Static task
static1
Behavioral task
behavioral1
Sample
88c7f886f882e53d5c05d0c7890e43a622764669532006fa8b9bdfc68e8b989b.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
88c7f886f882e53d5c05d0c7890e43a622764669532006fa8b9bdfc68e8b989b.exe
Resource
win10v2004-20221111-en
General
-
Target
88c7f886f882e53d5c05d0c7890e43a622764669532006fa8b9bdfc68e8b989b
-
Size
268KB
-
MD5
e180a5db6675938de1394412e4ac83ca
-
SHA1
a7c7960b26dd79b31fe6a6e3dd60022b0c536275
-
SHA256
88c7f886f882e53d5c05d0c7890e43a622764669532006fa8b9bdfc68e8b989b
-
SHA512
3597f96078dba7ef58e89f95a5fdd572c3f0f5b764c4f8f54712b900456eba034151c46011491c73920ac7039cdaed2aec5ed5a824b2cc3acf7f0bcc63f47ec7
-
SSDEEP
6144:Bruj5yU2imXWseV378WJ+PRMv22W0LvvUduWB/xUK:kd2i0Wp7SPCO2vvU3X
Malware Config
Signatures
Files
-
88c7f886f882e53d5c05d0c7890e43a622764669532006fa8b9bdfc68e8b989b.exe windows x86
fc4bae5a04ad79200c86a9c706482f60
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetShortPathNameW
GetStartupInfoA
GetSystemDefaultLangID
GetSystemDirectoryA
GetSystemDirectoryW
GetSystemTimeAsFileTime
GetTempPathA
GetTempPathW
GetTickCount
GetTimeZoneInformation
GetUserDefaultLangID
GetVersion
GetVersionExA
GetVersionExW
GetWindowsDirectoryA
GetWindowsDirectoryW
GlobalAlloc
GlobalFree
GlobalLock
GlobalUnlock
HeapAlloc
HeapFree
InitializeCriticalSection
InterlockedDecrement
InterlockedIncrement
IsBadReadPtr
IsBadWritePtr
LeaveCriticalSection
LoadLibraryA
LoadLibraryExA
LoadLibraryExW
LoadLibraryW
MapViewOfFile
MoveFileA
MoveFileExA
MoveFileExW
MoveFileW
GetShortPathNameA
OpenEventA
OpenEventW
QueryDosDeviceA
QueryDosDeviceW
QueryPerformanceCounter
ReadFile
ReleaseMutex
RemoveDirectoryA
RemoveDirectoryW
ResetEvent
SetCurrentDirectoryA
SetCurrentDirectoryW
SetEndOfFile
SetErrorMode
SetEvent
SetFileAttributesA
SetFileAttributesW
SetFilePointer
SetLastError
SetUnhandledExceptionFilter
Sleep
TerminateProcess
UnhandledExceptionFilter
UnmapViewOfFile
WaitForMultipleObjects
WaitForSingleObject
WideCharToMultiByte
WriteFile
WritePrivateProfileStringA
WritePrivateProfileStringW
WriteProfileStringA
WriteProfileStringW
lstrcpynW
lstrlenA
lstrlenW
GetProfileStringW
GetProfileStringA
GetProcessHeap
GetProcAddress
GetPrivateProfileStringW
GetPrivateProfileStringA
VirtualAlloc
GetModuleHandleW
GetModuleHandleA
GetModuleFileNameW
GetModuleFileNameA
GetLocaleInfoW
GetLocaleInfoA
GetLastError
GetFileTime
GetFileSize
GetFileAttributesW
GetFileAttributesA
GetExitCodeThread
GetExitCodeProcess
GetDriveTypeW
GetDriveTypeA
GetDiskFreeSpaceA
GetCurrentThreadId
GetCurrentProcessId
GetCurrentProcess
GetCurrentDirectoryW
GetCurrentDirectoryA
GetCommandLineW
FreeLibrary
FindNextFileW
FindNextFileA
FindFirstFileW
FindFirstFileA
FindClose
FileTimeToSystemTime
ExpandEnvironmentStringsW
ExpandEnvironmentStringsA
EnterCriticalSection
DeviceIoControl
DeleteFileW
DeleteFileA
DeleteCriticalSection
CreateThread
CreateProcessW
CreateProcessA
CreateMutexW
CreateMutexA
CreateFileW
CreateFileMappingW
CreateFileMappingA
CreateFileA
CreateEventW
CreateEventA
CreateDirectoryW
CreateDirectoryA
CopyFileW
CopyFileA
CompareStringW
CompareStringA
CloseHandle
MultiByteToWideChar
user32
PostThreadMessageA
PostThreadMessageW
RegisterClassA
RegisterClassW
RegisterWindowMessageA
ReleaseDC
ScreenToClient
ScrollWindow
SendDlgItemMessageW
SendMessageA
SendMessageW
SetCursor
SetFocus
SetScrollInfo
SetWindowLongA
SetWindowLongW
SetWindowPos
SetWindowTextA
SetWindowTextW
ShowWindow
TranslateMessage
UnregisterClassA
UnregisterClassW
UpdateWindow
PostQuitMessage
PostMessageW
PostMessageA
PeekMessageW
PeekMessageA
MsgWaitForMultipleObjects
MoveWindow
MessageBoxW
MessageBoxA
MapWindowPoints
LoadStringW
LoadStringA
LoadImageW
LoadImageA
LoadIconW
LoadIconA
LoadCursorW
LoadCursorA
IsWindow
IsDialogMessageW
IsDialogMessageA
InvalidateRect
GetWindowTextW
GetWindowTextA
GetWindowRect
GetWindowLongW
GetWindowLongA
GetSystemMetrics
GetScrollInfo
GetParent
GetMessageW
GetMessageA
GetDlgItem
GetDesktopWindow
GetDC
GetClientRect
GetClassNameA
GetClassLongA
GetActiveWindow
FindWindowW
FindWindowExW
FindWindowExA
FindWindowA
EndPaint
EnableWindow
DrawTextW
DrawTextA
DrawFocusRect
DispatchMessageW
DispatchMessageA
DestroyWindow
DestroyCursor
DefWindowProcW
DefWindowProcA
CreateWindowExW
CreateDialogParamW
CreateDialogParamA
CharNextA
CallWindowProcW
CallWindowProcA
BeginPaint
CreateWindowExA
gdi32
SetTextColor
SetMapMode
SetBkMode
SetBkColor
SelectObject
PatBlt
GetTextMetricsW
GetTextMetricsA
GetTextFaceA
GetObjectW
GetObjectType
GetObjectA
GetDeviceCaps
ExtTextOutW
DeleteObject
DeleteDC
CreateSolidBrush
CreatePen
CreateFontIndirectW
CreateFontIndirectA
CreateFontA
CreateCompatibleDC
GetStockObject
advapi32
EnumDependentServicesW
StartServiceW
RegSetValueExW
RegSetValueExA
RegQueryValueExW
RegQueryValueExA
RegQueryInfoKeyW
RegQueryInfoKeyA
RegOpenKeyExA
RegEnumValueW
RegEnumValueA
RegEnumKeyExW
RegEnumKeyExA
RegDeleteValueW
RegDeleteValueA
RegDeleteKeyW
RegDeleteKeyA
RegCreateKeyExW
RegCreateKeyExA
QueryServiceStatus
OpenServiceW
OpenSCManagerW
OpenProcessToken
RegCloseKey
RegOpenKeyExW
AdjustTokenPrivileges
AllocateAndInitializeSid
CloseServiceHandle
ControlService
LookupPrivilegeValueA
EqualSid
FreeSid
GetTokenInformation
InitiateSystemShutdownExW
LookupPrivilegeValueW
ole32
CoInitialize
OleUninitialize
OleInitialize
CreateStreamOnHGlobal
CoUninitialize
CoCreateInstance
comctl32
InitCommonControlsEx
msvcrt
_wcslwr
wcstok
wcsstr
wcsrchr
wcspbrk
wcsncpy
wcsncmp
_XcptFilter
__dllonexit
__getmainargs
__p__commode
__p__fmode
__set_app_type
__setusermatherr
_acmdln
_adjust_fdiv
_beginthreadex
_c_exit
_cexit
_controlfp
_endthread
_except_handler3
_exit
_ftol
_initterm
_itow
_onexit
_purecall
_snwprintf
_stricmp
_strlwr
_vsnprintf
_vsnwprintf
_wcsicmp
_wcsnicmp
_wcsupr
_wtoi
_wtol
calloc
ceil
exit
free
iswalnum
iswalpha
iswdigit
iswspace
malloc
memmove
strchr
strncat
strncpy
strpbrk
strrchr
strstr
swscanf
time
towupper
wcschr
wcscmp
wcslen
wcsncat
Sections
.text Size: 253KB - Virtual size: 252KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ