac06bfee630eba6232dae46d14f5a43ffb02.exe windows x86
b3a89f0670c5e7c2cf1b05f44248b100
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
setupapi
SetupDiGetClassDevsA
SetupDiEnumDeviceInterfaces
SetupDiGetDeviceInterfaceDetailA
SetupDiDestroyDeviceInfoList
powrprof
SetActivePwrScheme
DeletePwrScheme
WritePwrScheme
WriteProcessorPwrScheme
EnumPwrSchemes
GetActivePwrScheme
wtsapi32
WTSUnRegisterSessionNotification
WTSRegisterSessionNotification
kernel32
WaitForSingleObject
CloseHandle
SetEvent
GetLastError
CreateMutexA
SetThreadPriority
SetPriorityClass
GetCurrentProcess
CreateThread
CreateEventA
DeviceIoControl
SetProcessAffinityMask
GetProcessAffinityMask
LocalFree
CreateFileA
LocalAlloc
CreateProcessA
GetVersionExA
GetSystemInfo
FreeLibrary
GetProcAddress
LoadLibraryA
lstrcpynA
GetStdHandle
AllocConsole
DisconnectNamedPipe
FlushFileBuffers
WriteFile
ReadFile
ConnectNamedPipe
ResetEvent
CreateNamedPipeA
ReleaseMutex
CompareStringW
CompareStringA
HeapSize
LCMapStringW
LCMapStringA
GetStringTypeW
GetStringTypeA
SetFilePointer
GetCPInfo
GetOEMCP
GetACP
VirtualProtect
MultiByteToWideChar
VirtualAlloc
VirtualQuery
InterlockedExchange
RtlUnwind
VirtualFree
HeapCreate
HeapDestroy
GetEnvironmentStringsW
WideCharToMultiByte
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
UnhandledExceptionFilter
CreatePipe
SetHandleCount
WaitForMultipleObjects
SetEnvironmentVariableA
GetLocaleInfoA
SetUnhandledExceptionFilter
IsBadCodePtr
GetCurrentThreadId
TerminateProcess
GetFileAttributesA
ExitProcess
DuplicateHandle
SetStdHandle
GetFileType
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetModuleFileNameA
HeapAlloc
HeapReAlloc
HeapFree
user32
CreatePopupMenu
InsertMenuA
SetForegroundWindow
TrackPopupMenu
DestroyMenu
CreateWindowExA
GetSystemMetrics
LoadImageA
DestroyIcon
GetCursorPos
LoadCursorA
RegisterClassExA
LoadStringA
LoadAcceleratorsA
GetMessageA
TranslateAcceleratorA
TranslateMessage
DispatchMessageA
GetProcessWindowStation
GetThreadDesktop
PostQuitMessage
EndPaint
BeginPaint
DefWindowProcA
DestroyWindow
DialogBoxParamA
EndDialog
SetUserObjectSecurity
LoadIconA
advapi32
RegCloseKey
GetSidLengthRequired
InitializeSid
GetSidSubAuthority
InitializeAcl
AddAccessAllowedAce
ReportEventA
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
DeregisterEventSource
RegDeleteKeyA
RegCreateKeyExA
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
RegNotifyChangeKeyValue
shell32
Shell_NotifyIconA
Sections
.text Size: 44KB - Virtual size: 41KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tc Size: 248KB - Virtual size: 248KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE