Static task
static1
Behavioral task
behavioral1
Sample
551010e930137365ea63a212d40b2fcb40b36b07d10fe6ffa5f09f58425922e4.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
551010e930137365ea63a212d40b2fcb40b36b07d10fe6ffa5f09f58425922e4.exe
Resource
win10v2004-20220812-en
General
-
Target
551010e930137365ea63a212d40b2fcb40b36b07d10fe6ffa5f09f58425922e4
-
Size
204KB
-
MD5
a36d710b07c30d239f7c4a4eb66b0786
-
SHA1
29585249d5b7aaa78d7317ea7e8abac9731842e2
-
SHA256
551010e930137365ea63a212d40b2fcb40b36b07d10fe6ffa5f09f58425922e4
-
SHA512
be22c6628e2f6e2ddefa9bb5efc809275436ef726499ec2d0600c65de671086e54076ade64c496a6422923e663c44e37b1e7f2537cee7230841e461d2495540b
-
SSDEEP
6144:GXyrsapDI7gEk56TO1fEFBhqNP1PdUvo1zwgO:2ygapDI7gp5aO1fuYNP1PdUQ1EF
Malware Config
Signatures
Files
-
551010e930137365ea63a212d40b2fcb40b36b07d10fe6ffa5f09f58425922e4.exe windows x86
0c34927403aa4e0c53a741a71f40bbf9
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
ReleaseDC
CheckDlgButton
IsWindowVisible
SetCursor
DefWindowProcW
GetDC
SetWindowLongW
SetDlgItemInt
LoadStringW
GetWindowLongW
CheckRadioButton
CreateDialogParamW
GetAsyncKeyState
EnableWindow
DispatchMessageW
InvalidateRect
LoadCursorW
GetWindowRect
IsRectEmpty
GetDlgItemInt
ClientToScreen
GetDesktopWindow
SendMessageW
SetDlgItemTextW
GetDlgItem
MoveWindow
DestroyWindow
ShowWindow
TranslateMessage
IsWindow
PeekMessageW
GetClientRect
kernel32
GetQueuedCompletionStatus
CreateThread
LoadLibraryW
WaitForMultipleObjects
GetProfileIntA
DeleteFileW
HeapFree
SetFilePointer
GetProcessHeap
CreateSemaphoreW
QueryPerformanceCounter
VirtualFree
CloseHandle
GetCurrentThread
lstrcpyW
lstrlenW
GetSystemDefaultLangID
WideCharToMultiByte
GetPrivateProfileStringW
GetFullPathNameW
lstrcmpW
WriteFile
GlobalMemoryStatus
lstrcmpiW
ReadFile
GetCurrentProcess
LeaveCriticalSection
GlobalHandle
IsBadReadPtr
ReleaseSemaphore
GetACP
FreeLibrary
GlobalFree
lstrcpynW
HeapAlloc
InterlockedIncrement
GlobalUnlock
InterlockedExchange
GetCurrentProcessId
GlobalLock
GetDiskFreeSpaceW
SetEndOfFile
SetEvent
GetThreadPriority
GetSystemTimeAsFileTime
CreateEventW
InitializeCriticalSection
GetTickCount
DeleteCriticalSection
GlobalAlloc
SetThreadPriority
GetProcAddress
SetUnhandledExceptionFilter
GetVersionExW
MultiByteToWideChar
GetFileSize
IsBadWritePtr
lstrcpyA
GetSystemInfo
CreateFileW
MulDiv
IsBadCodePtr
EnterCriticalSection
ResetEvent
GetModuleFileNameA
GetTimeZoneInformation
GetLastError
GetFileAttributesW
InterlockedDecrement
lstrlenA
WaitForSingleObject
cfgmgr32
CMP_Init_Detection
CMP_WaitServicesAvailable
CMP_Report_LogOn
CM_Add_Empty_Log_Conf
CMP_WaitNoPendingInstallEvents
ifsutil
?AddEntry@AUTOREG@@SGEPBVWSTRING@@@Z
?AddNext@NUMBER_SET@@QAEEVBIG_INT@@@Z
?AddEdge@DIGRAPH@@QAEEKK@Z
?AddStart@NUMBER_SET@@QAEEVBIG_INT@@@Z
?CheckAndAdd@NUMBER_SET@@QAEEVBIG_INT@@PAE@Z
?CheckAndRemove@NUMBER_SET@@QAEEVBIG_INT@@PAE@Z
?CheckAndAdd@SPARSE_SET@@QAEEVBIG_INT@@PAE@Z
?AddVolumeName@MOUNT_POINT_MAP@@QAEEPAVWSTRING@@0@Z
nddeapi
NDdeGetTrustedShareA
NDdeGetTrustedShareW
NDdeGetShareSecurityA
NDdeGetShareSecurityW
NDdeGetErrorStringA
NDdeIsValidAppTopicListW
NDdeIsValidAppTopicListA
cewmdm
DllGetClassObject
DllUnregisterServer
DllCanUnloadNow
DllRegisterServer
Sections
.text Size: 79KB - Virtual size: 78KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 59KB - Virtual size: 58KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 62KB - Virtual size: 2.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 836B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ