Static task
static1
Behavioral task
behavioral1
Sample
06ad6746455b890ddb0bcdd212ccee7f1890618af9276290cfd97cae3d01d982.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
06ad6746455b890ddb0bcdd212ccee7f1890618af9276290cfd97cae3d01d982.exe
Resource
win10v2004-20220812-en
General
-
Target
06ad6746455b890ddb0bcdd212ccee7f1890618af9276290cfd97cae3d01d982
-
Size
334KB
-
MD5
845bdbb59772f9b82b0b509d819efb66
-
SHA1
85a8b8b117bdfd8b20da3b2ab190ac6d951f7bb7
-
SHA256
06ad6746455b890ddb0bcdd212ccee7f1890618af9276290cfd97cae3d01d982
-
SHA512
b53bbbac416dc898fc811d8c722d0e210f7f363b8ebeff727d566b789267500b09774d8f78a1f9313553839163a8f71545a5db4f46e3ad5f24df8b2675dd92f5
-
SSDEEP
6144:h323fRrfGLBj+tfAwpLDLXpXA3cfrEmOMAFt0HgJQV4KM27QpE:h32PR7uup3DpXWP1vmS5ed
Malware Config
Signatures
Files
-
06ad6746455b890ddb0bcdd212ccee7f1890618af9276290cfd97cae3d01d982.exe windows x86
d3f81f1486b951aa34fe1e590b40ccdc
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
psapi
GetProcessImageFileNameW
GetModuleFileNameExW
kernel32
LocalFree
CreateFileW
QueryPerformanceFrequency
QueryPerformanceCounter
GetFileSize
ReadFile
WriteFile
OpenSemaphoreW
WaitForSingleObject
CreateProcessA
ReleaseSemaphore
GetModuleFileNameW
CreateProcessW
OpenProcess
SetProcessAffinityMask
CreateEventW
CancelIo
GetOverlappedResult
CreateNamedPipeA
DisconnectNamedPipe
ConnectNamedPipe
SetEvent
GetVersionExA
CreateSemaphoreW
MultiByteToWideChar
TerminateThread
SetThreadPriority
Thread32Next
GetExitCodeThread
ResumeThread
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
GetProcessHeap
SetEndOfFile
SetFilePointer
GetLocaleInfoW
FlushFileBuffers
GetConsoleMode
GetConsoleCP
SetStdHandle
CreateFileA
LCMapStringW
WideCharToMultiByte
LCMapStringA
LoadLibraryA
GetModuleHandleA
Thread32First
CreateToolhelp32Snapshot
GetLastError
GetPriorityClass
GetCurrentProcess
Sleep
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemInfo
CloseHandle
InitializeCriticalSectionAndSpinCount
GetStartupInfoA
GetFileType
SetHandleCount
HeapFree
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetSystemTimeAsFileTime
HeapAlloc
InterlockedIncrement
InterlockedDecrement
ExitThread
CreateThread
GetStartupInfoW
RaiseException
RtlUnwind
HeapCreate
VirtualFree
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
HeapReAlloc
GetModuleHandleW
GetProcAddress
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
ExitProcess
GetStdHandle
GetModuleFileNameA
HeapSize
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetStringTypeA
GetStringTypeW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
user32
CharLowerW
GetParent
GetWindowInfo
keybd_event
MapVirtualKeyW
SetWindowPos
SystemParametersInfoW
GetWindowPlacement
EnumWindows
FindWindowExW
GetWindowThreadProcessId
EnumThreadWindows
IsWindow
PostMessageW
SendMessageW
GetWindowRect
GetKeyState
EnumChildWindows
GetWindowTextW
GetClassNameW
advapi32
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
GetUserNameW
RegSetValueExW
RegCreateKeyExW
CreateProcessAsUserA
GetLengthSid
SetTokenInformation
ConvertStringSidToSidW
DuplicateTokenEx
OpenProcessToken
SetSecurityInfo
GetSecurityDescriptorSacl
ConvertStringSecurityDescriptorToSecurityDescriptorW
ws2_32
WSACleanup
gethostbyname
WSAStartup
Sections
.text Size: 244KB - Virtual size: 243KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 30KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 48KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ