Static task
static1
Behavioral task
behavioral1
Sample
4e8b718e277439a9afca8da43749f41251f8cce61f185887b71636ec5001c917.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4e8b718e277439a9afca8da43749f41251f8cce61f185887b71636ec5001c917.exe
Resource
win10v2004-20221111-en
General
-
Target
4e8b718e277439a9afca8da43749f41251f8cce61f185887b71636ec5001c917
-
Size
1.4MB
-
MD5
2b6d2f04a009b588d2ae33558d4d49f7
-
SHA1
7f115d076fcd9cfef6ae2db62629dd90c1107de0
-
SHA256
4e8b718e277439a9afca8da43749f41251f8cce61f185887b71636ec5001c917
-
SHA512
55986e596502b3aea5604dd056ef2bfb8e876ab7fde1e99cc02b612b40cd9ebc303bb5dc3d65e9a16a02834bcb2cb575b85681a4e4cebc989c6ee11b4646444b
-
SSDEEP
24576:hw45Lf0MaWecsvPLqtCIBMUhfrq/k6uPFPU:kOhj8
Malware Config
Signatures
Files
-
4e8b718e277439a9afca8da43749f41251f8cce61f185887b71636ec5001c917.exe windows x86
be7d8b8cd401c172eee86f29225964be
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetNumberFormatA
FindAtomA
Module32FirstW
FlushInstructionCache
ContinueDebugEvent
SetEnvironmentVariableW
IsBadWritePtr
OpenEventW
SetEndOfFile
MapUserPhysicalPagesScatter
GetProcAddress
CreateDirectoryW
GetPriorityClass
FoldStringA
SetVolumeMountPointA
GetNumberOfConsoleInputEvents
CreateFileW
LCMapStringA
CopyFileExW
GetAtomNameW
SetConsoleTextAttribute
AreFileApisANSI
GetComputerNameW
GetModuleHandleW
GetPrivateProfileStructA
SetThreadLocale
ExpandEnvironmentStringsA
GetProfileSectionA
ProcessIdToSessionId
GetConsoleAliasesW
PeekNamedPipe
CreateEventA
FileTimeToDosDateTime
HeapSize
CompareStringA
SetThreadPriority
SetConsoleOutputCP
GetVolumeNameForVolumeMountPointW
CreateNamedPipeA
GetPrivateProfileStringA
GetLogicalDriveStringsA
GetConsoleAliasesA
FindFirstVolumeMountPointA
lstrcmpA
GetComputerNameA
SetThreadIdealProcessor
GetDevicePowerState
SetComputerNameExW
GetDriveTypeW
GetVolumePathNameW
GetNamedPipeHandleStateW
DosDateTimeToFileTime
DeleteTimerQueue
GetConsoleAliasW
GetCurrentConsoleFont
ResetEvent
ReadProcessMemory
SetConsoleMode
GetFileType
OpenMutexA
GetLogicalDrives
LocalReAlloc
GetACP
FormatMessageA
FindResourceExA
FreeUserPhysicalPages
MoveFileWithProgressW
GetUserDefaultLCID
GetUserDefaultUILanguage
Module32Next
GetQueuedCompletionStatus
lstrcpynA
VerifyVersionInfoW
DeviceIoControl
SetEvent
GetDiskFreeSpaceW
GetProcessAffinityMask
GetLongPathNameW
SetThreadPriorityBoost
GetUserDefaultLangID
DeleteVolumeMountPointA
GetBinaryTypeA
GetConsoleOutputCP
SetFileTime
FreeEnvironmentStringsW
SearchPathA
SetCalendarInfoW
GetEnvironmentStrings
SetFileAttributesW
FindAtomW
EnumCalendarInfoW
CompareStringW
GetModuleFileNameW
OpenSemaphoreW
PrepareTape
WaitForMultipleObjects
SetConsoleActiveScreenBuffer
DisconnectNamedPipe
SetLocaleInfoA
GetAtomNameA
ReadDirectoryChangesW
DnsHostnameToComputerNameA
ResetWriteWatch
FindResourceA
AddAtomA
CreateIoCompletionPort
ReadFile
AssignProcessToJobObject
TlsAlloc
ReplaceFileA
EnumCalendarInfoA
CreateSemaphoreA
VirtualAlloc
GetMailslotInfo
CreateToolhelp32Snapshot
GetProfileSectionW
CreateHardLinkW
OpenFileMappingA
GetSystemDirectoryA
GetPrivateProfileSectionNamesA
GetTimeFormatW
CancelWaitableTimer
GetFullPathNameA
VirtualQuery
GetSystemInfo
VirtualProtect
RtlUnwind
GetStringTypeW
GetStringTypeA
MultiByteToWideChar
WriteConsoleA
FindFirstFileA
lstrcpyA
CreateFileMappingA
SwitchToThread
OpenEventA
DefineDosDeviceA
SystemTimeToFileTime
GetSystemDirectoryW
ExpandEnvironmentStringsW
FlushConsoleInputBuffer
CreateWaitableTimerW
SetTapePosition
lstrcmpW
GetWindowsDirectoryA
OpenJobObjectW
GetCPInfoExA
CreateTimerQueue
VerSetConditionMask
CreateDirectoryExW
WideCharToMultiByte
GetThreadContext
GetExitCodeThread
GetFileInformationByHandle
GetProcessPriorityBoost
QueryInformationJobObject
GetCurrentThread
GetDiskFreeSpaceExA
GetShortPathNameW
SetMailslotInfo
FileTimeToLocalFileTime
SetConsoleCP
SetFileAttributesA
SetStdHandle
SetSystemPowerState
SetThreadAffinityMask
GetConsoleMode
CancelIo
CreateMutexW
GetLocaleInfoA
SetErrorMode
ReleaseMutex
GetLogicalDriveStringsW
SetHandleInformation
GetNamedPipeInfo
GetFileAttributesA
GetVolumeNameForVolumeMountPointA
CreateDirectoryExA
LCMapStringW
GetDiskFreeSpaceA
OpenFileMappingW
OpenProcess
HeapReAlloc
InitializeCriticalSection
GetCPInfo
GetOEMCP
HeapAlloc
LoadLibraryA
EnterCriticalSection
LeaveCriticalSection
HeapFree
VirtualFree
HeapCreate
HeapDestroy
TlsGetValue
TlsSetValue
GetCurrentThreadId
SetLastError
TlsFree
DeleteCriticalSection
GetStartupInfoA
SetHandleCount
GetEnvironmentStringsW
GetLastError
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetModuleFileNameA
GetStdHandle
WriteFile
ExitProcess
GetVersionExA
GetCommandLineA
GetModuleHandleA
user32
GetAltTabInfoA
CheckDlgButton
AttachThreadInput
DispatchMessageW
GetParent
TrackPopupMenu
SetWindowLongW
GetWindowInfo
CloseDesktop
UnregisterClassW
DestroyAcceleratorTable
ShowWindow
IsDialogMessageW
comctl32
ImageList_Draw
ImageList_DragEnter
ImageList_EndDrag
ImageList_LoadImageW
ImageList_BeginDrag
ImageList_SetBkColor
InitializeFlatSB
ImageList_Write
ImageList_SetIconSize
ImageList_DragShowNolock
ImageList_Replace
ImageList_DrawIndirect
ImageList_GetImageCount
ImageList_Destroy
ImageList_GetImageInfo
ImageList_Read
CreatePropertySheetPageA
ImageList_DragLeave
ImageList_ReplaceIcon
ImageList_Create
ImageList_SetDragCursorImage
CreatePropertySheetPageW
ImageList_Remove
DestroyPropertySheetPage
FlatSB_SetScrollInfo
FlatSB_SetScrollPos
CreateStatusWindowW
advapi32
DuplicateTokenEx
CloseServiceHandle
RegOpenKeyExW
ReportEventW
RegDeleteKeyW
RegQueryValueExA
RegSetValueExA
ImpersonateLoggedOnUser
IsValidSid
CreateProcessAsUserW
ControlService
GetSecurityDescriptorControl
MakeSelfRelativeSD
RegOpenKeyW
GetAclInformation
StartServiceW
CryptReleaseContext
AddAccessAllowedAce
InitializeAcl
CryptGetHashParam
RegSetValueExW
GetSidSubAuthority
EqualSid
shell32
ShellExecuteExW
SHChangeNotify
ShellExecuteW
SHGetDesktopFolder
SHGetFolderPathW
SHBindToParent
SHBrowseForFolderW
CommandLineToArgvW
SHFileOperationW
SHGetSpecialFolderPathW
SHGetSpecialFolderLocation
SHGetMalloc
ole32
ReleaseStgMedium
CoCreateGuid
OleSaveToStream
OleSetContainedObject
OleIsRunning
CreatePointerMoniker
CoAddRefServerProcess
MkParseDisplayName
CoGetCurrentProcess
OleRegEnumFormatEtc
CLIPFORMAT_UserFree
StgIsStorageFile
SetConvertStg
OleBuildVersion
OleSetClipboard
oleaut32
SafeArrayGetUBound
SafeArrayCreate
SafeArrayGetLBound
VariantChangeTypeEx
GetActiveObject
SafeArrayPtrOfIndex
VariantInit
SysAllocStringByteLen
SysReAllocStringLen
VariantCopy
SysStringLen
GetErrorInfo
SysAllocStringLen
SysFreeString
Sections
.text Size: 447KB - Virtual size: 446KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 925KB - Virtual size: 927KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 36KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ