Static task
static1
Behavioral task
behavioral1
Sample
93c6be3d0b5cc28942fc2e54b2f2171c257124b5024504969e4e9847a62c9a9f.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
93c6be3d0b5cc28942fc2e54b2f2171c257124b5024504969e4e9847a62c9a9f.exe
Resource
win10v2004-20221111-en
General
-
Target
93c6be3d0b5cc28942fc2e54b2f2171c257124b5024504969e4e9847a62c9a9f
-
Size
150KB
-
MD5
60f287d80ff20904a0eddc36e07f5acf
-
SHA1
591a24adb19bb0447fdabd8eb7aabbb3c2f4b711
-
SHA256
93c6be3d0b5cc28942fc2e54b2f2171c257124b5024504969e4e9847a62c9a9f
-
SHA512
9f0d965790b4a8ed45dd0feb4121543b03be3bb3e80025f7ef513c999e37b985070c864f30ca3dceea218d765fa1dc55f31ed234278d8160df0657ccac2ccb5c
-
SSDEEP
3072:60qvw3Bi8juQNFqQw50HwlMBBBL5xDI9oRgKfoMo:SSshQbhw56BQ92gs
Malware Config
Signatures
Files
-
93c6be3d0b5cc28942fc2e54b2f2171c257124b5024504969e4e9847a62c9a9f.exe windows x86
d9090501396011a169a131c955c23409
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CompareStringA
CreateEventA
CreateFileW
DeleteFileA
DuplicateHandle
EnterCriticalSection
FileTimeToDosDateTime
FindFirstFileW
FindNextFileW
FindResourceW
FreeEnvironmentStringsW
GetACP
GetCommandLineW
GetCurrentDirectoryA
GetCurrentProcessId
GetCurrentThreadId
GetEnvironmentVariableA
GetExitCodeProcess
GetExitCodeThread
GetFileAttributesA
GetFileSize
GetFileTime
GetLastError
GetModuleFileNameW
GetModuleHandleA
GetOEMCP
GetShortPathNameA
GetStartupInfoA
GetStringTypeA
GetSystemDirectoryA
GetSystemDirectoryW
GetSystemTime
GetTempPathW
GetTickCount
GetTimeZoneInformation
GetUserDefaultLCID
GetVersionExA
GetWindowsDirectoryA
GlobalAddAtomA
GlobalDeleteAtom
GlobalFree
HeapDestroy
InterlockedIncrement
IsBadCodePtr
IsDBCSLeadByte
LCMapStringA
LeaveCriticalSection
LoadLibraryExA
LoadLibraryExW
LocalFileTimeToFileTime
MapViewOfFile
MultiByteToWideChar
QueryPerformanceCounter
RemoveDirectoryA
ResumeThread
SetErrorMode
SetFileTime
SetHandleCount
SetLastError
SetThreadLocale
SetThreadPriority
SetUnhandledExceptionFilter
SizeofResource
TerminateProcess
TlsSetValue
VirtualAlloc
VirtualQuery
WaitForMultipleObjects
WaitForSingleObject
WriteFile
lstrcmpiW
lstrlenA
lstrlenW
user32
CheckMenuItem
ClientToScreen
CreateMenu
CreatePopupMenu
DefWindowProcA
DestroyCursor
DestroyMenu
DestroyWindow
DispatchMessageA
DrawEdge
DrawIconEx
EmptyClipboard
EnableMenuItem
EndDialog
EndPaint
EnumThreadWindows
FindWindowA
GetCapture
GetClassInfoA
GetClassNameA
GetClientRect
GetDesktopWindow
GetForegroundWindow
GetKeyboardType
GetMenu
GetMenuItemCount
GetSystemMenu
GetSystemMetrics
GetWindowRect
GetWindowTextA
IntersectRect
IsDialogMessageA
IsRectEmpty
IsWindow
IsWindowVisible
KillTimer
LoadStringA
MapWindowPoints
MessageBeep
MessageBoxA
PostMessageA
PtInRect
ReleaseCapture
ScreenToClient
SetCapture
SetClassLongA
SetForegroundWindow
SetMenu
SetScrollInfo
SetScrollRange
SetTimer
SetWindowTextA
SetWindowsHookExA
ShowCursor
ShowOwnedPopups
TrackPopupMenu
UnhookWindowsHookEx
WaitMessage
WinHelpA
wsprintfA
gdi32
BitBlt
Chord
CloseEnhMetaFile
CombineRgn
CopyEnhMetaFileA
CopyMetaFileA
CopyMetaFileW
CreateBitmap
CreateCompatibleBitmap
CreateCompatibleDC
CreateDIBSection
CreateEllipticRgn
CreateFontIndirectA
CreateHalftonePalette
CreateHatchBrush
CreateICA
CreatePalette
CreatePen
DeleteDC
DeleteMetaFile
EnumFontFamiliesA
EnumFontFamiliesW
ExtCreateRegion
ExtSelectClipRgn
FillPath
GetBrushOrgEx
GetClipBox
GetCurrentPositionEx
GetDIBits
GetMapMode
GetNearestColor
GetObjectA
GetObjectType
GetObjectW
GetRegionData
GetRgnBox
GetStockObject
GetStretchBltMode
GetTextAlign
GetTextCharsetInfo
GetTextExtentExPointW
GetTextExtentPoint32W
GetTextExtentPointA
GetTextFaceW
GetViewportOrgEx
GetWinMetaFileBits
GetWindowOrgEx
LineTo
PatBlt
PlayEnhMetaFile
PlayMetaFile
PolyBezierTo
PolyDraw
Polyline
PolylineTo
PtInRegion
PtVisible
RealizePalette
RectInRegion
ScaleWindowExtEx
SetAbortProc
SetBkColor
SetBrushOrgEx
SetColorAdjustment
SetDIBColorTable
SetDIBits
SetEnhMetaFileBits
SetMapperFlags
SetPixel
SetTextCharacterExtra
SetTextColor
SetWinMetaFileBits
SetWindowOrgEx
StartDocW
StartPage
StretchBlt
StrokeAndFillPath
StrokePath
UnrealizeObject
shell32
CommandLineToArgvW
DragAcceptFiles
DragFinish
DragQueryFile
DragQueryFileA
DragQueryFileW
DragQueryPoint
ExtractAssociatedIconW
ExtractIconExA
ExtractIconW
FindExecutableW
SHAddToRecentDocs
SHBrowseForFolder
SHBrowseForFolderA
SHBrowseForFolderW
SHChangeNotify
SHCreateDirectoryExA
SHGetDiskFreeSpaceExW
SHGetFileInfo
SHGetFileInfoA
SHGetFileInfoW
SHGetFolderLocation
SHGetFolderPathA
SHGetFolderPathW
SHGetMalloc
SHGetPathFromIDList
SHGetPathFromIDListW
SHGetSpecialFolderLocation
SHGetSpecialFolderPathW
ShellExecuteEx
ShellExecuteExA
ShellExecuteExW
ShellExecuteW
Shell_NotifyIconA
Shell_NotifyIconW
comctl32
CreatePropertySheetPageW
ImageList_Add
ImageList_AddMasked
ImageList_Create
ImageList_DragLeave
ImageList_DragShowNolock
ImageList_EndDrag
ImageList_GetBkColor
ImageList_GetDragImage
ImageList_GetImageInfo
ImageList_LoadImageA
ImageList_Replace
ImageList_SetImageCount
ImageList_Write
InitCommonControlsEx
InitializeFlatSB
advapi32
AdjustTokenPrivileges
AllocateAndInitializeSid
CheckTokenMembership
CryptHashData
CryptReleaseContext
DeleteService
FreeSid
GetSecurityDescriptorDacl
GetTokenInformation
InitiateSystemShutdownA
IsValidSid
LookupPrivilegeValueW
OpenProcessToken
OpenSCManagerA
OpenServiceW
OpenThreadToken
QueryServiceStatus
RegCloseKey
RegCreateKeyExA
RegCreateKeyExW
RegDeleteKeyA
RegDeleteKeyW
RegDeleteValueA
RegEnumKeyA
RegEnumKeyExA
RegEnumValueA
RegEnumValueW
RegFlushKey
RegOpenKeyA
RegOpenKeyExA
RegOpenKeyExW
RegOpenKeyW
RegQueryValueA
RegQueryValueExA
RegQueryValueExW
RevertToSelf
SetSecurityDescriptorDacl
SetSecurityDescriptorGroup
SetSecurityDescriptorOwner
msvcrt
__dllonexit
__getmainargs
__p___initenv
_aligned_free
_beginthreadex
_chsize
_clearfp
_endthreadex
_findnext
_i64tow
_ismbcspace
_lock
_mbschr
_mbsncpy
_mbsnicmp
_pctype
_popen
_purecall
_spawnv
_strcmpi
_unlink
_wcsdup
_wfopen
atan
atol
cos
floor
islower
iswalpha
strcat
strncat
strstr
towupper
wcscoll
Sections
.text Size: 36KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 87KB - Virtual size: 87KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ