Static task
static1
Behavioral task
behavioral1
Sample
96d75b7e3250258941efd9fa66411962669b5011208f055cc7f22509fb40b591.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
96d75b7e3250258941efd9fa66411962669b5011208f055cc7f22509fb40b591.exe
Resource
win10v2004-20220812-en
General
-
Target
96d75b7e3250258941efd9fa66411962669b5011208f055cc7f22509fb40b591
-
Size
562KB
-
MD5
0a96dbef210ab3791a8677eb8968232e
-
SHA1
aecff1c09c33ad6f97afce62c1d70300590bd88f
-
SHA256
96d75b7e3250258941efd9fa66411962669b5011208f055cc7f22509fb40b591
-
SHA512
7ea5ef3df4098da036e8ef0b7d79386c80ed49a9ba2ae074eb63863c2bf4164b20cdb019cced1e036eef30e1876028625d7c40ec97f7eb207e9a21f1358928d8
-
SSDEEP
12288:FHYCGkvLabbO6RHbfSkd0XPdfCbCuXRZ3V0fbrh:FxNLajHbfSkkdQnXRZ3+fb9
Malware Config
Signatures
Files
-
96d75b7e3250258941efd9fa66411962669b5011208f055cc7f22509fb40b591.exe windows x86
14f6f24d408c20c6820748c2b366c4c2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
SHFreeNameMappings
advapi32
CryptGenKey
GetUserNameA
RegEnumValueA
AbortSystemShutdownW
LookupAccountSidW
RegSetValueExA
CryptGetUserKey
RegReplaceKeyA
StartServiceA
RegOpenKeyExW
LookupAccountSidA
RegConnectRegistryA
RegQueryValueExA
CryptSetProviderExA
CryptDecrypt
CryptEnumProviderTypesW
LookupSecurityDescriptorPartsA
RegEnumKeyA
RegDeleteValueW
CryptSignHashW
comctl32
CreateStatusWindowA
InitCommonControlsEx
ImageList_SetFlags
ImageList_SetIconSize
kernel32
CompareStringA
GetStartupInfoA
ReadConsoleA
VirtualQuery
HeapFree
GetCommandLineA
SuspendThread
lstrlen
TlsGetValue
FreeEnvironmentStringsA
WriteFileEx
CreateSemaphoreW
HeapCreate
MultiByteToWideChar
GetFileType
ResumeThread
SetLocalTime
GetLastError
GetPrivateProfileIntA
SetStdHandle
RtlZeroMemory
DeleteCriticalSection
GetProcessShutdownParameters
WriteProfileStringW
GetFileAttributesA
SetVolumeLabelA
FillConsoleOutputCharacterW
GetCurrentProcess
VirtualAlloc
GetUserDefaultLangID
TlsAlloc
EnumSystemLocalesA
CreateMutexA
EnumCalendarInfoW
VirtualProtect
CloseHandle
GetSystemInfo
GetStdHandle
EnterCriticalSection
GetPrivateProfileSectionNamesW
IsValidLocale
SetConsoleTitleA
GetLocaleInfoW
GetFullPathNameW
GetCommandLineW
GetProfileStringW
GetProcAddress
GetTimeFormatA
VirtualFree
ReadFile
LocalLock
CreateMutexW
GetACP
MoveFileA
GetCPInfo
SetEvent
SetFileTime
CompareStringW
SetFilePointer
IsBadWritePtr
OpenMutexA
GetLocaleInfoA
WriteFile
ReadFileEx
GetUserDefaultLCID
GetDiskFreeSpaceW
ExpandEnvironmentStringsA
ExitProcess
TlsFree
SetHandleCount
LCMapStringW
CreateDirectoryExW
GetStringTypeW
CommConfigDialogA
GetStringTypeA
ConnectNamedPipe
GlobalFindAtomA
GetStartupInfoW
GetWindowsDirectoryA
TerminateProcess
GetLongPathNameA
GetModuleFileNameW
GetPrivateProfileSectionW
GetTimeZoneInformation
CreateProcessW
GetCurrentThreadId
GetOEMCP
UnlockFile
SetConsoleActiveScreenBuffer
WideCharToMultiByte
EnumTimeFormatsW
LCMapStringA
GetVersionExA
GetDriveTypeA
GlobalHandle
GetSystemTimeAsFileTime
GetEnvironmentStrings
SetConsoleScreenBufferSize
HeapDestroy
WaitNamedPipeW
HeapAlloc
HeapReAlloc
QueryPerformanceCounter
SetLastError
FlushFileBuffers
InterlockedExchange
GetModuleHandleA
RtlUnwind
FindAtomA
GetTickCount
TlsSetValue
GetEnvironmentStringsW
GetDateFormatA
FindNextFileA
GetFileAttributesExA
MoveFileExW
lstrcmpi
SetPriorityClass
MoveFileW
GetCurrentProcessId
LeaveCriticalSection
EnumSystemLocalesW
IsValidCodePage
FreeEnvironmentStringsW
lstrcpyn
GlobalGetAtomNameA
GetCurrentThread
GetModuleFileNameA
WritePrivateProfileSectionA
SetEnvironmentVariableA
UnhandledExceptionFilter
HeapSize
LoadLibraryA
GetSystemDirectoryW
FindResourceA
FreeLibraryAndExitThread
EnumTimeFormatsA
InitializeCriticalSection
user32
IsWindowVisible
DestroyCaret
SetSysColors
GetProcessDefaultLayout
DdeKeepStringHandle
MapVirtualKeyW
IsWindowEnabled
DialogBoxParamW
ClipCursor
IsWindowUnicode
GetMonitorInfoW
DestroyAcceleratorTable
RegisterClassExA
DrawMenuBar
LoadImageW
SetScrollPos
RegisterClassA
GetScrollBarInfo
ExitWindowsEx
GetWindowTextLengthW
SetWindowsHookA
RegisterWindowMessageA
MapVirtualKeyExW
GetGUIThreadInfo
DlgDirSelectExA
LoadBitmapA
CheckMenuRadioItem
DefWindowProcA
GetMenuBarInfo
ActivateKeyboardLayout
IsDlgButtonChecked
OffsetRect
MessageBoxW
FlashWindowEx
ShowWindow
GetForegroundWindow
GetMenuContextHelpId
CreateIconFromResource
RegisterClassW
GetMenuStringW
CreateWindowExW
GetUserObjectInformationW
GetClipboardOwner
CheckDlgButton
GetWindowLongA
DdeQueryNextServer
GetKeyboardState
EnumDisplayDevicesW
SendNotifyMessageA
DestroyIcon
RemovePropA
CloseClipboard
DefFrameProcA
GetClipboardSequenceNumber
SwitchDesktop
GetClipboardData
DdeCreateStringHandleW
GetKeyState
DdeQueryStringW
DefMDIChildProcA
IsRectEmpty
DdeFreeStringHandle
EnumClipboardFormats
LoadKeyboardLayoutA
DestroyCursor
ChangeMenuA
IsIconic
TileWindows
GetSubMenu
DestroyWindow
CharToOemA
GetMenuItemInfoA
PeekMessageA
CharToOemBuffW
gdi32
GetStretchBltMode
AbortDoc
Rectangle
GetPaletteEntries
SetBrushOrgEx
GetObjectType
DeleteDC
GdiPlayJournal
comdlg32
ChooseFontW
PrintDlgW
ChooseFontA
PageSetupDlgA
Sections
.text Size: 174KB - Virtual size: 174KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 257KB - Virtual size: 257KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 108KB - Virtual size: 124KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 21KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ