Static task
static1
Behavioral task
behavioral1
Sample
93cb5ce815fedef5032374765a83731b869618102dd399b7c4494ffd6328048c.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
93cb5ce815fedef5032374765a83731b869618102dd399b7c4494ffd6328048c.exe
Resource
win10v2004-20221111-en
General
-
Target
93cb5ce815fedef5032374765a83731b869618102dd399b7c4494ffd6328048c
-
Size
727KB
-
MD5
18190cbb7d0cb25c2c3b270bcee69770
-
SHA1
83960657bf27650cb5b65711774548614dfa154a
-
SHA256
93cb5ce815fedef5032374765a83731b869618102dd399b7c4494ffd6328048c
-
SHA512
5bdace5ef88ba248a5413410c4f24ed782c9fe500ee591bc4a2609d4a1c96827968527f2df234506d549ba6a7ad2f69e3cbc630b03f94e342244b7f922cdea6f
-
SSDEEP
12288:XV9v1OT2g53ysYPpG6DkbFLYUWW86/RB9aZK4OlYOsqJLpzPeh:F9voT2g5isYPo6DkbxJh86/f96K4zxph
Malware Config
Signatures
Files
-
93cb5ce815fedef5032374765a83731b869618102dd399b7c4494ffd6328048c.exe windows x86
2e92f471ca3171bc297fbff0f89f5070
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
EndDialog
SendDlgItemMessageA
CharNextA
DialogBoxParamA
GetClassNameA
IsCharAlphaA
GetDesktopWindow
GetDlgItemTextA
KillTimer
EnableWindow
SetTimer
PostMessageA
SetFocus
CreateDialogParamA
DestroyWindow
GetDlgItem
GetDC
ReleaseDC
ScreenToClient
SetWindowLongA
CreateWindowExA
SystemParametersInfoA
GetClientRect
MapWindowPoints
SetWindowPos
LoadStringA
MessageBeep
GetSysColor
DispatchMessageA
PeekMessageA
GetWindowRect
shell32
ShellExecuteA
SHBrowseForFolderA
SHGetPathFromIDListA
advapi32
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
gdi32
TextOutA
SetTextColor
SelectObject
SetBkMode
GetTextExtentPointA
GetDeviceCaps
GetObjectA
DeleteObject
CreateFontIndirectA
opengl32
glTexCoord1s
glTexCoord4i
glGetPixelMapusv
glVertex2i
glTexCoord4s
glBegin
glTexCoord2fv
glColorMask
comctl32
PropertySheetA
kernel32
InitializeCriticalSectionAndSpinCount
GetCurrentProcessId
GetTickCount
GetModuleFileNameA
WriteFile
RaiseException
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
IsValidCodePage
SetLastError
TlsFree
CompareStringW
TlsAlloc
TlsGetValue
ExitProcess
GetProcAddress
GetModuleHandleW
SetEnvironmentVariableA
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
LoadLibraryA
GetLocaleInfoW
HeapSize
GetConsoleCP
GetConsoleMode
SetFilePointer
GetCurrentThreadId
CompareStringA
HeapReAlloc
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
GetTimeZoneInformation
IsDebuggerPresent
TlsSetValue
GetCurrentProcess
VirtualAlloc
GetCurrencyFormatA
DebugBreak
GetLogicalDriveStringsW
ReadConsoleOutputCharacterA
GlobalDeleteAtom
OutputDebugStringW
QueryPerformanceCounter
IsValidLocale
HeapAlloc
HeapFree
GetModuleHandleA
GetCommandLineA
GetVersion
HeapDestroy
HeapCreate
VirtualFree
WideCharToMultiByte
GetStringTypeA
GetStringTypeW
MultiByteToWideChar
TerminateProcess
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
GetCPInfo
GetACP
GetOEMCP
FlushFileBuffers
SetHandleCount
GetStdHandle
GetFileType
RtlUnwind
LCMapStringA
LCMapStringW
SetStdHandle
CloseHandle
GetWindowsDirectoryA
LoadResource
LockResource
lstrlenA
lstrcpyA
FindClose
FindFirstFileA
GetDiskFreeSpaceA
Sleep
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
GetFileSize
CreateFileA
GetFileAttributesA
GetSystemTimeAsFileTime
GetLastError
InterlockedIncrement
InterlockedDecrement
GetStartupInfoA
SetUnhandledExceptionFilter
Sections
.text Size: 172KB - Virtual size: 171KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 126.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 531KB - Virtual size: 531KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ