Static task
static1
Behavioral task
behavioral1
Sample
5bdd37bc72f41fa72fee0f345f68455650cc0f521e90e19c1236eff0b8b57e11.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
5bdd37bc72f41fa72fee0f345f68455650cc0f521e90e19c1236eff0b8b57e11.exe
Resource
win10v2004-20221111-en
General
-
Target
5bdd37bc72f41fa72fee0f345f68455650cc0f521e90e19c1236eff0b8b57e11
-
Size
243KB
-
MD5
106caad5c95b8f48a1769b1a68467839
-
SHA1
eb6bd0337bf87535c28597462ca619dd1fddbeeb
-
SHA256
5bdd37bc72f41fa72fee0f345f68455650cc0f521e90e19c1236eff0b8b57e11
-
SHA512
f6daa69530d1d36d6fb464c3c4f81473710a440f11effca3510fe94903c98e3e83eafdbfbf4ddf128ea87322899c096141e601bdf0d33d880302a6de2297c7a5
-
SSDEEP
3072:A51o9UsgxK8uarkLHnvGN3zAg0FuR3XVeY+2AjmYTBiH0jdb:A5f285kLHvG1zAORnA5oHqb
Malware Config
Signatures
Files
-
5bdd37bc72f41fa72fee0f345f68455650cc0f521e90e19c1236eff0b8b57e11.exe windows x86
278323685b675af279c34e87182e3c0b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
wsprintfA
ExitWindowsEx
CharNextA
CharUpperA
EndDialog
GetDesktopWindow
CharPrevA
GetWindowLongA
CallWindowProcA
GetDlgItem
SetForegroundWindow
SetWindowTextA
SendDlgItemMessageA
SetWindowLongA
EnableWindow
SendMessageA
LoadStringA
MsgWaitForMultipleObjects
PeekMessageA
MessageBoxA
SetWindowPos
ReleaseDC
GetDC
GetWindowRect
ShowWindow
DialogBoxIndirectParamA
SetDlgItemTextA
MessageBeep
GetDlgItemTextA
DispatchMessageA
advapi32
EqualSid
AllocateAndInitializeSid
GetTokenInformation
OpenProcessToken
AdjustTokenPrivileges
LookupPrivilegeValueA
FreeSid
RegDeleteValueA
RegOpenKeyExA
RegSetValueExA
RegQueryValueExA
RegCreateKeyExA
RegQueryInfoKeyA
RegCloseKey
kernel32
LCMapStringW
LCMapStringA
FlushFileBuffers
GetConsoleMode
GetConsoleCP
GetLocaleInfoA
GetStringTypeA
GetTimeZoneInformation
MultiByteToWideChar
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
LoadLibraryA
GetStringTypeW
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetStdHandle
CompareStringA
CompareStringW
SetEnvironmentVariableA
HeapSize
ResetEvent
VirtualAlloc
CloseHandle
CreateThread
OpenJobObjectW
FindFirstVolumeMountPointA
GetComputerNameExA
MapViewOfFile
CreateJobObjectW
MoveFileWithProgressA
GetThreadPriority
MulDiv
GetDiskFreeSpaceA
FormatMessageA
GlobalFree
CreateDirectoryA
GetStartupInfoA
LoadLibraryExA
GetCurrentDirectoryA
GetVolumeInformationA
lstrcpynA
GetDriveTypeA
GetSystemInfo
GetTempFileNameA
DosDateTimeToFileTime
LocalFileTimeToFileTime
SetFileTime
SetFilePointer
WriteFile
ReadFile
CreateFileA
SizeofResource
LockResource
FreeResource
GetTempPathA
CreateProcessA
WaitForSingleObject
GetExitCodeProcess
LocalFree
GetVersionExA
TerminateThread
SetCurrentDirectoryA
CreateEventA
SetEvent
CreateMutexA
FindResourceA
LoadResource
HeapAlloc
GetSystemTimeAsFileTime
GetCommandLineA
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
HeapFree
VirtualFree
HeapReAlloc
HeapCreate
GetModuleHandleW
Sleep
GetProcAddress
ExitProcess
GetStdHandle
GetModuleFileNameA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetModuleHandleA
RtlUnwind
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetLastError
GetEnvironmentStringsW
SetHandleCount
GetFileType
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
RaiseException
InitializeCriticalSectionAndSpinCount
Sections
.text Size: 101KB - Virtual size: 100KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 41KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 29KB - Virtual size: 103.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 70KB - Virtual size: 70KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ