Static task
static1
Behavioral task
behavioral1
Sample
d0810ada4c2bf14d08dd63fb4d437f9c38a0e595c3c6c5df1531941bc4b1f315.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d0810ada4c2bf14d08dd63fb4d437f9c38a0e595c3c6c5df1531941bc4b1f315.exe
Resource
win10v2004-20220901-en
General
-
Target
d0810ada4c2bf14d08dd63fb4d437f9c38a0e595c3c6c5df1531941bc4b1f315
-
Size
1.3MB
-
MD5
84d7e4d83d2a654ef25f379574a8ab90
-
SHA1
f3d1bed19210ea2c7f2ee7ccfce99b7c87a704ed
-
SHA256
d0810ada4c2bf14d08dd63fb4d437f9c38a0e595c3c6c5df1531941bc4b1f315
-
SHA512
aa82fc277157291fc5316a30b9b921614f952e39df823fd54d6d521473e3d98727713587249c6fe17550372e8a5903e3722cd2d43f83b6e9db6962ffd5a97521
-
SSDEEP
12288:g9OBVUBkxhKp3h3ZKf9Oq94aN3sHJwEehiX/ASGax3gx3+iE1wpje:EOeWhah3ZKf9OQpqqEKpSrQ3+Jwg
Malware Config
Signatures
Files
-
d0810ada4c2bf14d08dd63fb4d437f9c38a0e595c3c6c5df1531941bc4b1f315.exe windows x86
870dbc429f6639b102ebb44b80ef5f5e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
AddAuditAccessAceEx
QueryTraceA
ConvertStringSDToSDRootDomainW
CryptHashData
LookupAccountSidW
SaferIdentifyLevel
LsaOpenAccount
gdi32
EndDoc
GetRasterizerCaps
UpdateICMRegKeyA
GdiConvertPalette
CreateBrushIndirect
kernel32
InterlockedCompareExchange
InterlockedExchange
LocalAlloc
LocalFree
Sleep
DisableThreadLibraryCalls
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
GetTickCount
QueryPerformanceCounter
CloseHandle
CreateDirectoryA
CreateFileA
CreateProcessA
DeleteFileA
DeviceIoControl
EnterCriticalSection
ExitThread
FileTimeToDosDateTime
FileTimeToLocalFileTime
FindClose
FindFirstFileA
FindFirstFileW
FindNextFileA
FindNextFileW
GetCurrentDirectoryW
GetDriveTypeA
GetFileAttributesA
GetFileAttributesW
GetFileSize
GetLastError
GlobalFree
GlobalLock
GlobalUnlock
InitializeCriticalSection
InterlockedDecrement
InterlockedIncrement
IsDBCSLeadByte
LCMapStringA
LeaveCriticalSection
ReadFile
RemoveDirectoryW
SetCurrentDirectoryW
SetFileAttributesW
SetFilePointer
TlsGetValue
WideCharToMultiByte
WriteConsoleOutputCharacterA
WriteFile
lstrcatA
lstrcatW
lstrcmpA
lstrcmpW
lstrcmpiA
lstrcpyA
lstrcpyW
lstrcpynA
lstrcpynW
lstrlenA
lstrlenW
DebugBreak
GetCurrentProcess
GetProcAddress
GetVersionExA
LoadLibraryA
MultiByteToWideChar
SetUnhandledExceptionFilter
SystemTimeToFileTime
TerminateProcess
VirtualAlloc
GetModuleHandleW
ExitProcess
DecodePointer
HeapFree
HeapAlloc
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
GetStartupInfoW
DeleteCriticalSection
EncodePointer
SetConsoleCtrlHandler
FindFirstFileExA
ReadConsoleInputA
SetConsoleMode
GetConsoleMode
PeekConsoleInputA
GetNumberOfConsoleInputEvents
GetLocalTime
GetModuleFileNameA
GetCommandLineA
HeapSetInformation
FatalAppExitA
FreeLibrary
LoadLibraryW
GetLocaleInfoW
UnhandledExceptionFilter
IsDebuggerPresent
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThread
GetModuleFileNameW
HeapCreate
HeapDestroy
IsProcessorFeaturePresent
RaiseException
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
WriteConsoleW
ReadConsoleInputW
GetStringTypeW
FileTimeToSystemTime
CreateFileW
GetTimeZoneInformation
SetStdHandle
CompareStringW
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapSize
RtlUnwind
HeapReAlloc
LCMapStringW
GetConsoleCP
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
FlushFileBuffers
SetEnvironmentVariableA
ole32
CLSIDFromString
WriteClassStm
ReleaseStgMedium
HMENU_UserMarshal
CoUninitialize
CoTestCancel
CoTaskMemAlloc
CoSuspendClassObjects
oleaut32
SafeArrayDestroyDescriptor
VarCyFromUI4
VarBstrFromR8
shell32
SHChangeNotify
SHGetPathFromIDListW
SHSetUnreadMailCountW
Sections
.text Size: 259KB - Virtual size: 259KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 29KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1.0MB - Virtual size: 1.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE