Static task
static1
Behavioral task
behavioral1
Sample
0850ce1d818ddac1560a9769b4ea978f4eddeb2da3824b998872531ebf8cd8fa.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0850ce1d818ddac1560a9769b4ea978f4eddeb2da3824b998872531ebf8cd8fa.exe
Resource
win10v2004-20220812-en
General
-
Target
0850ce1d818ddac1560a9769b4ea978f4eddeb2da3824b998872531ebf8cd8fa
-
Size
289KB
-
MD5
20074fd1bc249e2668f0d52fa06610f0
-
SHA1
972b2ece8c030d9945b93f2550802af7f80145a6
-
SHA256
0850ce1d818ddac1560a9769b4ea978f4eddeb2da3824b998872531ebf8cd8fa
-
SHA512
828df29733a2547eb2cc92f934699851f2c2a676d846a8633952d7b226dfd8f73f8a691f84d02ca2cf24f91448a1dc23ed1c5acb9df2ba1dc6c0c025192dafef
-
SSDEEP
6144:YyFNL8c7G5J5GO73zHTcKNvgxKTQe4HpVkl5w:/1SzAOLzzcwvgxKTApil5w
Malware Config
Signatures
Files
-
0850ce1d818ddac1560a9769b4ea978f4eddeb2da3824b998872531ebf8cd8fa.exe windows x86
b6db75af9c9098e915164fdae2b852ca
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
MoveFileW
OutputDebugStringW
SetCurrentDirectoryA
ReleaseSemaphore
GetDriveTypeA
LoadLibraryExA
GetFullPathNameA
WriteProcessMemory
IsBadReadPtr
GetProfileStringA
GetSystemDirectoryW
ExitThread
WritePrivateProfileStructA
SetSystemTime
ScrollConsoleScreenBufferA
CompareStringW
SetEvent
PrepareTape
VirtualFree
DuplicateHandle
SetVolumeLabelA
CopyFileExW
GetFileAttributesA
MoveFileExA
WritePrivateProfileStringA
SetConsoleActiveScreenBuffer
UnmapViewOfFile
IsDBCSLeadByteEx
TlsGetValue
FindFirstFileW
GetOverlappedResult
EnumResourceLanguagesW
InitializeCriticalSection
SetCommTimeouts
ReadConsoleA
LeaveCriticalSection
GetLocaleInfoW
GetUserDefaultLCID
GetModuleHandleA
GetEnvironmentStringsW
CancelIo
GetUserDefaultLangID
FatalAppExitA
FreeLibraryAndExitThread
CreatePipe
lstrcmpiA
CreateDirectoryW
GetCommandLineA
lstrlenA
VirtualAlloc
GetStartupInfoA
ExitProcess
user32
GetMessagePos
UnregisterDeviceNotification
VkKeyScanW
SendMessageTimeoutW
SetScrollInfo
SendNotifyMessageA
EnumDesktopsW
IsChild
GrayStringA
LoadCursorW
GetClassInfoExA
SetUserObjectInformationW
LoadStringW
SetProcessDefaultLayout
SetLastErrorEx
InvalidateRect
UpdateWindow
CountClipboardFormats
GetMenuStringW
ReleaseCapture
PeekMessageW
CharLowerW
DestroyCaret
GetKeyboardLayoutNameW
SetThreadDesktop
GetWindow
OpenDesktopW
GetSubMenu
DefMDIChildProcW
EndDeferWindowPos
PeekMessageA
EnumDesktopWindows
GetUserObjectSecurity
SetCapture
BroadcastSystemMessageA
MsgWaitForMultipleObjectsEx
IsWindowUnicode
GetProcessWindowStation
PostMessageW
DefDlgProcA
SendMessageCallbackW
gdi32
GetTextExtentPointW
LineDDA
CreateICW
GetStretchBltMode
SetStretchBltMode
CreateMetaFileW
SetDIBColorTable
CreateMetaFileA
ArcTo
GetTextFaceA
EnumFontFamiliesA
GetCurrentPositionEx
SetPixelFormat
GetPixel
CreateDCA
comdlg32
CommDlgExtendedError
PageSetupDlgA
advapi32
SetThreadToken
RegCreateKeyA
ObjectCloseAuditAlarmW
InitializeAcl
GetPrivateObjectSecurity
CryptGetKeyParam
SetSecurityInfo
SetServiceObjectSecurity
OpenServiceA
CryptAcquireContextW
AccessCheckAndAuditAlarmA
LookupAccountSidA
GetSidIdentifierAuthority
BuildSecurityDescriptorW
GetSecurityDescriptorControl
RegOpenKeyW
IsValidSecurityDescriptor
InitiateSystemShutdownW
ReadEventLogW
IsValidAcl
ole32
CoTaskMemRealloc
RevokeDragDrop
OleCreateLink
oleaut32
SetErrorInfo
SafeArrayGetElement
VariantCopy
SafeArrayCreate
SysFreeString
SafeArrayRedim
SafeArrayUnaccessData
shlwapi
PathFindFileNameA
Sections
oousw Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
sgieoi Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
yekku Size: 268KB - Virtual size: 268KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
oqmeum Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ