Static task
static1
Behavioral task
behavioral1
Sample
72111bff8c228853a28d28421587a3b8e21672f3085d4c97df17c823245512c5.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
72111bff8c228853a28d28421587a3b8e21672f3085d4c97df17c823245512c5.exe
Resource
win10v2004-20220812-en
General
-
Target
72111bff8c228853a28d28421587a3b8e21672f3085d4c97df17c823245512c5
-
Size
308KB
-
MD5
ce8a4d503137624e983f8a536b24ab8e
-
SHA1
e3c72436600967bfbccbbd11a86ae8dc1cfe2f33
-
SHA256
72111bff8c228853a28d28421587a3b8e21672f3085d4c97df17c823245512c5
-
SHA512
ed03f950b223650a5ced14f6effe7b595ed854ebd0dba11d8378dfc0af8b8f1e25f35410f3cc222f1b443f5c98e085b628965e83b1476103beba10a399a4f026
-
SSDEEP
1536:0GkYgQrqK1rXRc4eu229c8hlU+Tkyc8rtg0k5xHewhTMBuzpPfn+2PXQ:Qwc4eu22eWi+gytyHVwytnJQ
Malware Config
Signatures
Files
-
72111bff8c228853a28d28421587a3b8e21672f3085d4c97df17c823245512c5.exe windows x86
57b82aeed06e18476b471aeed2cb1d70
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
ShellExecuteW
ShellExecuteA
ole32
StringFromGUID2
CoCreateGuid
crypt32
CryptDecodeObject
CertGetNameStringW
CertFindCertificateInStore
CertCloseStore
CryptMsgClose
CryptMsgGetParam
CertFreeCertificateContext
CryptQueryObject
kernel32
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetStdHandle
GlobalAddAtomA
SetEnvironmentVariableA
GetFileType
GetFileSize
RaiseException
RtlUnwind
UnhandledExceptionFilter
ExitThread
ExitProcess
GetCommandLineA
GetStartupInfoA
LoadLibraryExA
lstrcpynA
lstrlenA
VirtualFree
Sleep
LocalAlloc
TlsGetValue
TlsSetValue
CloseHandle
CompareStringA
CompareStringW
CreateDirectoryA
CreateDirectoryW
CreateEventA
CreateFileA
CreateFileW
CreateMutexA
CreateThread
DeleteCriticalSection
DeleteFileA
DeleteFileW
EnterCriticalSection
EnumCalendarInfoA
FindClose
FindFirstFileA
FindFirstFileW
FindResourceA
FormatMessageA
FormatMessageW
FreeLibrary
FreeResource
GetACP
GetCPInfo
GetCommandLineW
GetComputerNameA
GetCurrentProcess
GetCurrentProcessId
GetCurrentThread
GetCurrentThreadId
GetDateFormatA
GetDiskFreeSpaceA
GetExitCodeThread
GetFileAttributesA
GetFileAttributesW
GetFullPathNameA
GetFullPathNameW
GetLastError
GetLocalTime
GetLocaleInfoA
GetModuleFileNameA
GetModuleFileNameW
GetModuleHandleA
GetPrivateProfileStringA
GetProcAddress
GetStdHandle
GetStringTypeExA
GetStringTypeExW
GetTempPathA
GetTempPathW
GetThreadLocale
GetTickCount
GetUserDefaultLangID
GetVersion
GetVersionExA
GlobalAlloc
GlobalDeleteAtom
GlobalFindAtomA
GlobalFree
GlobalGetAtomNameA
GlobalLock
GlobalUnlock
InitializeCriticalSection
LeaveCriticalSection
LoadLibraryA
LoadLibraryW
LoadResource
LocalFree
LockResource
MulDiv
MultiByteToWideChar
ReadFile
ReleaseMutex
ResetEvent
ResumeThread
SetEndOfFile
SetErrorMode
SetEvent
SetFilePointer
SetLastError
SetThreadLocale
SizeofResource
VirtualAlloc
VirtualProtect
VirtualQuery
WaitForSingleObject
WideCharToMultiByte
WriteFile
WritePrivateProfileStringA
lstrcmpA
lstrcpyA
lstrlenW
WaitForMultipleObjects
DnsHostnameToComputerNameA
MapViewOfFile
GetCurrentDirectoryW
WaitCommEvent
DefineDosDeviceW
GetTimeFormatA
GetSystemTimeAsFileTime
OutputDebugStringA
InterlockedIncrement
InterlockedDecrement
GetOEMCP
GetModuleHandleW
TlsAlloc
TlsFree
HeapFree
HeapAlloc
GetTimeZoneInformation
TerminateProcess
SetUnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
HeapDestroy
HeapCreate
QueryPerformanceCounter
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
HeapReAlloc
GetSystemInfo
GetConsoleCP
GetConsoleMode
FlushFileBuffers
Sections
.text Size: 47KB - Virtual size: 47KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 209KB - Virtual size: 220KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 39KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ