tsk_init
Static task
static1
Behavioral task
behavioral1
Sample
24f6879afae3787d3e7e79184961dd74356d46b609d1a2fd25097b83720baf5d.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
24f6879afae3787d3e7e79184961dd74356d46b609d1a2fd25097b83720baf5d.exe
Resource
win10v2004-20220812-en
General
-
Target
24f6879afae3787d3e7e79184961dd74356d46b609d1a2fd25097b83720baf5d
-
Size
716KB
-
MD5
07867e18626bbd9bc35dab120342e6a0
-
SHA1
e041b5c8b852c19535fd1833c407440e406ebdf0
-
SHA256
24f6879afae3787d3e7e79184961dd74356d46b609d1a2fd25097b83720baf5d
-
SHA512
6094ac1e1068c641d140c768cde3e9231d5f2495a924cb969fe14d26cf44335cc96fdcb5ea6722ab5086e20965556d4f0d7641a5f5c23a9a958152ecc0f879ca
-
SSDEEP
12288:xws56lUIJFUQGMl+stG/RdI705oDR3vzFoaKFn9cpw:xF56lUIJFZl+CwHfoDRCn9F
Malware Config
Signatures
Files
-
24f6879afae3787d3e7e79184961dd74356d46b609d1a2fd25097b83720baf5d.exe windows x86
0143943eb28da839a351447cb1505ee3
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
OpenSemaphoreA
CreateSemaphoreA
FindFirstFileA
FindNextFileA
FindClose
SetLastError
GetTickCount
GetProcessTimes
GetCurrentProcess
GetVolumeInformationA
GetDriveTypeA
GlobalFree
GlobalAlloc
VirtualAlloc
VirtualFree
LocalFree
LocalAlloc
GetCurrentThread
CreateFileA
SetThreadPriority
ReadFile
WriteFile
DeviceIoControl
SleepEx
QueryPerformanceCounter
QueryPerformanceFrequency
GetPrivateProfileStringA
ReleaseSemaphore
GetExitCodeProcess
SetFileAttributesA
CreateMutexA
GetLastError
ReleaseMutex
SetHandleInformation
SetErrorMode
GetVersion
GetProcAddress
GetModuleHandleA
SetEvent
CreateEventA
ResetEvent
FreeLibrary
WaitForSingleObject
CloseHandle
Sleep
GetWindowsDirectoryA
GetVersionExA
GetCurrentProcessId
SetEndOfFile
GetLocaleInfoA
VirtualQuery
GetSystemInfo
VirtualProtect
CompareStringW
CompareStringA
SetStdHandle
InitializeCriticalSection
SetFilePointer
CreateProcessA
SetCurrentDirectoryA
GetCurrentDirectoryA
GetFullPathNameA
SetEnvironmentVariableW
SetEnvironmentVariableA
GetStringTypeW
GetPrivateProfileIntA
LoadLibraryA
GetStringTypeA
GetEnvironmentStringsW
EnterCriticalSection
LeaveCriticalSection
SetConsoleCtrlHandler
ExitProcess
TerminateProcess
HeapFree
CreateDirectoryA
HeapAlloc
HeapReAlloc
GetModuleFileNameA
GetSystemTimeAsFileTime
GetCommandLineA
MultiByteToWideChar
ExitThread
TlsSetValue
TlsGetValue
ResumeThread
CreateThread
FileTimeToSystemTime
FileTimeToLocalFileTime
GetFileAttributesA
DeleteFileA
RtlUnwind
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
UnhandledExceptionFilter
TlsFree
GetCurrentThreadId
TlsAlloc
HeapSize
HeapDestroy
HeapCreate
FlushFileBuffers
WideCharToMultiByte
LCMapStringA
LCMapStringW
GetTimeZoneInformation
GetACP
GetOEMCP
GetCPInfo
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
netapi32
Netbios
advapi32
RegEnumValueA
CloseServiceHandle
OpenSCManagerA
OpenServiceA
StartServiceA
CreateServiceA
RegEnumKeyExA
GetUserNameA
RegCloseKey
RegCreateKeyExA
RegDeleteValueA
RegSetValueExA
RegisterEventSourceA
ReportEventA
DeregisterEventSource
RegOpenKeyExA
RegQueryValueExA
user32
DialogBoxIndirectParamA
CreateDialogIndirectParamA
wsprintfA
GetSystemMetrics
GetClientRect
SetFocus
GetFocus
EndDialog
SetDlgItemTextA
GetDlgItemTextA
MessageBeep
SetWindowTextA
SendMessageA
GetDlgItem
GetWindowRect
EnableWindow
ShowWindow
ScreenToClient
MoveWindow
GetParent
GetActiveWindow
MessageBoxA
GetWindowLongA
comctl32
ord17
comdlg32
GetOpenFileNameA
Exports
Exports
Sections
.text Size: 448KB - Virtual size: 446KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 40KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 52KB - Virtual size: 97KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
_TEXT_HA Size: 68KB - Virtual size: 66KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 104KB - Virtual size: 124KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE