Static task
static1
Behavioral task
behavioral1
Sample
b30ac8823f4985ddd63ddfb3a96485e381b0ab5aff8683c14a36982cf9f3d3c8.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
b30ac8823f4985ddd63ddfb3a96485e381b0ab5aff8683c14a36982cf9f3d3c8.exe
Resource
win10v2004-20220812-en
General
-
Target
b30ac8823f4985ddd63ddfb3a96485e381b0ab5aff8683c14a36982cf9f3d3c8
-
Size
308KB
-
MD5
8d00dba70be31992ee81a00d916db5d0
-
SHA1
6c488fa77f01c96cf1892c8943208c9caf2152cb
-
SHA256
b30ac8823f4985ddd63ddfb3a96485e381b0ab5aff8683c14a36982cf9f3d3c8
-
SHA512
f40fb02aeb990908dd23a81b35c0b0e45a27627643771bcf23e8c1d3aedaaf102dad2e0dbf02b7b9956c9da71d032c3ee3edb869e7f04547843d624618ea33a9
-
SSDEEP
6144:r8hqhu6LG7N+mspOL40Vd0D56E2AYMamAPWRwSU:r8X6yhtL40Yd2AYxPW6
Malware Config
Signatures
Files
-
b30ac8823f4985ddd63ddfb3a96485e381b0ab5aff8683c14a36982cf9f3d3c8.exe windows x86
d1f6a140caecc05294440a91da34b471
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalFree
VirtualAlloc
GetCommandLineA
SetProcessAffinityMask
VirtualProtect
CopyFileExW
GetBinaryTypeA
SetProcessShutdownParameters
GetPrivateProfileSectionW
FindResourceExW
PeekNamedPipe
FreeLibrary
SetStdHandle
GetTapeParameters
SystemTimeToFileTime
GetEnvironmentVariableW
GetVolumeInformationW
IsDBCSLeadByteEx
SetEnvironmentVariableW
ReadDirectoryChangesW
ExitProcess
GenerateConsoleCtrlEvent
_lopen
GetCommandLineW
FindCloseChangeNotification
GetStartupInfoA
user32
ChangeDisplaySettingsW
CloseWindowStation
DrawIconEx
SetTimer
OffsetRect
InvertRect
GetNextDlgTabItem
ScrollDC
SetCapture
SetLastErrorEx
GetWindowPlacement
CreateDialogParamW
IntersectRect
CharNextW
SetSysColors
GetMenuItemInfoW
DeferWindowPos
DialogBoxIndirectParamA
GetLastActivePopup
SwitchToThisWindow
PeekMessageA
GetWindowTextW
SetWindowLongA
LoadAcceleratorsA
CreateCaret
EnumWindowStationsW
GetWindowRect
ArrangeIconicWindows
VkKeyScanW
UnregisterDeviceNotification
KillTimer
DefDlgProcA
SetCaretBlinkTime
SetClassLongW
CharUpperBuffA
CreateIconFromResource
GetClipboardOwner
LoadIconA
SetScrollPos
PostThreadMessageW
SetPropA
MapWindowPoints
FlashWindow
RegisterWindowMessageA
DragDetect
GetMessagePos
ChangeDisplaySettingsA
ShowCursor
AppendMenuA
SendMessageCallbackW
GetClipboardViewer
SendMessageW
GetTitleBarInfo
LoadCursorW
SendDlgItemMessageW
ExitWindowsEx
SetClassLongA
ValidateRect
gdi32
GetOutlineTextMetricsA
IntersectClipRect
Pie
EnumFontFamiliesA
GetTextCharsetInfo
SetPixel
SetPixelV
GetTextColor
GetDIBColorTable
SetViewportOrgEx
SetBrushOrgEx
CreateHalftonePalette
GetSystemPaletteUse
Chord
PaintRgn
GetTextAlign
ArcTo
GetTextExtentExPointA
GetCharWidth32A
StrokePath
EnumFontsW
CloseEnhMetaFile
comdlg32
PageSetupDlgW
ChooseColorA
GetFileTitleW
advapi32
IsValidSid
GetSecurityDescriptorOwner
SetKernelObjectSecurity
CopySid
LogonUserA
RegisterEventSourceA
RegSaveKeyA
RegOpenKeyW
RegSaveKeyW
LookupPrivilegeNameA
DuplicateToken
SetPrivateObjectSecurity
DeregisterEventSource
CryptGetProvParam
SetTokenInformation
RegQueryValueW
OpenEventLogW
EnumServicesStatusW
GetServiceDisplayNameW
EnumDependentServicesA
RegOpenKeyExA
QueryServiceStatus
RegOpenKeyA
CloseEventLog
CryptGetKeyParam
ImpersonateLoggedOnUser
StartServiceCtrlDispatcherA
RegEnumKeyExW
OpenServiceW
IsValidSecurityDescriptor
shell32
SHBrowseForFolderA
SHGetSpecialFolderLocation
ole32
CoFreeAllLibraries
oleaut32
SafeArrayUnaccessData
LoadTypeLibEx
QueryPathOfRegTypeLi
comctl32
ImageList_Remove
ImageList_GetImageCount
shlwapi
PathIsDirectoryA
PathStripPathW
PathAddBackslashW
PathParseIconLocationW
PathStripToRootW
PathFileExistsA
PathFindExtensionA
PathStripToRootA
Sections
usweeu Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
kamue Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
qakaoa Size: 272KB - Virtual size: 271KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
yoqsao Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ