Static task
static1
Behavioral task
behavioral1
Sample
0a1b3f17d4997028a960ae7a5fe3ada189aa742b0c9dd5644002a73df052975a.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
0a1b3f17d4997028a960ae7a5fe3ada189aa742b0c9dd5644002a73df052975a.exe
Resource
win10v2004-20221111-en
General
-
Target
0a1b3f17d4997028a960ae7a5fe3ada189aa742b0c9dd5644002a73df052975a
-
Size
128KB
-
MD5
5591446f6bdad52e1446307414cbbe6c
-
SHA1
3d3292b5bfa3052e3d06bb37ca2a3f0c6c90bfeb
-
SHA256
0a1b3f17d4997028a960ae7a5fe3ada189aa742b0c9dd5644002a73df052975a
-
SHA512
3e2d776424c18c9a154f15943f07d4b7acd4419ee224f35e707f458b6cd366afb37f1fc2c487b33fb09aba9dd23545f2697638164780c05e984ff450f925a8b8
-
SSDEEP
1536:PC1+oJZFA9AfnbsMFqT+ZswU7mJyICCQwDy9zYOh4q8Gs:q1+cZikKT+ywUSJyIbQp98
Malware Config
Signatures
Files
-
0a1b3f17d4997028a960ae7a5fe3ada189aa742b0c9dd5644002a73df052975a.exe windows x86
1012fd5f896cd2cfe378850978123ffb
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
IsTextUnicode
RegCloseKey
RegSetValueA
RegOpenKeyA
RegQueryValueA
RegDeleteKeyA
DeregisterEventSource
ReportEventW
LookupAccountNameW
GetUserNameW
RegisterEventSourceW
RegCreateKeyA
ImpersonateLoggedOnUser
RegOpenKeyExA
RegOpenKeyExW
RegCreateKeyExA
RegCreateKeyExW
RegQueryValueExA
RegQueryValueExW
RegSetValueExA
RegSetValueExW
kernel32
InterlockedIncrement
InterlockedDecrement
EnterCriticalSection
DeleteCriticalSection
LeaveCriticalSection
GetLastError
ExitProcess
GetModuleHandleA
GetStartupInfoA
MultiByteToWideChar
GetCommandLineA
lstrlenW
GetCommandLineW
WideCharToMultiByte
GetModuleFileNameA
GetCPInfo
GetACP
FindClose
FindFirstFileA
DeleteFileA
FindFirstFileW
GetFileAttributesW
CloseHandle
SetEvent
CreateThread
CreateEventA
GetVersionExA
ReadFile
GetStdHandle
FreeLibrary
GetCurrentThreadId
GetProcAddress
LoadLibraryA
WriteFile
CreateFileA
GetModuleFileNameW
GetTickCount
GetFileType
GetUserDefaultLCID
FormatMessageA
LocalFree
LocalAlloc
FormatMessageW
HeapAlloc
GetProcessHeap
HeapFree
HeapReAlloc
UnmapViewOfFile
CreateFileW
MapViewOfFile
CreateFileMappingA
GetFileSize
lstrlenA
GetLocaleInfoA
lstrcpyA
GetPrivateProfileStringA
GetPrivateProfileStringW
GetPrivateProfileIntA
GetPrivateProfileIntW
GetFullPathNameA
GetFullPathNameW
InitializeCriticalSection
GetFileAttributesA
user32
PostMessageA
TranslateMessage
SendMessageA
IsWindowVisible
EnumThreadWindows
KillTimer
MsgWaitForMultipleObjects
PeekMessageA
CharNextA
DispatchMessageA
GetMessageA
LoadStringW
wsprintfA
LoadStringA
wsprintfW
CreateWindowExA
GetClassInfoA
RegisterClassA
PostQuitMessage
GetWindowLongA
SetWindowLongA
GetParent
SetTimer
DefWindowProcA
GetActiveWindow
PostThreadMessageA
MessageBoxW
ole32
CreateBindCtx
CoGetMalloc
CoGetClassObject
CreateFileMoniker
CLSIDFromProgID
CLSIDFromString
CoInitializeSecurity
MkParseDisplayName
StringFromCLSID
CoRegisterClassObject
CoRevokeClassObject
CoCreateInstance
CoMarshalInterThreadInterfaceInStream
CoInitialize
CoUninitialize
CoGetInterfaceAndReleaseStream
CoRegisterMessageFilter
oleaut32
SetErrorInfo
SafeArrayGetLBound
VariantInit
SafeArrayGetElement
SafeArrayGetUBound
SafeArrayPutElement
VariantClear
SafeArrayCreate
UnRegisterTypeLi
LoadTypeLibEx
SafeArrayDestroy
SysAllocStringLen
SysAllocString
SysStringLen
SysAllocStringByteLen
LoadTypeLi
VariantCopy
SysFreeString
LoadRegTypeLi
VariantChangeType
CreateErrorInfo
SafeArrayCopy
imm32
ImmGetDefaultIMEWnd
version
GetFileVersionInfoSizeA
GetFileVersionInfoW
VerQueryValueA
GetFileVersionInfoA
VerQueryValueW
GetFileVersionInfoSizeW
msvcrt
_ftol
_itow
_endthread
_beginthread
sprintf
free
malloc
wcsrchr
tmpnam
Sections
.text Size: 60KB - Virtual size: 57KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 52KB - Virtual size: 72KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE