WinMain
Static task
static1
Behavioral task
behavioral1
Sample
a824db0be3f7754dcbd4b4fdcf38c702c101c210db174574eb8605ccd6d326a7.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a824db0be3f7754dcbd4b4fdcf38c702c101c210db174574eb8605ccd6d326a7.exe
Resource
win10v2004-20220812-en
General
-
Target
a824db0be3f7754dcbd4b4fdcf38c702c101c210db174574eb8605ccd6d326a7
-
Size
188KB
-
MD5
50170974008f197397184812d06b0fc0
-
SHA1
68845c02efde29d4966711305ecf729cb99c1dd3
-
SHA256
a824db0be3f7754dcbd4b4fdcf38c702c101c210db174574eb8605ccd6d326a7
-
SHA512
a68d5d5e171c99b3a8154efd89e688ce662abaf4ec39f57b1e0abff56fbfa7312103e51d950bb00770ee4d20a4035f5a64a945d7f7d98287dc01535b4659dd87
-
SSDEEP
3072:k9Ud1DlOnr6BFXQNIW+HYf/YgsfCBzUItlMlSLBzXPyH:kE1xOnr6XoH+HYY5fqhlIkBrPyH
Malware Config
Signatures
Files
-
a824db0be3f7754dcbd4b4fdcf38c702c101c210db174574eb8605ccd6d326a7.exe windows x86
167d3aece23579f8c24fc2ce51dacb6e
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ReleaseMutex
SetErrorMode
CopyFileA
GetModuleFileNameA
GlobalUnlock
GlobalFree
GetProcessHeap
HeapAlloc
HeapFree
CreateEventA
GetLocalTime
MoveFileA
ExitProcess
OpenProcess
VirtualAllocEx
WriteProcessMemory
CreateRemoteThread
GetCurrentProcess
CreateProcessA
SetLastError
GetLastError
SetFilePointer
ReadFile
Sleep
WriteFile
RemoveDirectoryA
LocalAlloc
LocalFree
GetDriveTypeA
CreateDirectoryA
GetVersionExA
lstrcmpA
WideCharToMultiByte
MultiByteToWideChar
FreeLibrary
GetProcAddress
lstrcatA
GetPrivateProfileSectionNamesA
lstrlenA
SetEvent
lstrcpyA
VirtualAlloc
VirtualFree
CloseHandle
LoadLibraryA
CreateThread
RaiseException
InterlockedExchange
GetStartupInfoA
GetModuleHandleA
advapi32
AllocateAndInitializeSid
GetTokenInformation
LookupAccountSidA
DuplicateTokenEx
SetTokenInformation
CreateProcessAsUserA
RegDeleteValueA
RegDeleteKeyA
RegEnumValueA
RegEnumKeyExA
GetLengthSid
InitializeAcl
AddAccessAllowedAce
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
RegSetKeySecurity
FreeSid
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegCreateKeyExA
RegOpenKeyA
RegQueryValueExA
SetEntriesInAclA
GetNamedSecurityInfoA
BuildExplicitAccessWithNameA
SetNamedSecurityInfoA
RegCreateKeyA
RegSetValueExA
OpenSCManagerA
OpenServiceA
QueryServiceStatus
ControlService
DeleteService
CloseServiceHandle
RegQueryValueA
RegCloseKey
LsaOpenPolicy
LsaRetrievePrivateData
LsaClose
LookupAccountNameA
IsValidSid
msvcrt
memcmp
strcpy
strchr
malloc
strcmp
free
_except_handler3
strrchr
rename
strcat
atoi
strncmp
_errno
wcscpy
strtok
strncat
_beginthreadex
strstr
??1type_info@@UAE@XZ
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_controlfp
__dllonexit
_onexit
_strnicmp
memset
strlen
_ftol
ceil
_CxxThrowException
memmove
calloc
__CxxFrameHandler
??2@YAPAXI@Z
??3@YAXPAX@Z
memcpy
_strupr
shlwapi
SHDeleteKeyA
msvcp60
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
netapi32
NetLocalGroupAddMembers
NetUserAdd
userenv
CreateEnvironmentBlock
msvfw32
ICSendMessage
ICSeqCompressFrameEnd
Exports
Exports
Sections
.data Size: 164KB - Virtual size: 160KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 316B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ