Static task
static1
Behavioral task
behavioral1
Sample
850bc78962e392669c8732c848a804f531465c64879cec680d2c9025ab6f8aee.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
850bc78962e392669c8732c848a804f531465c64879cec680d2c9025ab6f8aee.exe
Resource
win10v2004-20221111-en
General
-
Target
850bc78962e392669c8732c848a804f531465c64879cec680d2c9025ab6f8aee
-
Size
255KB
-
MD5
aed2c210d8388d109b5e2e50f4c09e1b
-
SHA1
fb9845a0597d7e2f7051a5e000fc1276d2746b15
-
SHA256
850bc78962e392669c8732c848a804f531465c64879cec680d2c9025ab6f8aee
-
SHA512
a32bb8df1bd88b042b34fdeca037bc737d02d9bbf2f353caaaed6e5ba335434959b827002c1b1c76d4bf943e972adbda98b74277c157094f4306c9bdbf5a4d6b
-
SSDEEP
6144:ncKreOw1Alj3jJ5teqA63G40ES16UAAEm4:ncKreOw1AlZ5tL3DE6Uhv4
Malware Config
Signatures
Files
-
850bc78962e392669c8732c848a804f531465c64879cec680d2c9025ab6f8aee.exe windows x86
117889d6acad3b1bfc4bd8c0d60d3a04
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
LoadCursorW
DestroyMenu
VkKeyScanW
GetClassLongW
LoadCursorFromFileA
ValidateRect
CharUpperA
DdeFreeStringHandle
DrawStateW
UnionRect
AnyPopup
GetMenuInfo
ShowWindowAsync
advapi32
RegQueryMultipleValuesW
GetServiceKeyNameW
RegFlushKey
ConvertToAutoInheritPrivateObjectSecurity
NotifyBootConfigStatus
AreAnyAccessesGranted
ObjectCloseAuditAlarmW
wininet
InternetConfirmZoneCrossing
InternetCreateUrlA
InternetConnectW
InternetCanonicalizeUrlA
GopherFindFirstFileA
RetrieveUrlCacheEntryFileA
InternetCrackUrlW
gdi32
ColorCorrectPalette
AddFontResourceExA
Chord
AddFontResourceW
CreateDIBPatternBrushPt
ArcTo
kernel32
GetConsoleCP
GetConsoleMode
FlushFileBuffers
SetFilePointer
CloseHandle
WriteConsoleA
GetConsoleOutputCP
VirtualQuery
GetSystemInfo
VirtualProtect
RtlUnwind
InitializeCriticalSection
LoadLibraryExA
WriteConsoleW
SetStdHandle
CompareStringA
CompareStringW
SetEnvironmentVariableA
CreateFileA
HeapFree
WaitForSingleObject
SetWaitableTimer
GetLastError
CreateWaitableTimerA
DeleteTimerQueueEx
IsBadCodePtr
HeapReAlloc
EnterCriticalSection
GetVolumeNameForVolumeMountPointA
GetSystemTimeAsFileTime
InterlockedIncrement
InterlockedDecrement
GetCommandLineA
GetVersionExA
GetStartupInfoA
GetProcAddress
GetModuleHandleW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
GetCPInfo
OutputDebugStringA
GetModuleHandleA
ExitProcess
DeleteCriticalSection
LeaveCriticalSection
GetACP
GetOEMCP
HeapAlloc
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
GetStringTypeA
MultiByteToWideChar
GetStringTypeW
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
WideCharToMultiByte
GetTimeZoneInformation
WriteFile
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapDestroy
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
Sleep
GetLocaleInfoW
LCMapStringA
LCMapStringW
VirtualAlloc
Sections
.text Size: 78KB - Virtual size: 77KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 48KB - Virtual size: 54KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 116KB - Virtual size: 115KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ