Static task
static1
Behavioral task
behavioral1
Sample
f1d6fd98189b1971608a6dde289d4f0aad44f53085cd128a94fa0210fb28061b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f1d6fd98189b1971608a6dde289d4f0aad44f53085cd128a94fa0210fb28061b.exe
Resource
win10v2004-20220901-en
General
-
Target
f1d6fd98189b1971608a6dde289d4f0aad44f53085cd128a94fa0210fb28061b
-
Size
233KB
-
MD5
886c3b47d9d7ddbf672b5fa8c5b24f1d
-
SHA1
feb6d91615abf6adaf614222b0fcb85e2482bff2
-
SHA256
f1d6fd98189b1971608a6dde289d4f0aad44f53085cd128a94fa0210fb28061b
-
SHA512
a7e4909529717ff940467ea42e21d7eb2ed9950293c2ac4c564209dcc43e98c521c39915103bf032827e606397fce173578cf660197ba7e6a020e1fb929897af
-
SSDEEP
6144:SX1v8IrIGYZ4CsUnK2wh4eSmGE1OzJO6nl:mh8IrIGYZ1skQNp1OzD
Malware Config
Signatures
Files
-
f1d6fd98189b1971608a6dde289d4f0aad44f53085cd128a94fa0210fb28061b.exe windows x86
2ecedbc2559a3473c4f817224234bb69
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindNextChangeNotification
FindNextFileA
FindFirstChangeNotificationA
CloseHandle
GetWindowsDirectoryW
lstrcpyA
FlushFileBuffers
ReadFile
HeapReAlloc
GetStringTypeW
LCMapStringW
WriteConsoleW
SetStdHandle
HeapSize
RtlUnwind
LoadLibraryW
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
GetConsoleMode
GetConsoleCP
SetFilePointer
GetCurrentProcessId
QueryPerformanceCounter
InterlockedDecrement
GetCurrentThreadId
SetLastError
InterlockedIncrement
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
GetEnvironmentStringsW
WideCharToMultiByte
FreeEnvironmentStringsW
GetModuleFileNameA
DeleteCriticalSection
GetFileType
InitializeCriticalSectionAndSpinCount
SetHandleCount
LeaveCriticalSection
EnterCriticalSection
HeapCreate
GetModuleFileNameW
GetStdHandle
WriteFile
GetModuleHandleW
GetProcAddress
IsProcessorFeaturePresent
EncodePointer
DecodePointer
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
RaiseException
GetStartupInfoW
HeapSetInformation
GetSystemTimeAsFileTime
GetLocalTime
GetPrivateProfileStringA
FindClose
GetLastError
GetLogicalDriveStringsA
FindFirstFileA
GlobalUnlock
MultiByteToWideChar
GetVersionExW
CreateEventA
ExitProcess
Sleep
GetVolumeInformationA
GlobalAlloc
GetDriveTypeA
GetCommandLineA
GetTickCount
GetLogicalDrives
FindCloseChangeNotification
WaitForSingleObject
GlobalLock
HeapFree
GetCurrentProcess
HeapAlloc
lstrlenA
SetVolumeLabelA
CreateFileW
user32
SetDlgItemTextA
FindWindowA
SetScrollInfo
CheckMenuItem
GetWindow
MoveWindow
GetDlgItemTextA
DialogBoxParamA
SendMessageA
SetClipboardData
SetWindowTextA
IsWindowVisible
SystemParametersInfoA
OpenClipboard
DispatchMessageA
EndPaint
DestroyWindow
SetCursor
GetMessageA
CloseClipboard
ScreenToClient
GetWindowRect
IsMenu
PostQuitMessage
SendDlgItemMessageA
GetWindowDC
RegisterWindowMessageW
GetSubMenu
LoadStringA
GetFocus
GetParent
IsWindow
wsprintfA
GetClientRect
ExitWindowsEx
SetFocus
InvalidateRgn
BeginPaint
CreateIconIndirect
GetDC
GetForegroundWindow
GetWindowTextA
SetWindowLongA
GetScrollInfo
InvalidateRect
GetAncestor
GetWindowLongA
GetClipboardData
CreateWindowExA
ReleaseDC
GetDlgItem
EndDialog
DefWindowProcA
SetWindowPos
GetCursorPos
CheckDlgButton
ShowWindow
IsDlgButtonChecked
gdi32
SetWindowOrgEx
FrameRgn
GetTextExtentPoint32A
LineTo
GetBkMode
GetDeviceCaps
CreateFontIndirectA
DeleteObject
SelectObject
SelectClipRgn
DPtoLP
SetMapMode
SetViewportExtEx
CreateSolidBrush
EnumFontsA
TextOutA
advapi32
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
shell32
DragQueryFileA
DragQueryFileW
ord16
SHGetDesktopFolder
ole32
OleInitialize
OleSetContainedObject
CoUninitialize
OleCreateStaticFromData
CreateILockBytesOnHGlobal
OleUninitialize
CoInitialize
ReleaseStgMedium
OleGetClipboard
StgCreateDocfileOnILockBytes
oleaut32
RegisterActiveObject
mpr
WNetGetUniversalNameA
winmm
timeGetTime
shlwapi
PathFileExistsW
PathIsRelativeW
PathGetArgsA
PathStripPathW
comctl32
CreateToolbarEx
InitCommonControlsEx
wtsapi32
WTSQuerySessionInformationA
WTSFreeMemory
Sections
.text Size: 110KB - Virtual size: 110KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 109KB - Virtual size: 109KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 154KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ