Static task
static1
Behavioral task
behavioral1
Sample
7dae2d6df9b8bb1df83eb7c5e400ee15ceace7b6abb36f8bbd8a93390c5b48c0.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
7dae2d6df9b8bb1df83eb7c5e400ee15ceace7b6abb36f8bbd8a93390c5b48c0.exe
Resource
win10v2004-20221111-en
General
-
Target
7dae2d6df9b8bb1df83eb7c5e400ee15ceace7b6abb36f8bbd8a93390c5b48c0
-
Size
368KB
-
MD5
ab93ef7f601796456de3833f9053e8de
-
SHA1
5504d0b27b6f390d7d2f4f2fedb7b319e7057e74
-
SHA256
7dae2d6df9b8bb1df83eb7c5e400ee15ceace7b6abb36f8bbd8a93390c5b48c0
-
SHA512
e9782668921e4c9e7b99adf84cbac044e29f11bd300b091846aa44df4a3cdb4a518771d2af362068e8982af36b0f44a422a158b47bc0854f020a139a6195d6b9
-
SSDEEP
6144:hmxGvPr2U3Mza2b0Qw49qSJN4AkH+UtIiCInc3c73OTT+u7:hmUvPqU4LkVSz4AotIieN+8
Malware Config
Signatures
Files
-
7dae2d6df9b8bb1df83eb7c5e400ee15ceace7b6abb36f8bbd8a93390c5b48c0.exe windows x86
f3c69950c481cbcedf929dc676525d27
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
InterlockedDecrement
HeapFree
HeapAlloc
GetProcessHeap
GetCurrentProcess
ExitThread
ReadFile
DisconnectNamedPipe
FlushFileBuffers
ConnectNamedPipe
CreateNamedPipeA
GetModuleHandleA
lstrcpyA
LocalFree
LocalAlloc
CompareStringW
CompareStringA
GetLocaleInfoW
GetTimeZoneInformation
GetSystemInfo
VirtualProtect
SetStdHandle
SetConsoleCtrlHandler
InitializeCriticalSection
LCMapStringW
LCMapStringA
IsValidCodePage
InterlockedIncrement
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
GetDateFormatA
GetTimeFormatA
GetStringTypeW
MultiByteToWideChar
GetStringTypeA
HeapReAlloc
VirtualAlloc
GetCPInfo
GetOEMCP
GetACP
EnterCriticalSection
FatalAppExitA
LeaveCriticalSection
IsBadCodePtr
IsBadWritePtr
IsBadReadPtr
RaiseException
SetUnhandledExceptionFilter
VirtualFree
HeapCreate
HeapDestroy
DeleteCriticalSection
GetFileType
SetHandleCount
PulseEvent
CreateMutexA
LoadLibraryA
ReleaseSemaphore
CreateSemaphoreA
DeviceIoControl
FindFirstFileA
DeleteFileA
FindClose
MoveFileA
CopyFileA
GetSystemDirectoryA
GetTickCount
GetCurrentProcessId
GetVersionExA
GetModuleFileNameA
GetSystemTime
OutputDebugStringA
ExitProcess
OpenMutexA
ReleaseMutex
GetCurrentThreadId
CallNamedPipeA
WaitForSingleObject
TerminateThread
TerminateProcess
Sleep
OpenEventA
CreateThread
GetSystemPowerStatus
CreateEventA
ResetEvent
SetEvent
CreateProcessA
GetPrivateProfileStringA
CreateFileA
SetFilePointer
WriteFile
WaitForMultipleObjects
CloseHandle
GetLastError
GetProcAddress
FreeLibrary
IsValidLocale
RtlUnwind
GetCommandLineA
GetStartupInfoA
TlsAlloc
SetLastError
GetCurrentThread
TlsFree
TlsSetValue
TlsGetValue
HeapSize
InterlockedExchange
VirtualQuery
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetEnvironmentVariableA
user32
WindowFromDC
MapWindowPoints
IntersectRect
GetWindowRect
ExitWindowsEx
SystemParametersInfoA
OpenDesktopA
CloseDesktop
ChangeDisplaySettingsExA
MsgWaitForMultipleObjects
GetCursorPos
GetDesktopWindow
SetForegroundWindow
WaitForInputIdle
MessageBoxA
PostMessageA
GetMessageA
TranslateMessage
DispatchMessageA
IsWindow
DestroyWindow
FindWindowA
RegisterClassA
CreateWindowExA
ShowWindow
DefWindowProcA
GetSystemMetrics
SetWindowPos
GetCursor
LoadCursorA
SetCursor
UnregisterHotKey
RegisterHotKey
RegisterWindowMessageA
KillTimer
SetTimer
ChangeDisplaySettingsA
EnumDisplaySettingsA
BroadcastSystemMessageA
gdi32
GetClipBox
GetDeviceCaps
DeleteDC
CreateDCA
ExtEscape
advapi32
LookupPrivilegeValueA
AdjustTokenPrivileges
OpenProcessToken
GetLengthSid
ImpersonateLoggedOnUser
GetUserNameA
RevertToSelf
RegDeleteKeyA
RegQueryInfoKeyA
RegEnumKeyExA
RegEnumValueA
SetServiceStatus
RegisterServiceCtrlHandlerA
StartServiceCtrlDispatcherA
RegisterEventSourceA
ReportEventA
DeleteService
CreateServiceA
RegCreateKeyA
DeregisterEventSource
OpenSCManagerA
OpenServiceA
CloseServiceHandle
QueryServiceStatus
RegOpenKeyExA
RegQueryValueExA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
RegDeleteValueA
AllocateAndInitializeSid
FreeSid
InitializeSecurityDescriptor
SetSecurityDescriptorOwner
InitializeAcl
AddAccessAllowedAce
SetSecurityDescriptorDacl
Sections
.text Size: 248KB - Virtual size: 247KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 108KB - Virtual size: 107KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ