Static task
static1
Behavioral task
behavioral1
Sample
4d9eb93c585d060718901a1aec7a5528bb27e37efea791cdb1fc40e17458b228.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
4d9eb93c585d060718901a1aec7a5528bb27e37efea791cdb1fc40e17458b228.exe
Resource
win10v2004-20220812-en
General
-
Target
4d9eb93c585d060718901a1aec7a5528bb27e37efea791cdb1fc40e17458b228
-
Size
361KB
-
MD5
5be19bbad857e72d3821a22ebdbcc84a
-
SHA1
8828800df6d7e4acf8b5b62ad2b45940fbf2a694
-
SHA256
4d9eb93c585d060718901a1aec7a5528bb27e37efea791cdb1fc40e17458b228
-
SHA512
0a6cd6de94e1293c669c2a52ec3fd7eb560ec0cd1d27f4cd7f49635805e3e26ae433742d7918044f789ca969b0918b811fd12b83af8b6fd192778c147fdbe681
-
SSDEEP
6144:gNVsBdozMiaNA5AI2dcD0TnElPWPAHQTb8Xflv5lEUYE:KBzMlOR2dcDGnERWPAj55eUYE
Malware Config
Signatures
Files
-
4d9eb93c585d060718901a1aec7a5528bb27e37efea791cdb1fc40e17458b228.exe windows x86
8331354a9611e08a25e8f325ebf61587
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ole32
CreateClassMoniker
CoRevokeClassObject
CoRegisterClassObject
CoInitializeEx
GetRunningObjectTable
CoUninitialize
version
GetFileVersionInfoA
VerQueryValueA
kernel32
ResetEvent
WaitForSingleObject
GetVersionExA
GetCurrentThreadId
InterlockedIncrement
InterlockedDecrement
SetEvent
OpenEventA
TerminateThread
SuspendThread
ResumeThread
FormatMessageA
WaitForMultipleObjects
LocalFree
LocalUnlock
LocalLock
LocalAlloc
Sleep
CreateThread
RaiseException
SizeofResource
LockResource
LoadResource
FindResourceA
FindResourceExA
FindCloseChangeNotification
FindFirstChangeNotificationA
GetExitCodeThread
LoadLibraryW
ReleaseMutex
CreateMutexA
WideCharToMultiByte
lstrlenW
GetDriveTypeA
MultiByteToWideChar
FileTimeToSystemTime
FileTimeToLocalFileTime
SystemTimeToFileTime
CreateMutexW
SetLastError
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetModuleHandleExA
GetSystemInfo
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
GetFileSize
CreateFileA
GetTempFileNameA
GetTempPathA
GetVersion
GetModuleFileNameA
FindClose
GetDiskFreeSpaceA
GetWindowsDirectoryA
FindNextChangeNotification
FindNextFileA
RemoveDirectoryA
DeleteFileA
GetFileAttributesA
CreateDirectoryA
MoveFileA
GetTickCount
SetProcessWorkingSetSize
GetCurrentProcess
SetCurrentDirectoryA
GetCurrentDirectoryA
IsBadWritePtr
VirtualProtect
IsBadReadPtr
GetModuleHandleA
SetUnhandledExceptionFilter
WriteFile
GetThreadContext
VirtualQuery
GetCurrentProcessId
OpenProcess
SetFilePointer
GlobalMemoryStatus
DeviceIoControl
CreateFileW
SetEnvironmentVariableA
GetEnvironmentVariableA
LCMapStringW
LCMapStringA
ReadFile
GetFullPathNameA
GetConsoleMode
GetConsoleCP
SetStdHandle
GetStringTypeW
GetStringTypeA
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
FlushFileBuffers
SetHandleCount
GetTimeZoneInformation
GetStdHandle
VirtualAlloc
VirtualFree
HeapDestroy
HeapCreate
ExitProcess
HeapSize
TlsFree
TlsSetValue
LoadLibraryA
GetProcAddress
FreeLibrary
CreateEventA
GetLastError
CloseHandle
CreateProcessA
SetErrorMode
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CompareStringA
CompareStringW
InitializeCriticalSectionAndSpinCount
GetLocaleInfoA
FindFirstFileA
SetEnvironmentVariableW
TlsAlloc
TlsGetValue
GetModuleHandleW
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
SetFileAttributesA
GetProcessHeap
SetEndOfFile
GetFileType
PeekNamedPipe
GetFileInformationByHandle
HeapReAlloc
RtlUnwind
IsDebuggerPresent
UnhandledExceptionFilter
TerminateProcess
GetStartupInfoA
GetCommandLineA
GetDateFormatA
GetTimeFormatA
GetSystemTimeAsFileTime
ExitThread
HeapAlloc
HeapFree
user32
CharPrevA
CharNextA
RegisterWindowMessageA
ReleaseDC
GetClassInfoExA
UnregisterClassA
SetWindowsHookExA
GetMessageA
TranslateMessage
DispatchMessageA
GetClassInfoA
RegisterClassA
GetSystemMetrics
CreateWindowExA
DefWindowProcA
PostQuitMessage
SetTimer
KillTimer
DestroyWindow
PostThreadMessageA
FindWindowA
PostMessageA
IsWindow
SendMessageA
GetDC
RegisterClassExA
UnhookWindowsHookEx
advapi32
RegDeleteValueA
FreeSid
RegEnumKeyA
RegCreateKeyA
RegSetValueA
RegQueryValueA
RegDeleteKeyA
RegCreateKeyExA
RegSetValueExA
RegEnumKeyExA
RegNotifyChangeKeyValue
RegOpenKeyExA
RegQueryValueExA
RegOpenKeyA
RegCloseKey
gdi32
GetDeviceCaps
shell32
SHGetFolderPathW
SHGetFolderPathA
shlwapi
PathGetDriveNumberW
PathAppendA
PathAddBackslashA
PathAppendW
setupapi
SetupDiGetClassDevsW
SetupDiEnumDeviceInfo
SetupDiDeleteDeviceInfo
SetupDiDestroyDeviceInfoList
CM_Get_Parent
CM_Get_Device_ID_Size
CM_Get_Device_IDW
SetupDiGetDeviceInstanceIdW
Sections
.text Size: 208KB - Virtual size: 208KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 45KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 9KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 90KB - Virtual size: 92KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE