Static task
static1
Behavioral task
behavioral1
Sample
9dfbe66d2e3260b6e0ea13d91a41471b4bc6c53f57f2a257a1e3b75c8ac64c95.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9dfbe66d2e3260b6e0ea13d91a41471b4bc6c53f57f2a257a1e3b75c8ac64c95.exe
Resource
win10v2004-20220812-en
General
-
Target
9dfbe66d2e3260b6e0ea13d91a41471b4bc6c53f57f2a257a1e3b75c8ac64c95
-
Size
376KB
-
MD5
0e760390dea2fd085d2ed20f87cb5bc9
-
SHA1
b2cd2babd97a7564dd2029d3bd7697a9b90227ef
-
SHA256
9dfbe66d2e3260b6e0ea13d91a41471b4bc6c53f57f2a257a1e3b75c8ac64c95
-
SHA512
86b9569c5803a3c4002505b8ea235e0901eb477d88a8df2640b473eb1407d33a18b1e0573957b67da57f235760b4a9a7cd05c0723c6c0f7f58317e87e74f2ba6
-
SSDEEP
6144:eFC+dMVyVIWvEqZEeA2DgDQdV4BQ+i4EOEhBe:eLvEuEeA2DSQsG77hBe
Malware Config
Signatures
Files
-
9dfbe66d2e3260b6e0ea13d91a41471b4bc6c53f57f2a257a1e3b75c8ac64c95.exe windows x86
cd31475f539165c11825fcbeb71a09a3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
version
VerQueryValueA
GetFileVersionInfoSizeA
GetFileVersionInfoA
setupapi
SetupCloseInfFile
SetupGetLineTextA
SetupFindFirstLineA
SetupOpenInfFileA
SetupGetStringFieldA
SetupFindNextLine
kernel32
ExitProcess
RtlUnwind
ExitThread
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RaiseException
GetCommandLineA
GetStartupInfoA
HeapAlloc
HeapFree
VirtualAlloc
HeapReAlloc
HeapSize
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetACP
IsValidCodePage
GetConsoleCP
GetConsoleMode
LCMapStringA
LCMapStringW
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapCreate
VirtualFree
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetStringTypeA
GetStringTypeW
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetExitCodeProcess
CreateProcessA
GetProcessHeap
CompareStringW
SetEnvironmentVariableA
GetOEMCP
GetCPInfo
GetLocaleInfoA
InterlockedExchange
GlobalFlags
SetEndOfFile
SetFilePointer
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
lstrcmpW
lstrcmpA
GlobalGetAtomNameA
InterlockedIncrement
GetModuleHandleW
CompareStringA
GetCurrentThreadId
FormatMessageA
MultiByteToWideChar
lstrlenA
GetCurrentProcessId
WideCharToMultiByte
FindResourceA
InterlockedDecrement
GetModuleHandleA
TlsFree
GlobalFree
LocalReAlloc
TlsSetValue
TlsAlloc
GlobalAlloc
GlobalHandle
GlobalUnlock
GlobalReAlloc
GlobalLock
TlsGetValue
LocalAlloc
SetLastError
OutputDebugStringA
OpenSemaphoreA
GetVersionExA
DeleteCriticalSection
InitializeCriticalSection
CreateNamedPipeA
ConnectNamedPipe
CreateThread
WaitForSingleObject
WaitForMultipleObjects
SetEvent
LoadLibraryA
GetModuleFileNameA
GetWindowsDirectoryA
FindNextFileA
DeleteFileA
MoveFileA
ExpandEnvironmentStringsA
CreateDirectoryA
FindClose
LocalFree
GetCurrentProcess
FindResourceExA
LoadResource
SizeofResource
LockResource
FreeResource
GetFileAttributesExA
LeaveCriticalSection
EnterCriticalSection
GetFileAttributesA
Sleep
WaitNamedPipeA
SetNamedPipeHandleState
FlushFileBuffers
DisconnectNamedPipe
GetLastError
WriteFile
CreateFileA
FreeLibrary
ReadFile
GetTickCount
FindFirstFileA
GetProcAddress
CreateEventA
ResetEvent
CloseHandle
GetSystemTime
SystemTimeToFileTime
user32
PostQuitMessage
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
DestroyMenu
ClientToScreen
SetWindowTextA
RegisterWindowMessageA
LoadIconA
WinHelpA
GetCapture
GetClassLongA
GetClassNameA
SetPropA
GetPropA
RemovePropA
IsWindow
GetForegroundWindow
GetDlgItem
GetTopWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetMenu
GetClientRect
PostMessageA
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
CopyRect
PtInRect
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
GetMenu
SetWindowLongA
SetWindowPos
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowRect
GetWindow
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
GetFocus
ModifyMenuA
EnableMenuItem
CheckMenuItem
GetWindowTextA
LoadCursorA
GetDC
ReleaseDC
GetSysColor
GetSysColorBrush
SetWindowsHookExA
CallNextHookEx
DispatchMessageA
DestroyWindow
GetKeyState
PeekMessageA
ValidateRect
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
GetWindowThreadProcessId
SendMessageA
GetParent
GetWindowLongA
GetLastActivePopup
IsWindowEnabled
EnableWindow
UnhookWindowsHookEx
UnregisterDeviceNotification
RegisterDeviceNotificationA
MessageBoxA
GetSystemMetrics
SetForegroundWindow
gdi32
GetStockObject
DeleteDC
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
TextOutA
RectVisible
PtVisible
DeleteObject
SetBkColor
SetTextColor
GetClipBox
CreateBitmap
GetDeviceCaps
SetMapMode
RestoreDC
SaveDC
ExtTextOutA
winspool.drv
ClosePrinter
OpenPrinterA
DocumentPropertiesA
advapi32
SetServiceStatus
RegisterServiceCtrlHandlerExA
StartServiceCtrlDispatcherA
DeleteService
CreateServiceA
ChangeServiceConfig2A
ControlService
StartServiceA
QueryServiceStatus
CloseServiceHandle
OpenSCManagerA
OpenServiceA
RegCreateKeyExA
RegDeleteValueA
AllocateAndInitializeSid
SetEntriesInAclA
SetNamedSecurityInfoA
FreeSid
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegOpenKeyExA
RegOpenKeyA
RegQueryValueExA
RegCreateKeyA
RegSetValueExA
RegCloseKey
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
oleaut32
VariantChangeType
VariantClear
VariantInit
Sections
.text Size: 159KB - Virtual size: 159KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 175KB - Virtual size: 175KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ