Static task
static1
Behavioral task
behavioral1
Sample
d8c134fdbaceb269abb234ae40795a65a79bbd255aab9aeaa2695657acae145b.exe
Resource
win7-20220812-en
General
-
Target
d8c134fdbaceb269abb234ae40795a65a79bbd255aab9aeaa2695657acae145b
-
Size
619KB
-
MD5
1357bb6ea174967fc1924ef87ce0bd00
-
SHA1
b2cd1d9a79dfae38940f7236838c2e8e4c8f24d9
-
SHA256
d8c134fdbaceb269abb234ae40795a65a79bbd255aab9aeaa2695657acae145b
-
SHA512
df943138b08dbd8e5bfd43856f6828ee430c3b55401959993bd858cef6770f9614fe386312ba5888d282113bfb63a6e16dedb98b583053956967afd87f7a2056
-
SSDEEP
12288:+5dzWu0bpYm0XqJufXSYOOXWD9BqCW+gYJysBfMw/ADCZpPjGRs32aJ:MdyFjyfXSY2q+VwsBEw/ADGSsma
Malware Config
Signatures
Files
-
d8c134fdbaceb269abb234ae40795a65a79bbd255aab9aeaa2695657acae145b.exe windows x86
89d1eec41e31d8f9c3ad9b720ab4e0b0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mfc110u
ord7505
ord1463
ord8230
ord12085
ord10278
ord12760
ord12697
ord4528
ord8169
ord5233
ord2432
ord12375
ord12374
ord14409
ord7770
ord14415
ord9248
ord4093
ord4031
ord12779
ord7789
ord1985
ord11821
ord11820
ord14287
ord12364
ord7847
ord14487
ord6218
ord14489
ord6220
ord14488
ord6219
ord989
ord6723
ord3794
ord5789
ord12077
ord8062
ord12089
ord12057
ord5638
ord10095
ord4992
ord2404
ord3791
ord2164
ord2297
ord7506
ord6091
ord13577
ord3250
ord3247
ord10100
ord8055
ord2707
ord1467
ord10130
ord10132
ord10131
ord10129
ord10133
ord5528
ord11563
ord11564
ord8990
ord11927
ord3780
ord3775
ord11774
ord14408
ord8816
ord12058
ord6840
ord10847
ord9106
ord3211
ord13699
ord12097
ord8314
ord1707
ord1716
ord1724
ord1720
ord1729
ord4858
ord4895
ord4866
ord4878
ord4874
ord4870
ord4901
ord4891
ord4862
ord4905
ord4883
ord4847
ord4853
ord4886
ord4441
ord5664
ord9541
ord4433
ord3000
ord14410
ord7771
ord14416
ord6739
ord11555
ord13524
ord5806
ord2628
ord11962
ord3882
ord3316
ord3317
ord3210
ord12006
ord996
ord6728
ord5128
ord5425
ord5635
ord9200
ord5401
ord5131
ord5287
ord5109
ord7572
ord7573
ord7563
ord5285
ord8064
ord9059
ord8599
ord4168
ord14198
ord2472
ord4824
ord3873
ord6477
ord2194
ord1684
ord290
ord1441
ord13078
ord968
ord4754
ord8204
ord12716
ord7879
ord3788
ord12095
ord5792
ord1683
ord1680
ord1517
ord1516
ord1514
ord1039
ord286
ord280
ord285
ord296
ord2954
ord14141
ord8027
ord5755
ord4991
ord1654
ord1040
ord306
ord4993
ord2335
ord2329
ord2331
ord1502
ord1504
ord2355
msvcr110
_waccess
_vsnwprintf_s
_purecall
_wfopen
_wsplitpath
fclose
fflush
fwrite
memmove_s
memcpy_s
wcsrchr
memset
memcpy
__CxxFrameHandler3
_CxxThrowException
_time64
_localtime64_s
_wcsicmp
free
_except_handler4_common
_controlfp_s
_invoke_watson
__crtSetUnhandledExceptionFilter
?terminate@@YAXXZ
??1type_info@@UAE@XZ
__crtTerminateProcess
__crtUnhandledException
_crt_debugger_hook
_onexit
__dllonexit
_calloc_crt
_unlock
_lock
_commode
_fmode
_wcmdln
_initterm
_initterm_e
__setusermatherr
_configthreadlocale
_cexit
_exit
exit
__set_app_type
__wgetmainargs
_amsg_exit
__crtGetShowWindowMode
_XcptFilter
_beginthreadex
malloc
calloc
memmove
kernel32
GetModuleFileNameW
WaitForSingleObject
CreateMutexW
EncodePointer
DecodePointer
LoadLibraryExW
IsProcessorFeaturePresent
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetCurrentProcess
FreeLibrary
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
GetVersionExW
FindNextFileW
FindFirstFileW
OutputDebugStringW
GetModuleHandleW
GetLocalTime
CloseHandle
FindClose
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
CreateEventW
GetLastError
GetCurrentThreadId
TerminateProcess
GetCurrentProcessId
IsDebuggerPresent
GetProcAddress
user32
MessageBoxW
GetCursorPos
LoadIconW
GetSubMenu
LoadMenuW
EnableWindow
FindWindowW
SetForegroundWindow
PostMessageW
GetSystemMetrics
advapi32
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
CheckTokenMembership
RegCloseKey
RegOpenKeyW
RegQueryValueExW
GetUserNameW
IsValidSid
GetSidLengthRequired
InitializeSid
GetSidSubAuthority
GetLengthSid
CopySid
InitializeAcl
GetAclInformation
AddAce
GetSecurityDescriptorLength
GetSecurityDescriptorControl
GetSecurityDescriptorDacl
GetSecurityDescriptorSacl
GetSecurityDescriptorOwner
GetSecurityDescriptorGroup
MakeSelfRelativeSD
MakeAbsoluteSD
RegCreateKeyW
RegSetValueExW
AllocateAndInitializeSid
FreeSid
shell32
SHGetSpecialFolderPathW
ShellExecuteExW
oleaut32
VariantTimeToSystemTime
SystemTimeToVariantTime
msvcp110
?_Winerror_map@std@@YAPBDH@Z
?_Syserror_map@std@@YAPBDH@Z
?_Xout_of_range@std@@YAXPBD@Z
?_Xbad_alloc@std@@YAXXZ
?_Xlength_error@std@@YAXPBD@Z
Sections
.text Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 564KB - Virtual size: 2.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE