Static task
static1
Behavioral task
behavioral1
Sample
728107b1768c42edb9b13c13c999680dfde381b9ec29f659e7235f12ac4da5ad.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
728107b1768c42edb9b13c13c999680dfde381b9ec29f659e7235f12ac4da5ad.exe
Resource
win10v2004-20220812-en
General
-
Target
728107b1768c42edb9b13c13c999680dfde381b9ec29f659e7235f12ac4da5ad
-
Size
920KB
-
MD5
0a931488469729fed67c86632c825229
-
SHA1
feda54a1e5842e0e82568f17d4e364b465e1e5c3
-
SHA256
728107b1768c42edb9b13c13c999680dfde381b9ec29f659e7235f12ac4da5ad
-
SHA512
72d20d3b351a47933376eb9f84e83976fecafbe297ab53fdcd612033d1aaab40e111626338cf5fdeab39b3ed9af8db38ed444dbdc127a90179251c959e387bae
-
SSDEEP
12288:/8wTWNtDNpzXeRuiLFzjWYEPQ4FCh/IO8VsdlCD6Gpar4wBKt0DaK9ZOFUFaVozE:k9b6kCkVsdQDpy4wQt0d9c29zo1Dy2
Malware Config
Signatures
Files
-
728107b1768c42edb9b13c13c999680dfde381b9ec29f659e7235f12ac4da5ad.exe windows x86
cb384c468f9631c0c29d83f6ee38db05
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
OpenFileMappingW
VerSetConditionMask
GetUserDefaultUILanguage
DeviceIoControl
DeleteTimerQueueEx
CreateMutexA
GetNumberFormatW
ExpandEnvironmentStringsA
OpenEventA
DeleteAtom
IsValidCodePage
FlushViewOfFile
CreateMutexW
GetModuleFileNameW
Module32NextW
GetThreadTimes
MoveFileWithProgressW
GetProcAddress
SetCalendarInfoA
CreateDirectoryW
GetModuleHandleA
GetFileAttributesW
CreateNamedPipeA
DeleteTimerQueueTimer
GetFileAttributesA
GetThreadLocale
GetLongPathNameW
MapViewOfFileEx
GetProcessIoCounters
GetConsoleAliasesA
FindFirstVolumeA
GetOEMCP
SetConsoleOutputCP
FindFirstVolumeW
GetSystemDefaultLangID
GetDriveTypeW
CreateEventW
CopyFileW
SetSystemTimeAdjustment
GetCalendarInfoA
Module32First
GetPrivateProfileSectionNamesA
ProcessIdToSessionId
GetTimeFormatA
SetTapeParameters
DnsHostnameToComputerNameA
PostQueuedCompletionStatus
GetFullPathNameW
GetCurrencyFormatA
ReplaceFileA
MapUserPhysicalPages
SetThreadContext
CopyFileA
Module32Next
GetThreadPriority
SetMailslotInfo
FindFirstFileA
FlushInstructionCache
VirtualAlloc
GetCPInfoExA
SetConsoleCP
GetCalendarInfoW
SetProcessWorkingSetSize
MulDiv
AreFileApisANSI
MoveFileWithProgressA
CopyFileExW
OpenEventW
GetUserDefaultLCID
GetConsoleCursorInfo
GetStringTypeExA
CreateDirectoryExW
WaitForMultipleObjectsEx
IsSystemResumeAutomatic
HeapSize
FindFirstFileExA
FreeEnvironmentStringsA
SetPriorityClass
DeleteTimerQueue
SetConsoleDisplayMode
CreateProcessA
SetEndOfFile
GetDateFormatA
SetComputerNameExW
GetDiskFreeSpaceExW
GetSystemWindowsDirectoryA
LCMapStringW
UnregisterWaitEx
FindResourceA
WideCharToMultiByte
MoveFileW
GetProfileStringA
GetFileTime
FreeUserPhysicalPages
VirtualProtect
SetConsoleCtrlHandler
GetFileSize
LCMapStringA
GetCPInfo
lstrcatA
LocalFileTimeToFileTime
MapUserPhysicalPagesScatter
GetConsoleAliasesW
GetLogicalDriveStringsA
GetCurrentDirectoryW
EnumCalendarInfoExA
SetInformationJobObject
OpenMutexA
GetConsoleAliasA
SetConsoleTextAttribute
SetNamedPipeHandleState
GetCurrentDirectoryA
ReadDirectoryChangesW
SetVolumeMountPointA
ConvertDefaultLocale
ReadProcessMemory
QueryInformationJobObject
VerifyVersionInfoW
GetPrivateProfileIntA
GetLocaleInfoW
GetAtomNameW
CreateSemaphoreA
CreateDirectoryA
CompareStringA
GetLongPathNameA
FindAtomW
GetPrivateProfileStructA
GetStringTypeW
GetEnvironmentVariableW
BindIoCompletionCallback
SetThreadPriorityBoost
SetCurrentDirectoryW
GetFileType
GlobalSize
OpenJobObjectA
OpenThread
DeleteVolumeMountPointA
GetACP
SetThreadIdealProcessor
GetProcessAffinityMask
GetDriveTypeA
GetShortPathNameW
GetBinaryTypeA
GetConsoleMode
GetProcessTimes
ResetEvent
SetSystemPowerState
GetLocaleInfoA
HeapSetInformation
GetTempPathA
HeapValidate
CreateHardLinkA
FormatMessageA
ReplaceFileW
GetEnvironmentStrings
SetFilePointerEx
FindNextChangeNotification
GetCurrentProcess
GetStringTypeExW
ExpandEnvironmentStringsW
GetVolumeInformationA
GetSystemDirectoryW
SetConsoleActiveScreenBuffer
GetStdHandle
CancelWaitableTimer
ResetWriteWatch
SetHandleCount
CancelIo
FoldStringW
GetStringTypeA
SetHandleInformation
GetTempPathW
DosDateTimeToFileTime
DuplicateHandle
EraseTape
GetConsoleAliasExesA
SearchPathA
CreateJobObjectW
GetPrivateProfileStructW
GetLocalTime
SetProcessPriorityBoost
GetConsoleOutputCP
CreateMailslotA
DisconnectNamedPipe
CreateEventA
SetThreadAffinityMask
EnumCalendarInfoExW
ChangeTimerQueueTimer
OpenWaitableTimerW
PeekNamedPipe
SetErrorMode
GetHandleInformation
GetVolumeInformationW
GetLogicalDriveStringsW
MultiByteToWideChar
HeapReAlloc
GetProcessWorkingSetSize
ContinueDebugEvent
OpenJobObjectW
GetDiskFreeSpaceW
SetFileAttributesW
GetSystemDirectoryA
SetProcessAffinityMask
SetConsoleMode
GetProfileStringW
GetNamedPipeInfo
GetUserDefaultLangID
Toolhelp32ReadProcessMemory
GetPriorityClass
GetEnvironmentVariableA
SetWaitableTimer
GetTapeStatus
GetCurrencyFormatW
IsDBCSLeadByteEx
GetLogicalDrives
HeapAlloc
RtlUnwind
Sleep
HeapFree
TerminateProcess
IsDebuggerPresent
UnhandledExceptionFilter
LoadLibraryW
EnterCriticalSection
LeaveCriticalSection
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
HeapCreate
InterlockedDecrement
GetLastError
GetCurrentThreadId
SetLastError
InterlockedIncrement
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
EncodePointer
DeleteCriticalSection
GetStartupInfoW
GetCommandLineA
SetUnhandledExceptionFilter
GetModuleHandleW
ExitProcess
DecodePointer
WriteFile
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
InitializeCriticalSectionAndSpinCount
IsProcessorFeaturePresent
user32
RedrawWindow
advapi32
OpenThreadToken
RegCreateKeyW
CryptGenRandom
RegSetValueExW
SetSecurityDescriptorGroup
OpenServiceW
GetSidSubAuthorityCount
CryptGetHashParam
GetAce
AddAccessAllowedAce
AddAce
RegEnumKeyW
RegCreateKeyExW
OpenSCManagerW
SetEntriesInAclW
IsValidSid
SetNamedSecurityInfoW
GetLengthSid
shell32
SHGetFileInfoW
SHFileOperationW
SHGetDesktopFolder
SHGetSpecialFolderPathW
SHGetSpecialFolderLocation
SHGetFolderPathW
ShellExecuteW
SHChangeNotify
ShellExecuteExW
CommandLineToArgvW
SHBrowseForFolderW
SHBindToParent
SHGetMalloc
oleaut32
SafeArrayGetUBound
SafeArrayPtrOfIndex
SysFreeString
GetActiveObject
VariantChangeType
VariantCopy
SysAllocStringByteLen
SysStringLen
VariantInit
SysReAllocStringLen
VariantCopyInd
GetErrorInfo
SafeArrayCreate
VariantChangeTypeEx
VariantClear
SysAllocStringLen
SafeArrayGetLBound
Sections
.text Size: 303KB - Virtual size: 303KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 594KB - Virtual size: 593KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 399KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 19KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ