Static task
static1
Behavioral task
behavioral1
Sample
856330c88014973a6d2bc59b9b719501f3d0520a4c7ac4e446fef05e5a6d54eb.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
856330c88014973a6d2bc59b9b719501f3d0520a4c7ac4e446fef05e5a6d54eb.exe
Resource
win10v2004-20220812-en
General
-
Target
856330c88014973a6d2bc59b9b719501f3d0520a4c7ac4e446fef05e5a6d54eb
-
Size
97KB
-
MD5
122ca3165f3dc54ebf0b5aa74cfb074d
-
SHA1
bdc15417316f6e6a3ab099663f8e29b3964e5440
-
SHA256
856330c88014973a6d2bc59b9b719501f3d0520a4c7ac4e446fef05e5a6d54eb
-
SHA512
0ec2a59296a4db20bd8d1e5a40a79104650b9f50d982eac5dfa51c643cfe9714baf363f07dda034e3fd858e93ca014b9f6c2624f7e7b96895988ee0eeca1b1a7
-
SSDEEP
1536:q0ECEiVehL98YJk7nlfCTHGZ0JyIm54Z9Oq/Wc:q07Ven8YJkpCHNJyI64jOPc
Malware Config
Signatures
Files
-
856330c88014973a6d2bc59b9b719501f3d0520a4c7ac4e446fef05e5a6d54eb.exe windows x86
d67a47f5a24b521d0c3ec768f66fd42f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
??2@YAPAXI@Z
_vsnprintf
malloc
free
_ftol
_itow
??3@YAXPAX@Z
_except_handler3
wcsrchr
kernel32
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
GetCurrentProcessId
GetPrivateProfileIntA
GetTickCount
GetPrivateProfileStringW
GetPrivateProfileStringA
GetFullPathNameW
GetFullPathNameA
GetLocaleInfoA
lstrlenA
GetPrivateProfileIntW
GetCurrentThreadId
lstrcpyA
HeapReAlloc
HeapAlloc
GetProcessHeap
HeapFree
FreeLibrary
GetSystemDirectoryA
QueryPerformanceCounter
GetModuleHandleA
GetCommandLineW
GetCommandLineA
MultiByteToWideChar
ExitProcess
GetStdHandle
lstrlenW
WideCharToMultiByte
GetLastError
WriteConsoleW
WriteFile
GetFileType
GetFileSize
CreateFileW
CreateEventA
GetCPInfo
GetACP
FindClose
FindFirstFileA
GetFileAttributesA
FindFirstFileW
GetFileAttributesW
LocalFree
FormatMessageA
LocalAlloc
FormatMessageW
GetProcAddress
LoadLibraryA
InitializeCriticalSection
GetModuleFileNameA
GetModuleFileNameW
DeleteCriticalSection
SetEvent
CloseHandle
CreateThread
GetTempPathA
EnterCriticalSection
LeaveCriticalSection
GetVersionExA
InterlockedIncrement
InterlockedDecrement
GetUserDefaultLCID
FlushFileBuffers
CreateFileA
GetTempFileNameA
oleaut32
SysFreeString
SafeArrayCopy
LoadRegTypeLi
SafeArrayCreate
SafeArrayPutElement
SafeArrayDestroy
SafeArrayGetUBound
SafeArrayGetElement
VariantChangeType
LoadTypeLi
VariantInit
VariantCopy
VariantClear
SysAllocStringByteLen
SysAllocStringLen
CreateErrorInfo
SetErrorInfo
SysAllocString
SysStringLen
SafeArrayGetLBound
ole32
CreateFileMoniker
CoCreateInstance
CoInitializeSecurity
CreateBindCtx
CoRegisterMessageFilter
CLSIDFromString
CoInitialize
CoUninitialize
CoGetClassObject
MkParseDisplayName
CLSIDFromProgID
version
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueA
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueW
imm32
ImmGetDefaultIMEWnd
advapi32
RegSetValueExA
RegQueryValueExW
RegQueryValueExA
RegCreateKeyExW
RegCreateKeyExA
RegOpenKeyExW
RegOpenKeyExA
ImpersonateLoggedOnUser
IsTextUnicode
RegisterEventSourceW
GetUserNameW
LookupAccountNameW
ReportEventW
DeregisterEventSource
RegCloseKey
RegSetValueExW
user32
LoadStringA
LoadStringW
CharNextA
GetActiveWindow
GetClassInfoA
RegisterClassA
CreateWindowExA
GetMessageA
GetWindowLongA
SetWindowLongA
SetTimer
DefWindowProcA
PostQuitMessage
KillTimer
EnumThreadWindows
IsWindowVisible
PostMessageA
SendMessageA
MsgWaitForMultipleObjects
PeekMessageA
TranslateMessage
DispatchMessageA
GetParent
wsprintfW
wsprintfA
Sections
.text Size: 56KB - Virtual size: 52KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 492B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 33KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE