Static task
static1
Behavioral task
behavioral1
Sample
daef86f110724a4501572846cf93bbc736240e08de901fba5e22852e37ef933e.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
daef86f110724a4501572846cf93bbc736240e08de901fba5e22852e37ef933e.exe
Resource
win10v2004-20220901-en
General
-
Target
daef86f110724a4501572846cf93bbc736240e08de901fba5e22852e37ef933e
-
Size
215KB
-
MD5
0e8ebf92f35a6280e28d5e7caab40e9f
-
SHA1
a0b59471faa1ae3cd6e7d41edc431e03e7847871
-
SHA256
daef86f110724a4501572846cf93bbc736240e08de901fba5e22852e37ef933e
-
SHA512
b674d57c2563b3c116ec6650825d35e464cefd2fd8f3a7d5eef6167adbf3758503071044aa1e62858f30e1a0e7294652685de037012b336fa03749374e212dd9
-
SSDEEP
6144:Pbt3SvYMk3SvYMk3SvYMtbnDYr1igkMBjlSNTZ3FAHte:PR3SvYMk3SvYMk3SvYM1YAKNe
Malware Config
Signatures
Files
-
daef86f110724a4501572846cf93bbc736240e08de901fba5e22852e37ef933e.exe windows x86
82bc2cfc2c98f55e83780a8712159cd2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
SHFileOperationW
SHGetFileInfoW
SHGetPathFromIDListW
SHBrowseForFolderW
SHGetSpecialFolderLocation
SHGetFolderPathW
ShellExecuteW
advapi32
RegSetValueExW
RegEnumKeyW
RegDeleteKeyW
RegDeleteValueW
RegEnumValueW
RegCloseKey
RegQueryValueExW
RegCreateKeyExW
RegOpenKeyExW
gdi32
GetDeviceCaps
CreateFontIndirectW
CreateBrushIndirect
DeleteObject
SetTextColor
SetBkMode
SelectObject
SetBkColor
comctl32
ImageList_Create
ImageList_AddMasked
ImageList_Destroy
kernel32
GetModuleHandleW
GetVersion
PostQueuedCompletionStatus
FreeResource
GetFileType
GetCommMask
RemoveVectoredExceptionHandler
CancelIo
CreateTapePartition
SetFileApisToOEM
GetCommandLineW
GetProcessHandleCount
GetFileAttributesExW
GetStdHandle
SetProcessWorkingSetSize
FindFirstFileExW
GetLogicalDrives
GetFileTime
FlushViewOfFile
TlsGetValue
CheckRemoteDebuggerPresent
SetStdHandle
OpenProcess
MapUserPhysicalPagesScatter
MulDiv
GetWriteWatch
QueryMemoryResourceNotification
GetThreadSelectorEntry
GetDevicePowerState
GlobalWire
GetProcessWorkingSetSize
GetPriorityClass
GetTapeParameters
GlobalUnlock
GetCommandLineA
GetStartupInfoA
SetUnhandledExceptionFilter
Sleep
GetProcAddress
ExitProcess
WriteFile
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetLastError
GetEnvironmentStringsW
SetHandleCount
DeleteCriticalSection
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
HeapCreate
VirtualFree
HeapFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LeaveCriticalSection
EnterCriticalSection
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
IsDebuggerPresent
LoadLibraryA
InitializeCriticalSectionAndSpinCount
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
HeapAlloc
VirtualAlloc
HeapReAlloc
RtlUnwind
HeapSize
GetLocaleInfoA
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetStringTypeA
GetStringTypeW
Sections
.text Size: 29KB - Virtual size: 29KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 53KB - Virtual size: 60KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 123KB - Virtual size: 122KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ