Static task
static1
Behavioral task
behavioral1
Sample
0922c51e4eb27ff907778afa42b75550d37aa944d3ff41fb96fa0eb4269bd080.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0922c51e4eb27ff907778afa42b75550d37aa944d3ff41fb96fa0eb4269bd080.exe
Resource
win10v2004-20220812-en
General
-
Target
0922c51e4eb27ff907778afa42b75550d37aa944d3ff41fb96fa0eb4269bd080
-
Size
788KB
-
MD5
7dfdf7e6303b7b4703c26b2ebee0b50d
-
SHA1
873d23040134d9c969e93ca84a6447bf03573c06
-
SHA256
0922c51e4eb27ff907778afa42b75550d37aa944d3ff41fb96fa0eb4269bd080
-
SHA512
4130a5f793cc3beae8bc7858cba5dbddef4cfd14390460dd05567f6494ff98a659485cedeca52c2e709f06b8082d6b289c8509e2920864654320e548178eed49
-
SSDEEP
12288:E+Sq32yazVNrd0atz4a4U9ch0aP8EFAA7dygBkAixsM9LUWyq7cCo7v8:Exq32yazVx14fUyh0QBIBLlo7v8
Malware Config
Signatures
Files
-
0922c51e4eb27ff907778afa42b75550d37aa944d3ff41fb96fa0eb4269bd080.exe windows x86
55a4660f5a0f7e6858977a65b596e516
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
ExtractAssociatedIconA
ExtractAssociatedIconExW
advapi32
StartServiceA
CryptEnumProvidersW
LookupPrivilegeValueA
RegOpenKeyExW
LookupPrivilegeNameW
CryptHashSessionKey
ReportEventW
RegReplaceKeyA
RegOpenKeyW
RegQueryMultipleValuesA
CryptGenKey
RegCreateKeyExW
InitiateSystemShutdownA
RegCreateKeyA
LookupPrivilegeDisplayNameW
StartServiceW
kernel32
HeapDestroy
EnumDateFormatsExA
QueryPerformanceCounter
SetThreadContext
GlobalFlags
SetConsoleCtrlHandler
GetACP
GetPrivateProfileSectionNamesW
VirtualAlloc
GetEnvironmentStrings
GetDriveTypeA
WriteConsoleW
GetModuleFileNameA
GetProcAddress
DeleteCriticalSection
TlsAlloc
HeapAlloc
GetConsoleOutputCP
SetFilePointer
UnhandledExceptionFilter
LoadLibraryW
GlobalSize
TlsSetValue
MoveFileExW
GetSystemTimeAdjustment
lstrcpy
CreateFileA
InterlockedExchange
SetHandleCount
InterlockedDecrement
GetConsoleCP
GetCurrentDirectoryA
IsValidCodePage
WritePrivateProfileStructW
SetThreadPriority
GetCPInfo
GetComputerNameW
GetModuleHandleA
GetCurrentThread
GetConsoleMode
WaitForDebugEvent
CreateProcessW
WideCharToMultiByte
VirtualQuery
LoadResource
LCMapStringA
SetStdHandle
CompareStringW
FlushViewOfFile
DeleteFileW
TerminateProcess
GetStartupInfoA
CreateMailslotW
MoveFileW
GetEnvironmentStringsW
RtlUnwind
ExitThread
InitializeCriticalSection
GetTimeFormatA
SetEnvironmentVariableA
GetProcessHeap
GetCurrentProcess
GetTimeZoneInformation
SetConsoleActiveScreenBuffer
CreateMutexA
HeapFree
WriteConsoleA
SetUnhandledExceptionFilter
FlushConsoleInputBuffer
GetConsoleCursorInfo
GetCurrentThreadId
HeapReAlloc
AddAtomW
GetLogicalDriveStringsW
FileTimeToDosDateTime
IsValidLocale
SetThreadIdealProcessor
InterlockedIncrement
GetTickCount
CloseHandle
GetStringTypeA
OpenMutexA
CreateFileMappingA
HeapCreate
SetLastError
FlushFileBuffers
LoadLibraryA
GetCommandLineA
FindNextFileA
GetCurrentProcessId
ReleaseSemaphore
GetLocaleInfoA
FreeEnvironmentStringsA
ExitProcess
OpenEventA
FreeEnvironmentStringsW
OpenSemaphoreA
GetPrivateProfileStringW
EnterCriticalSection
GetVersionExA
Sleep
GetNamedPipeHandleStateA
GetUserDefaultLCID
TlsFree
GetSystemTimeAsFileTime
GetStdHandle
EnumSystemLocalesA
FormatMessageW
IsDebuggerPresent
HeapSize
FindResourceA
GetLocaleInfoW
OpenEventW
TlsGetValue
GetWindowsDirectoryA
GetOEMCP
GetDateFormatA
LoadLibraryExW
GlobalLock
TransactNamedPipe
CompareStringA
GetLastError
CreateThread
GetStringTypeW
EnumSystemLocalesW
CreateNamedPipeA
GetPrivateProfileSectionNamesA
LCMapStringW
WriteConsoleInputA
FreeLibrary
GetFileType
MultiByteToWideChar
ReadFile
LeaveCriticalSection
WriteFile
VirtualFree
comctl32
ImageList_AddMasked
ImageList_Create
InitMUILanguage
ImageList_DragLeave
ImageList_SetOverlayImage
DrawInsert
ImageList_EndDrag
InitCommonControlsEx
CreatePropertySheetPageW
CreatePropertySheetPage
ImageList_GetBkColor
ImageList_Copy
ImageList_SetBkColor
ImageList_LoadImageW
ImageList_SetDragCursorImage
DrawStatusTextA
DrawStatusText
CreateUpDownControl
ImageList_ReplaceIcon
CreateToolbarEx
wininet
UnlockUrlCacheEntryFile
InternetCanonicalizeUrlA
InternetLockRequestFile
InternetAlgIdToStringW
InternetShowSecurityInfoByURLA
FindNextUrlCacheEntryExA
CreateUrlCacheContainerA
HttpAddRequestHeadersA
user32
ShowWindow
RegisterClassA
FindWindowW
PostThreadMessageA
MessageBoxA
IsZoomed
MonitorFromRect
GetWindowLongW
CharToOemBuffW
AppendMenuA
DefWindowProcA
SendMessageTimeoutA
SetDoubleClickTime
GetMessageTime
CreateIconIndirect
GetTopWindow
CreateWindowExA
SetMenu
UnregisterClassA
CallMsgFilterA
ShowOwnedPopups
InsertMenuA
SetProcessWindowStation
DestroyMenu
SetWindowLongW
DestroyWindow
RegisterClassExA
GetDlgItemInt
comdlg32
GetSaveFileNameW
ReplaceTextW
Sections
.text Size: 188KB - Virtual size: 185KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 404KB - Virtual size: 403KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 140KB - Virtual size: 139KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ