Static task
static1
Behavioral task
behavioral1
Sample
086603023be712976a4bed60fa9629191b58ca6fa4f1bd01de2e85075e2497c2.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
086603023be712976a4bed60fa9629191b58ca6fa4f1bd01de2e85075e2497c2.exe
Resource
win10v2004-20220812-en
General
-
Target
086603023be712976a4bed60fa9629191b58ca6fa4f1bd01de2e85075e2497c2
-
Size
1.6MB
-
MD5
a27d807d40140e6c6c49bd0342fbee22
-
SHA1
7f24b0af8da5a1f71e0de677b0deeec512bc4411
-
SHA256
086603023be712976a4bed60fa9629191b58ca6fa4f1bd01de2e85075e2497c2
-
SHA512
af87bf1e3efc3c1bb4f9ef835e5627fb5036b2e746242ced764789c4d40f5a36bc3bc3d67820bcf839456e88303e5cf4f9606e6d250a54a41426abc6136cd462
-
SSDEEP
49152:XlrYcVZ6zwjYO1PUaS6sp2dJcI+fxemazy6Wj/+zzejzEF:XOdom2y0ei
Malware Config
Signatures
Files
-
086603023be712976a4bed60fa9629191b58ca6fa4f1bd01de2e85075e2497c2.exe windows x86
b2293534a79ff9857a217a7bedd5f50e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
InitCommonControlsEx
shell32
SHBrowseForFolderW
SHGetFileInfoW
SHGetPathFromIDListW
ShellExecuteExW
SHGetMalloc
ShellExecuteW
CommandLineToArgvW
kernel32
FlushFileBuffers
WriteConsoleW
SetStdHandle
SetFilePointerEx
FreeLibrary
HeapAlloc
HeapFree
GetProcessHeap
LoadLibraryW
GetLastError
GetProcAddress
GetFileAttributesW
CloseHandle
GetCurrentProcess
GetModuleHandleW
GetVersionExW
CreateProcessW
WaitForSingleObject
InitializeCriticalSectionAndSpinCount
ExpandEnvironmentStringsW
GetModuleFileNameW
GetCurrentDirectoryW
SetCurrentDirectoryW
LocalFree
SetFileApisToOEM
GetEnvironmentVariableW
SetPriorityClass
GetCurrentThread
SetThreadPriority
GetCommandLineW
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
FindFirstFileW
FindClose
FindNextFileW
CreateFileW
GetLongPathNameW
GetCurrentThreadId
FindResourceW
LoadLibraryExW
SetEndOfFile
SetFileTime
WriteFile
VirtualAlloc
ResumeThread
WideCharToMultiByte
GetACP
MultiByteToWideChar
GetFileSize
SetFilePointer
ReadFile
GetFullPathNameW
GetTempFileNameW
MoveFileExW
CreateDirectoryW
lstrlenW
GetTempPathW
MoveFileW
RemoveDirectoryW
GetWindowsDirectoryW
DeleteFileW
SetFileAttributesW
SetEvent
Sleep
ResetEvent
CreateEventW
FileTimeToSystemTime
GetConsoleMode
GetConsoleCP
OutputDebugStringW
LCMapStringW
HeapReAlloc
GetStringTypeW
GetCPInfo
GetOEMCP
IsValidCodePage
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCurrentProcessId
QueryPerformanceCounter
GetFileType
GetStdHandle
GetStartupInfoW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
TerminateProcess
SetLastError
InterlockedExchangeAdd
VirtualFree
WaitForMultipleObjects
FormatMessageW
SetUnhandledExceptionFilter
UnhandledExceptionFilter
HeapSize
GetModuleHandleExW
ExitProcess
RtlUnwind
RaiseException
EncodePointer
DecodePointer
IsDebuggerPresent
IsProcessorFeaturePresent
GetSystemTimeAsFileTime
CreateThread
ExitThread
user32
KillTimer
TranslateMessage
IsDialogMessageW
LoadIconW
CreateDialogParamW
IsWindowVisible
EnableWindow
DispatchMessageW
DestroyIcon
IsWindow
ShowWindow
PostQuitMessage
GetWindowRect
PostMessageW
DialogBoxParamW
SetWindowPos
GetSystemMetrics
SetFocus
GetWindowTextW
GetDlgItem
EndDialog
SendMessageW
SetWindowTextW
GetMessageW
ScreenToClient
SetTimer
GetDesktopWindow
LoadStringW
MessageBoxW
gdi32
CreateSolidBrush
DeleteObject
ole32
CoInitialize
CoInitializeEx
CoUninitialize
CoCreateInstance
Sections
.text Size: 279KB - Virtual size: 278KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 71KB - Virtual size: 70KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 14KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 80KB - Virtual size: 79KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ