Static task
static1
Behavioral task
behavioral1
Sample
264c1c2bce4a686c3fa9b4b6322411422ab2e2aa17eb0f95a5b9c0c7d90e8a3d.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
264c1c2bce4a686c3fa9b4b6322411422ab2e2aa17eb0f95a5b9c0c7d90e8a3d.exe
Resource
win10v2004-20221111-en
General
-
Target
264c1c2bce4a686c3fa9b4b6322411422ab2e2aa17eb0f95a5b9c0c7d90e8a3d
-
Size
212KB
-
MD5
c2093c6143c84f6c0ec0f81239ae08e8
-
SHA1
aa802819a171b39a5a8394a770efc11311a02ad5
-
SHA256
264c1c2bce4a686c3fa9b4b6322411422ab2e2aa17eb0f95a5b9c0c7d90e8a3d
-
SHA512
f187963f97c0f86485c1ee6688a6e5f968dc0bde9f8887d05dc4868a52b96b7211739e0ff150d48fcccfcdaa7ceae39c1f16b70c56ea4a614bc8a63cde3442a3
-
SSDEEP
3072:uqPL1/7w6ZAs+VBK1niXS4Rz+Clmn2tXauPxshFUf8W9tr:7QVxnYWpauPxsRYt
Malware Config
Signatures
Files
-
264c1c2bce4a686c3fa9b4b6322411422ab2e2aa17eb0f95a5b9c0c7d90e8a3d.exe windows x86
6df6e99bae10817058127898c796b82d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_BIND
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetPrivateProfileIntA
GetPrivateProfileIntW
GetModuleFileNameW
LoadLibraryA
GetModuleFileNameA
GetPrivateProfileStringW
GetProcAddress
IsBadWritePtr
LeaveCriticalSection
EnterCriticalSection
GlobalAddAtomA
GlobalDeleteAtom
GetVersionExA
IsDBCSLeadByte
GetCurrentThreadId
GetTickCount
GetSystemTimeAsFileTime
GlobalMemoryStatus
InitializeCriticalSection
SetFilePointer
DeleteCriticalSection
GetACP
GetVersionExW
InterlockedDecrement
InterlockedIncrement
CreateFileMappingA
CreateFileMappingW
QueryPerformanceCounter
QueryPerformanceFrequency
SetEvent
GetProcessTimes
GetCurrentProcess
GetLocalTime
FlushFileBuffers
GetAtomNameA
lstrcmpA
GetCurrentDirectoryW
GetCurrentDirectoryA
CreateFileW
CreateFileA
CreateEventW
CreateEventA
GetFileSize
MapViewOfFile
GetLastError
UnmapViewOfFile
CloseHandle
IsBadReadPtr
IsBadCodePtr
LocalReAlloc
LocalAlloc
GetStdHandle
HeapAlloc
lstrcpynA
WriteFile
ExitProcess
GetProcessHeap
GetCommandLineA
MoveFileA
MultiByteToWideChar
DeleteFileA
LocalFree
GetTempFileNameA
GetCurrentProcessId
GetPrivateProfileStringA
lstrlenA
lstrlenW
WideCharToMultiByte
TerminateProcess
RtlUnwind
RaiseException
user32
RegisterWindowMessageA
RegisterWindowMessageW
SystemParametersInfoA
SystemParametersInfoW
ReleaseDC
GetSysColor
GetSystemMetrics
IntersectRect
OffsetRect
MessageBoxW
MessageBoxA
GetDC
shlwapi
SHCreateStreamOnFileW
PathIsRelativeW
PathCombineW
wvnsprintfW
PathRemoveFileSpecA
wvnsprintfA
wnsprintfA
StrCmpNW
StrCatBuffW
StrCatBuffA
PathAppendW
SHGetValueW
SHGetInverseCMAP
StrStrIW
StrCmpIW
SHCreateShellPalette
wnsprintfW
PathRemoveFileSpecW
PathFindFileNameW
SHStrDupW
StrToIntW
StrCpyNW
ole32
CoCreateInstance
CoTaskMemFree
CreateStreamOnHGlobal
CoTaskMemAlloc
CoInitialize
CoUninitialize
oleaut32
SysFreeString
SysAllocStringLen
SysAllocStringByteLen
VariantChangeType
SysStringLen
SysAllocString
advapi32
RegQueryValueExA
CryptReleaseContext
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
RegOpenKeyExA
gdi32
SetDIBColorTable
SetTextColor
SetStretchBltMode
SetBkMode
RealizePalette
SelectPalette
GetObjectW
GetObjectA
GetDeviceCaps
CreateCompatibleDC
SelectObject
DeleteDC
CreateCompatibleBitmap
GetDIBits
GetDIBColorTable
GetPaletteEntries
CreateDIBSection
DeleteObject
Sections
.text Size: 64KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
�X?5A� Size: 136KB - Virtual size: 136KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE