Static task
static1
Behavioral task
behavioral1
Sample
54603a04792585f9f209b189f2a7937de987ce897d3b1381382842d90fb4867c.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
54603a04792585f9f209b189f2a7937de987ce897d3b1381382842d90fb4867c.exe
Resource
win10v2004-20220812-en
General
-
Target
54603a04792585f9f209b189f2a7937de987ce897d3b1381382842d90fb4867c
-
Size
937KB
-
MD5
9a699be8ce689aee40d3640029908c7c
-
SHA1
7d333847e8de4d647c822cc655b807725e92ee37
-
SHA256
54603a04792585f9f209b189f2a7937de987ce897d3b1381382842d90fb4867c
-
SHA512
76f9db7ddddcd5ca64350e0b937fba1c3df3fcd4b305255df848130b1d05415d32a98db07232e62f9e8722258a2226aae960471192f5718cf7016d586fe3972c
-
SSDEEP
24576:LVjTeG11yTcRExdMWXlhKPMACMezBqDfmaDEx8Z:LVjTe2+DMWXlQCzIfmawxS
Malware Config
Signatures
Files
-
54603a04792585f9f209b189f2a7937de987ce897d3b1381382842d90fb4867c.exe windows x86
c580b907c4fd77c6300922a9c60565f0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetSystemTimeAdjustment
FormatMessageW
GetFullPathNameW
GetTimeFormatA
MoveFileWithProgressA
GetConsoleWindow
CreateDirectoryExW
SetErrorMode
GetFileType
OpenFileMappingW
SetSystemPowerState
GetConsoleAliasExesLengthW
GetLogicalDriveStringsW
ResetWriteWatch
SetConsoleDisplayMode
GetLocaleInfoW
ProcessIdToSessionId
GetTapeStatus
GetAtomNameA
IsDBCSLeadByteEx
GetProfileSectionA
GetCurrentProcess
FindFirstVolumeA
GetAtomNameW
VerifyVersionInfoW
OpenWaitableTimerA
GetDriveTypeA
SetLocaleInfoW
SetConsoleMode
GetCalendarInfoW
Module32Next
SearchPathA
FindResourceExW
GetEnvironmentStrings
GetNumberFormatA
DefineDosDeviceW
GetConsoleAliasA
GetDateFormatA
SetFileAttributesW
GetNamedPipeInfo
OpenEventW
SetCurrentDirectoryW
GetCurrencyFormatA
CreateWaitableTimerA
GetDevicePowerState
GetCurrentDirectoryA
ResetEvent
CreateToolhelp32Snapshot
GetModuleFileNameA
Module32FirstW
GetPrivateProfileStructW
GetProfileIntA
GetProfileStringW
EraseTape
GetProfileStringA
SetStdHandle
CreateFileMappingW
PeekNamedPipe
GetDateFormatW
GetFileAttributesExW
GetWindowsDirectoryA
PrepareTape
GetVolumePathNameA
FindResourceExA
FindAtomA
GetBinaryTypeW
FlushInstructionCache
CopyFileA
VirtualAlloc
GetDriveTypeW
OpenProcess
CancelWaitableTimer
CreateNamedPipeW
ChangeTimerQueueTimer
GetCompressedFileSizeA
GetThreadLocale
OpenEventA
OpenMutexW
GetVersion
GetSystemDirectoryW
GetFileTime
GetProcessWorkingSetSize
GetTempPathW
GetLongPathNameA
GetNamedPipeHandleStateA
SetThreadContext
CreateWaitableTimerW
GetStringTypeW
GetStringTypeExA
SetProcessWorkingSetSize
GetLocaleInfoA
GetFileInformationByHandle
ReleaseSemaphore
LoadResource
CreateMailslotW
FlushConsoleInputBuffer
CreateHardLinkA
ConvertDefaultLocale
OpenWaitableTimerW
CompareStringA
FreeConsole
SetPriorityClass
GetBinaryTypeA
GetEnvironmentVariableW
ReadFile
GetPriorityClass
GetPrivateProfileIntA
FlushViewOfFile
SetEnvironmentVariableA
CreateSemaphoreW
DnsHostnameToComputerNameW
GetProfileSectionW
CreateNamedPipeA
GetSystemDefaultUILanguage
SetTapePosition
FreeEnvironmentStringsW
GetThreadPriority
DefineDosDeviceA
SetThreadPriority
CopyFileExW
FlushFileBuffers
FindVolumeClose
MultiByteToWideChar
TryEnterCriticalSection
GetConsoleOutputCP
SetWaitableTimer
RegisterWaitForSingleObject
OpenMutexA
FreeUserPhysicalPages
CreateFileW
GlobalHandle
IsSystemResumeAutomatic
ReleaseMutex
DeviceIoControl
lstrcmpW
ExpandEnvironmentStringsA
DeleteTimerQueue
GetDiskFreeSpaceExW
TlsSetValue
ExpandEnvironmentStringsW
SetHandleCount
GetModuleHandleW
SetInformationJobObject
GetFullPathNameA
GetProcAddress
BindIoCompletionCallback
SetEvent
SetFileAttributesA
FindAtomW
VirtualProtect
FoldStringW
GetDiskFreeSpaceW
CreateTimerQueueTimer
MoveFileA
IsBadWritePtr
GetConsoleScreenBufferInfo
GetConsoleMode
FindFirstVolumeW
SetEndOfFile
GetPrivateProfileStructA
GetCPInfoExA
SetConsoleActiveScreenBuffer
MapViewOfFileEx
EnumCalendarInfoExW
ReadProcessMemory
MoveFileWithProgressW
SetNamedPipeHandleState
GetShortPathNameA
SetThreadAffinityMask
GetNumberFormatW
GetCurrencyFormatW
DosDateTimeToFileTime
GetProfileIntW
GetFileAttributesA
FindNextChangeNotification
GetPrivateProfileStringA
LCMapStringW
OpenJobObjectA
CreateJobObjectA
Toolhelp32ReadProcessMemory
CreateTimerQueue
GetCPInfo
SetProcessPriorityBoost
AddAtomW
GetComputerNameA
SetCalendarInfoW
ContinueDebugEvent
GetVolumeNameForVolumeMountPointW
GetWindowsDirectoryW
GetTempFileNameA
GetTimeFormatW
FormatMessageA
GetCurrentConsoleFont
WaitForSingleObjectEx
SetCurrentDirectoryA
GetFileSize
GetPrivateProfileSectionW
GetVolumePathNameW
SetConsoleCP
SetTapeParameters
GetProcessTimes
GetCurrentThread
GetComputerNameExW
ReadDirectoryChangesW
AssignProcessToJobObject
GetVolumeInformationW
GetShortPathNameW
MapUserPhysicalPages
CreateHardLinkW
CreateFileMappingA
GetLogicalDrives
GetStringTypeExW
GetVolumeInformationA
UnlockFile
GetSystemDefaultLangID
SetCalendarInfoA
GetFileSizeEx
GetPrivateProfileSectionNamesW
GetUserDefaultLCID
CompareStringW
FoldStringA
GetPrivateProfileStringW
DeleteTimerQueueEx
FindFirstFileW
GetACP
OpenFileMappingA
GetConsoleCP
PostQueuedCompletionStatus
EnumCalendarInfoExA
GetDiskFreeSpaceA
CopyFileW
QueryInformationJobObject
CreateDirectoryExA
Module32First
TlsGetValue
VerSetConditionMask
GetVolumeNameForVolumeMountPointA
DeleteAtom
GetConsoleCursorInfo
SetComputerNameExA
GetThreadTimes
MapUserPhysicalPagesScatter
SetUnhandledExceptionFilter
WaitForMultipleObjectsEx
GetSystemDirectoryA
FindNextFileW
CreateEventA
CreateMutexA
EnumCalendarInfoA
GetLogicalDriveStringsA
RemoveDirectoryA
CreateMutexW
GetProcessPriorityBoost
SetConsoleTextAttribute
GetStringTypeA
GetPrivateProfileIntW
GetCurrentDirectoryW
DisconnectNamedPipe
GetStdHandle
ConvertThreadToFiber
SwitchToThread
FreeEnvironmentStringsA
IsValidCodePage
GetMailslotInfo
GetSystemWindowsDirectoryA
GetSystemWindowsDirectoryW
AreFileApisANSI
FindVolumeMountPointClose
GetProcessIoCounters
GetDiskFreeSpaceExA
GetCPInfoExW
GetPrivateProfileSectionA
HeapReAlloc
HeapAlloc
LCMapStringA
CreateDirectoryA
ReplaceFileA
GetModuleHandleA
DeleteVolumeMountPointA
CancelIo
GetUserDefaultUILanguage
SetThreadLocale
GetLongPathNameW
SetHandleInformation
CreateJobObjectW
GetSystemDefaultLCID
SetVolumeMountPointA
GetConsoleAliasExesA
CreateSemaphoreA
GetEnvironmentVariableA
GetConsoleAliasesW
OpenJobObjectW
SetConsoleCtrlHandler
GetNamedPipeHandleStateW
CreateMailslotA
SetFileTime
CreateEventW
AddAtomA
OpenThread
GetConsoleAliasesA
SetThreadPriorityBoost
GetConsoleAliasW
GetProcessAffinityMask
DeleteTimerQueueTimer
GetConsoleAliasExesLengthA
GetFileAttributesW
SetConsoleOutputCP
FindResourceW
GetOEMCP
DuplicateHandle
ReplaceFileW
WideCharToMultiByte
GetFileAttributesExA
SetProcessAffinityMask
GetNumberOfConsoleInputEvents
GetHandleInformation
GetCalendarInfoA
GetThreadContext
OpenSemaphoreA
SetThreadIdealProcessor
GetUserDefaultLangID
CreateIoCompletionPort
GetConsoleAliasExesW
CreateDirectoryW
FindFirstFileExA
CopyFileExA
FindFirstVolumeMountPointA
MapViewOfFile
GetProcessVersion
OpenSemaphoreW
FindResourceA
GetTempPathA
HeapSize
RtlUnwind
Sleep
HeapFree
TerminateProcess
IsDebuggerPresent
UnhandledExceptionFilter
LoadLibraryW
EnterCriticalSection
LeaveCriticalSection
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetCommandLineA
HeapSetInformation
ExitProcess
DecodePointer
WriteFile
GetModuleFileNameW
GetEnvironmentStringsW
InitializeCriticalSectionAndSpinCount
GetStartupInfoW
DeleteCriticalSection
EncodePointer
TlsAlloc
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
GetLastError
InterlockedDecrement
HeapCreate
IsProcessorFeaturePresent
user32
IsCharAlphaA
advapi32
RegDeleteKeyA
SetServiceStatus
GetSidSubAuthority
LsaOpenPolicy
ReportEventW
RegCloseKey
GetLengthSid
CloseServiceHandle
IsValidSid
QueryServiceStatus
OpenSCManagerA
RegOpenKeyExW
CryptAcquireContextA
AdjustTokenPrivileges
OpenSCManagerW
GetSecurityDescriptorLength
GetAce
RegNotifyChangeKeyValue
DuplicateTokenEx
SetThreadToken
RegDeleteValueW
CryptReleaseContext
GetUserNameW
OpenServiceW
MakeSelfRelativeSD
RegDeleteValueA
RegEnumKeyExA
RegQueryValueExW
GetSidSubAuthorityCount
RegConnectRegistryW
RegFlushKey
RegEnumValueW
GetSecurityDescriptorDacl
CryptHashData
CryptAcquireContextW
LsaClose
SetNamedSecurityInfoW
GetSecurityDescriptorOwner
AddAce
GetTokenInformation
SetSecurityDescriptorDacl
RegEnumKeyExW
GetSecurityDescriptorSacl
RegOpenKeyW
ImpersonateLoggedOnUser
SetEntriesInAclW
RegEnumKeyW
RegisterEventSourceW
SetFileSecurityW
CryptCreateHash
RegQueryValueExA
ChangeServiceConfigW
RegCreateKeyExW
StartServiceA
RegCreateKeyW
CopySid
GetSecurityDescriptorGroup
oleaut32
SafeArrayCreate
SysAllocStringLen
VariantCopy
VariantInit
SysAllocStringByteLen
VariantChangeType
VariantChangeTypeEx
GetActiveObject
VariantClear
SysFreeString
SafeArrayPtrOfIndex
GetErrorInfo
SysStringLen
SafeArrayGetUBound
SysReAllocStringLen
VariantCopyInd
SafeArrayGetLBound
Sections
.text Size: 819KB - Virtual size: 818KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 46KB - Virtual size: 46KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 55KB - Virtual size: 368KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ