Static task
static1
Behavioral task
behavioral1
Sample
5522a185c1013caab380814c2ac91aaa53f19596f07d76af240ea3939db7baaf.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5522a185c1013caab380814c2ac91aaa53f19596f07d76af240ea3939db7baaf.exe
Resource
win10v2004-20220812-en
General
-
Target
5522a185c1013caab380814c2ac91aaa53f19596f07d76af240ea3939db7baaf
-
Size
124KB
-
MD5
2003946e6f86a7e3aca638077d1484c7
-
SHA1
41d3e2acaf369e718fdc9f9d7157cc4ab54435eb
-
SHA256
5522a185c1013caab380814c2ac91aaa53f19596f07d76af240ea3939db7baaf
-
SHA512
a4298575461571e58d854a49a9e6bb6c12a926d8fba8cf46163555b91947cbbb946a0bdcb9024f7b2c9b189a7c2de0583a90a48a3c22a3ef0eed28e671640b93
-
SSDEEP
3072:/KanxTLU4W4YgOkoEYVDFIstMIl4oUwHvTGI8SfJe:7nxTRrbOKYXjtjxvTg
Malware Config
Signatures
Files
-
5522a185c1013caab380814c2ac91aaa53f19596f07d76af240ea3939db7baaf.exe windows x86
6dcbed7755df563b14b8a0156232ead0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
AdjustTokenPrivileges
AllocateAndInitializeSid
EqualSid
FreeSid
GetTokenInformation
LookupPrivilegeValueA
OpenProcessToken
RegCloseKey
RegCreateKeyExA
RegDeleteValueA
RegOpenKeyExA
RegQueryInfoKeyA
RegQueryValueExA
RegSetValueExA
gdi32
GetDeviceCaps
user32
wsprintfA
ShowWindow
SetWindowTextA
SetWindowPos
SetWindowLongA
SetForegroundWindow
SetDlgItemTextA
SendMessageA
SendDlgItemMessageA
ReleaseDC
PeekMessageA
MsgWaitForMultipleObjects
MessageBoxA
MessageBeep
LoadStringA
GetWindowRect
GetWindowLongA
GetDlgItemTextA
GetDlgItem
GetDesktopWindow
GetDC
ExitWindowsEx
EndDialog
EnableWindow
DispatchMessageA
DialogBoxIndirectParamA
CharUpperA
CharPrevA
CharNextA
CallWindowProcA
kernel32
lstrlenA
lstrcpynA
lstrcpyA
lstrcmpiA
lstrcmpA
lstrcatA
_lopen
_llseek
_lclose
WritePrivateProfileStringA
WriteFile
WaitForSingleObject
VirtualProtectEx
VirtualFree
VirtualAlloc
Toolhelp32ReadProcessMemory
TerminateThread
TerminateJobObject
SizeofResource
SetThreadPriority
SetProcessPriorityBoost
SetFileTime
SetFilePointer
SetFileApisToANSI
SetEvent
SetCurrentDirectoryA
RtlUnwind
ResetEvent
RemoveDirectoryA
ReadFile
ReadConsoleOutputAttribute
AllocConsole
CloseHandle
CreateDirectoryA
CreateEventA
CreateFileA
CreateProcessA
CreateThread
DeleteFileA
DeleteTimerQueueEx
ExitProcess
ExpandEnvironmentStringsA
FindClose
FindFirstFileA
FindNextFileA
FindResourceA
FormatMessageA
FreeLibrary
FreeResource
GetACP
GetCommandLineA
GetCurrentDirectoryA
GetCurrentProcess
GetDiskFreeSpaceA
GetDriveTypeA
GetExitCodeProcess
GetFileTime
GetLastError
GetModuleFileNameA
GetModuleHandleA
GetNamedPipeInfo
GetPrivateProfileIntA
GetPrivateProfileStringA
GetProcAddress
GetProcessShutdownParameters
GetShortPathNameA
GetStartupInfoA
GetSystemDirectoryA
GetSystemInfo
GetTempFileNameA
GetTempPathA
GetVersion
GetVersionExA
GetVolumeInformationA
GetWindowsDirectoryA
GlobalAlloc
GlobalFree
GlobalLock
GlobalUnlock
Heap32ListFirst
IsProcessorFeaturePresent
LoadLibraryA
LoadLibraryExA
LoadResource
LocalAlloc
LocalFileTimeToFileTime
LocalFree
LocalHandle
LockResource
MulDiv
Sections
.text Size: 99KB - Virtual size: 98KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 385B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ