Static task
static1
Behavioral task
behavioral1
Sample
536fab5d841a14667317c7610ae99bb71fd4db6e9aa0e4ca78ef8d175a10f74f.exe
Resource
win7-20220812-en
General
-
Target
536fab5d841a14667317c7610ae99bb71fd4db6e9aa0e4ca78ef8d175a10f74f
-
Size
105KB
-
MD5
473eb750075b4f7eb735622fe5123c46
-
SHA1
3ab2b313529faeca27f7ae6511e80bf58b4a28cf
-
SHA256
536fab5d841a14667317c7610ae99bb71fd4db6e9aa0e4ca78ef8d175a10f74f
-
SHA512
3c9136b16e5559ebb4dab55db449c4b08939ef90a759096c1b7635fedfd63d32326bed01c58bd26272d3c74ef2b32f47a0626ac6a05a4f5aa2b211aa1f497bea
-
SSDEEP
3072:UhaZZeBz7Jx6pJowqJbFW9cSBDQ0JNxpK:uaZZwXJcpCwZ9/i0/u
Malware Config
Signatures
Files
-
536fab5d841a14667317c7610ae99bb71fd4db6e9aa0e4ca78ef8d175a10f74f.exe windows x86
5b673ba0f4a8b0910934ce516137137b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
fflush
__CxxFrameHandler
??2@YAPAXI@Z
memmove
wcslen
wcsncpy
_wcslwr
wcscat
_snprintf
??1type_info@@UAE@XZ
?terminate@@YAXXZ
_strdup
_strnicmp
??3@YAXPAX@Z
strncpy
free
_CxxThrowException
_except_handler3
advapi32
FreeSid
RegEnumValueA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
EqualSid
GetTokenInformation
AllocateAndInitializeSid
RegEnumKeyA
RegCreateKeyExA
RegDeleteValueA
RegDeleteKeyA
RegQueryInfoKeyA
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
RegSetValueExA
kernel32
GetLocaleInfoA
GetThreadLocale
GetCurrentDirectoryA
IsDBCSLeadByte
GetACP
GetVersionExA
LocalFree
GetFileAttributesA
lstrcpyA
CloseHandle
CreateFileA
IsBadWritePtr
lstrlenA
lstrcpynA
OpenProcess
ReleaseMutex
GetLastError
CreateMutexA
WritePrivateProfileStringA
GetPrivateProfileStringA
lstrcmpiA
RemoveDirectoryA
GetPrivateProfileIntA
LocalAlloc
DeleteFileA
GetModuleFileNameA
FreeLibrary
LoadLibraryExA
CopyFileA
SetFileAttributesA
GetTempFileNameA
GetCurrentProcessId
GetTempPathA
ExitProcess
GetCommandLineA
GetModuleHandleA
Sleep
LoadLibraryA
TerminateProcess
GetCurrentProcess
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetSystemTimeAsFileTime
InterlockedExchange
SetLastError
IsBadReadPtr
GetLongPathNameA
CreateDirectoryA
lstrcmpA
FindFirstFileA
FindNextFileA
FindClose
GetSystemDirectoryA
GetWindowsDirectoryA
GetEnvironmentVariableA
FormatMessageA
GetExitCodeProcess
CreateProcessA
MoveFileA
WriteFile
user32
PostMessageA
wsprintfA
GetWindowThreadProcessId
DestroyWindow
CharUpperA
ExitWindowsEx
MsgWaitForMultipleObjects
PeekMessageA
TranslateMessage
DispatchMessageA
CharNextA
EnumChildWindows
MessageBoxA
FindWindowA
CreateDialogParamA
SetWindowTextA
LoadStringA
shell32
SHGetMalloc
SHGetPathFromIDListA
SHGetSpecialFolderLocation
SHGetSpecialFolderPathA
ole32
CoCreateInstance
CLSIDFromString
CoUninitialize
CoInitialize
shlwapi
StrCatBuffA
PathQuoteSpacesA
PathFileExistsA
PathAppendA
SHGetValueA
StrTrimA
StrToIntA
PathAddBackslashA
StrStrIA
wnsprintfA
StrChrA
StrCmpW
PathAddBackslashW
StrRChrW
PathRemoveFileSpecA
PathIsDirectoryW
PathIsDirectoryA
PathIsDirectoryEmptyA
StrStrA
StrCmpNIA
UrlCanonicalizeA
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
wininet
InternetSetCookieA
Sections
.text Size: 38KB - Virtual size: 37KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.text Size: 62KB - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE