Static task
static1
Behavioral task
behavioral1
Sample
b435cca3aa87a9039c356fd6a6ad4f44fd49fecb62e9e033b192d1c0e4703192.exe
Resource
win7-20220812-en
General
-
Target
b435cca3aa87a9039c356fd6a6ad4f44fd49fecb62e9e033b192d1c0e4703192
-
Size
989KB
-
MD5
2842b381e92ef55655e870a35ecc1930
-
SHA1
656fb8aa09e8c6caba91517362a1a07098100d08
-
SHA256
b435cca3aa87a9039c356fd6a6ad4f44fd49fecb62e9e033b192d1c0e4703192
-
SHA512
6c29ca0ddc16a8f10c5ff153eec6c618a572ebd9ec343504019c0431eff24f78ad22eed7be4341bcfcb5163f1ba2c34284b074fbb424a8baca54d2c796a36ad9
-
SSDEEP
24576:gA4rYi0P4JNulwedHtF9rK4Ekh+dQkDNvn:R4JNulwgtH7EzVvn
Malware Config
Signatures
Files
-
b435cca3aa87a9039c356fd6a6ad4f44fd49fecb62e9e033b192d1c0e4703192.exe windows x86
3afa07517e1407f34bbba2dca1826a27
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Imports
version
GetFileVersionInfoW
GetFileVersionInfoSizeW
VerQueryValueW
ws2_32
ntohl
winmm
timeGetTime
shlwapi
SHStrDupW
UrlCanonicalizeW
advapi32
RegEnumValueW
LookupAccountSidW
SetSecurityInfo
GetSecurityDescriptorSacl
RegEnumValueA
SystemFunction036
RegisterTraceGuidsW
GetTraceEnableLevel
UnregisterTraceGuids
TraceEvent
GetTraceLoggerHandle
GetTraceEnableFlags
OpenProcessToken
AdjustTokenPrivileges
LookupPrivilegeValueW
RegLoadKeyW
RegUnLoadKeyW
GetUserNameW
RegQueryValueExW
RegSetValueExW
GetFileSecurityW
SetFileSecurityW
ConvertStringSecurityDescriptorToSecurityDescriptorW
ConvertSecurityDescriptorToStringSecurityDescriptorW
RegEnumKeyExW
RegQueryInfoKeyW
RegCreateKeyExW
RegDeleteKeyW
RegDeleteValueW
RegOpenKeyExW
RegCloseKey
CreateProcessAsUserW
GetTokenInformation
ConvertSidToStringSidW
GetSidSubAuthority
GetSidSubAuthorityCount
kernel32
GetUserDefaultLCID
EnumSystemLocalesW
HeapSize
GetEnvironmentStringsW
FreeEnvironmentStringsW
IsValidCodePage
GetACP
GetOEMCP
GetTimeZoneInformation
WriteConsoleW
ReadConsoleW
OutputDebugStringW
GetDriveTypeW
FileTimeToSystemTime
GetLastError
FreeLibrary
GetProcAddress
LoadLibraryW
GetCurrentProcess
GetModuleFileNameW
ExpandEnvironmentStringsW
CloseHandle
QueueUserAPC
TerminateProcess
ResumeThread
CreateProcessW
SetPriorityClass
GetPriorityClass
VirtualAllocEx
WriteProcessMemory
GetModuleHandleW
WaitForSingleObject
OpenProcess
CreateFileW
ReadFile
SetFilePointer
SetFileTime
WriteFile
VerSetConditionMask
GetShortPathNameW
VerifyVersionInfoW
GetExitCodeProcess
GetFileAttributesW
GetFileAttributesExW
MoveFileExW
GetFileInformationByHandle
GetDateFormatW
DecodePointer
RaiseException
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
LoadResource
LockResource
SizeofResource
FindResourceW
DuplicateHandle
GetCurrentThreadId
RemoveDirectoryW
GetSystemTimeAsFileTime
LocalFree
WTSGetActiveConsoleSessionId
LoadLibraryExW
CreateMutexW
GetTickCount
FormatMessageA
SetLastError
OutputDebugStringA
ReleaseMutex
DeleteFileW
GetCurrentProcessId
GetTempFileNameW
MapViewOfFile
UnmapViewOfFile
CreateDirectoryW
CopyFileW
GetTempPathW
GetCurrentDirectoryW
GetLongPathNameW
CreateFileMappingW
SetCurrentDirectoryW
SetFileAttributesW
GetCommandLineW
IsDebuggerPresent
GetNativeSystemInfo
InterlockedCompareExchange
GetVersionExW
GetModuleHandleA
GetUserDefaultLangID
AssignProcessToJobObject
GetStdHandle
GetEnvironmentVariableW
FindFirstFileW
FindFirstFileExW
FindClose
FindNextFileW
SetEnvironmentVariableW
SetEndOfFile
SetFilePointerEx
FlushFileBuffers
GetFileSizeEx
QueryPerformanceCounter
SetEnvironmentVariableA
InterlockedExchange
QueryPerformanceFrequency
RtlCaptureStackBackTrace
GetLocaleInfoW
GetUserDefaultUILanguage
Sleep
LeaveCriticalSection
EnterCriticalSection
GetSystemDirectoryW
GetWindowsDirectoryW
GetModuleHandleExW
Process32FirstW
Process32NextW
CreateToolhelp32Snapshot
TlsGetValue
TlsSetValue
TlsAlloc
TlsFree
SetUnhandledExceptionFilter
IsValidLocale
LCMapStringW
CompareStringW
GetStartupInfoW
UnhandledExceptionFilter
GetCPInfo
RtlUnwind
PeekNamedPipe
FileTimeToLocalFileTime
HeapReAlloc
GetProcessHeap
HeapAlloc
ExitProcess
GetFileType
SetStdHandle
GetFullPathNameW
GetConsoleMode
GetConsoleCP
HeapFree
IsProcessorFeaturePresent
GetStringTypeW
MultiByteToWideChar
EncodePointer
WideCharToMultiByte
LoadLibraryExA
ole32
PropVariantClear
CoTaskMemFree
CoCreateInstance
CoCreateGuid
CLSIDFromString
CoUninitialize
StringFromGUID2
CoInitializeEx
oleaut32
SysFreeString
VariantInit
SysStringLen
VariantClear
SysAllocString
user32
CharUpperW
LoadIconW
CallNextHookEx
MoveWindow
DestroyWindow
CreateWindowExW
GetWindowThreadProcessId
FindWindowW
IsWindow
SendMessageTimeoutW
MessageBoxW
UnhookWindowsHookEx
SetWindowsHookExW
SetWindowLongW
GetWindowLongW
SendMessageW
GetMonitorInfoW
MonitorFromWindow
SetForegroundWindow
urlmon
CreateURLMonikerEx
wtsapi32
WTSQueryUserToken
userenv
DestroyEnvironmentBlock
CreateEnvironmentBlock
Sections
.text Size: 531KB - Virtual size: 530KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 115KB - Virtual size: 114KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 2B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 218KB - Virtual size: 217KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.text Size: 97KB - Virtual size: 100KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE