Static task
static1
Behavioral task
behavioral1
Sample
b917d38fa1279857cd9351bc69e6289473157194fd3434fd2c8deec1919e7eba.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
b917d38fa1279857cd9351bc69e6289473157194fd3434fd2c8deec1919e7eba.exe
Resource
win10v2004-20220812-en
General
-
Target
b917d38fa1279857cd9351bc69e6289473157194fd3434fd2c8deec1919e7eba
-
Size
958KB
-
MD5
af28a6c8324cca83c28a390b54965463
-
SHA1
d771b138b2bb6d0905f0f04c4f639be99e238913
-
SHA256
b917d38fa1279857cd9351bc69e6289473157194fd3434fd2c8deec1919e7eba
-
SHA512
05344eef5f42b9c4a5eb88fe6bed32a931944746603f784fbfde4df97e3d310b057f026cbe13f319bea621370ee1ebd89d899a67a80dc8c23683c4ca43aed61c
-
SSDEEP
24576:/fs8fSVSkZO9YBI8h6paV4yjbXSduLjCnFfolyXK:nsW9YBIS2ofSIHCnJNK
Malware Config
Signatures
Files
-
b917d38fa1279857cd9351bc69e6289473157194fd3434fd2c8deec1919e7eba.exe windows x86
9dec93fc8b3983af2a5816a426cfce5b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ResetEvent
GetCurrentConsoleFont
GetProcAddress
GetCalendarInfoA
ReadProcessMemory
GetEnvironmentVariableW
GetConsoleAliasW
CreateEventA
CopyFileA
SetEndOfFile
GetCPInfoExW
FreeConsole
GetThreadLocale
GetFileAttributesExW
IsDBCSLeadByteEx
GetLogicalDriveStringsW
SetFileTime
SetConsoleActiveScreenBuffer
EnumCalendarInfoW
GetLogicalDriveStringsA
SetComputerNameExW
GetConsoleAliasExesA
GetNamedPipeHandleStateA
GetNamedPipeHandleStateW
DuplicateHandle
SetVolumeMountPointA
GetDiskFreeSpaceExW
SetConsoleTextAttribute
GetProfileIntA
CreateMutexA
CreateDirectoryExW
GetFileSize
OpenSemaphoreW
FindAtomW
FindResourceExA
GetSystemDefaultUILanguage
SetThreadLocale
LoadResource
GetPrivateProfileIntW
DnsHostnameToComputerNameW
SetProcessPriorityBoost
GetConsoleCP
GetFileInformationByHandle
FlushViewOfFile
GetShortPathNameA
FindFirstFileA
ReplaceFileW
GetDiskFreeSpaceExA
GetPrivateProfileSectionNamesA
GetNamedPipeInfo
GetEnvironmentStrings
OpenEventW
FindVolumeMountPointClose
GetFileAttributesA
GetStringTypeA
GetFileSizeEx
CreateHardLinkA
FindAtomA
GetSystemDefaultLangID
GetConsoleMode
GetModuleFileNameA
FindResourceExW
MapUserPhysicalPages
GetUserDefaultUILanguage
CreateHardLinkW
GetSystemDirectoryW
GetConsoleWindow
AddAtomA
GetFullPathNameW
GetConsoleCursorInfo
ReleaseSemaphore
FlushInstructionCache
DeleteTimerQueueEx
PeekNamedPipe
Module32FirstW
GetFileAttributesExA
CreateTimerQueue
GetCompressedFileSizeA
GetModuleHandleW
SetLocaleInfoA
MoveFileWithProgressW
GetAtomNameW
ReplaceFileA
SetThreadPriority
GetVolumePathNameA
GetSystemWindowsDirectoryW
GetLocaleInfoW
GetCPInfoExA
SetPriorityClass
VerSetConditionMask
GetBinaryTypeA
CancelIo
MapUserPhysicalPagesScatter
SetThreadPriorityBoost
ExpandEnvironmentStringsA
GetProfileSectionW
FindFirstFileExA
DefineDosDeviceA
CreateMutexW
GetLongPathNameW
OpenJobObjectW
GetTempPathW
OpenMutexA
GetProcessWorkingSetSize
DeleteAtom
GetThreadPriority
GetWindowsDirectoryA
GetTempPathA
SetProcessAffinityMask
GetFullPathNameA
GetProfileStringA
CopyFileExA
GetACP
GetConsoleAliasExesLengthA
GetCurrentThread
GetEnvironmentVariableA
GetPrivateProfileIntA
CreateDirectoryA
GetSystemWindowsDirectoryA
SetEvent
GetLongPathNameA
CreateJobObjectA
SetInformationJobObject
GetProcessAffinityMask
AreFileApisANSI
DnsHostnameToComputerNameA
SetConsoleCP
SetSystemPowerState
GetCalendarInfoW
GetConsoleAliasesW
IsValidCodePage
FormatMessageA
FindResourceA
GetVolumeInformationW
GetModuleHandleA
MapViewOfFile
GetPrivateProfileStructW
GetHandleInformation
ChangeTimerQueueTimer
GetModuleFileNameW
MultiByteToWideChar
GetCurrencyFormatA
FindFirstVolumeW
GetStringTypeW
SetProcessWorkingSetSize
CreateFileMappingW
WideCharToMultiByte
GetThreadTimes
VirtualAlloc
OpenSemaphoreA
CreateDirectoryExA
GetCompressedFileSizeW
GetConsoleAliasExesW
Module32Next
SetConsoleOutputCP
GetNumberOfConsoleInputEvents
GetLocaleInfoA
DeleteTimerQueue
GetConsoleAliasA
OpenMutexW
GetDevicePowerState
GetNumberFormatA
MoveFileWithProgressA
GetConsoleAliasExesLengthW
DeviceIoControl
GetProfileSectionA
Module32First
ReadFile
SetSystemTimeAdjustment
SetThreadAffinityMask
MapViewOfFileEx
EraseTape
AddAtomW
GetUserDefaultLangID
EnumCalendarInfoA
CreateDirectoryW
QueryInformationJobObject
GetStringTypeExA
OpenFileMappingA
ContinueDebugEvent
GetDiskFreeSpaceA
GetDriveTypeW
GetFileType
GetVersion
GetMailslotInfo
CopyFileExW
GetPrivateProfileStructA
FoldStringW
CreateWaitableTimerW
GetUserDefaultLCID
CreateSemaphoreA
GetBinaryTypeW
GetVolumePathNameW
GetCurrentDirectoryA
SetLocaleInfoW
OpenWaitableTimerW
FoldStringA
GetDriveTypeA
SearchPathA
EnumCalendarInfoExW
GetTimeFormatA
GetCPInfo
SetMailslotInfo
FlushFileBuffers
GetPriorityClass
CreateFileMappingA
PostQueuedCompletionStatus
Module32NextW
SetCurrentDirectoryW
GetLogicalDrives
SetTapeParameters
GetDiskFreeSpaceW
ReadDirectoryChangesW
GetPrivateProfileSectionNamesW
EnumCalendarInfoExA
SetHandleCount
MoveFileA
FileTimeToDosDateTime
GetComputerNameW
GetTempFileNameA
GetShortPathNameW
GetPrivateProfileSectionW
SwitchToThread
GetSystemDirectoryA
SetThreadIdealProcessor
FindVolumeClose
IsBadReadPtr
GetCurrencyFormatW
GetDateFormatA
FreeUserPhysicalPages
LocalReAlloc
SetEnvironmentVariableA
GetStartupInfoA
SetCalendarInfoA
OpenEventA
GetProfileIntW
FindResourceW
GetDateFormatW
GetProcessVersion
CreateTapePartition
SetFileAttributesW
GetConsoleScreenBufferInfo
OpenThread
SetConsoleCtrlHandler
SetWaitableTimer
GetProcessPriorityBoost
ProcessIdToSessionId
GetProcessTimes
GetNumberFormatW
GetStringTypeExW
ExpandEnvironmentStringsW
GetThreadContext
GlobalHandle
SetFileAttributesA
PrepareTape
CreateFileW
VirtualQuery
FreeEnvironmentStringsW
CreateNamedPipeW
GlobalAddAtomW
ReleaseMutex
GetFileTime
LCMapStringW
GetConsoleAliasesA
FindFirstVolumeMountPointA
FindFirstVolumeA
GetConsoleOutputCP
OpenFileMappingW
CancelWaitableTimer
CreateIoCompletionPort
DosDateTimeToFileTime
DefineDosDeviceW
LCMapStringA
FreeEnvironmentStringsA
CreateWaitableTimerA
GetVolumeInformationA
HeapReAlloc
HeapAlloc
ResetWriteWatch
CreateJobObjectW
DeleteVolumeMountPointA
GetPrivateProfileStringA
SetComputerNameExA
GetOEMCP
SetStdHandle
SetCalendarInfoW
CompareStringW
SetUnhandledExceptionFilter
SetErrorMode
SetConsoleMode
GetPrivateProfileStringW
SetNamedPipeHandleState
CreateNamedPipeA
GetFileAttributesW
DeleteTimerQueueTimer
GetWindowsDirectoryW
GetPrivateProfileSectionA
SetConsoleDisplayMode
SetHandleInformation
ConvertThreadToFiber
ConvertDefaultLocale
CreateToolhelp32Snapshot
GetTimeFormatW
GetAtomNameA
DisconnectNamedPipe
CopyFileW
CreateMailslotW
GetStdHandle
SetTapePosition
Toolhelp32ReadProcessMemory
CompareStringA
SetThreadExecutionState
CreateMailslotA
OpenJobObjectA
FindNextChangeNotification
OpenWaitableTimerA
AssignProcessToJobObject
IsSystemResumeAutomatic
SetThreadContext
GetCurrentProcess
OpenProcess
GetSystemDefaultLCID
VerifyVersionInfoW
HeapSize
RtlUnwind
Sleep
HeapFree
TerminateProcess
IsDebuggerPresent
UnhandledExceptionFilter
LoadLibraryW
EnterCriticalSection
LeaveCriticalSection
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetCommandLineA
HeapSetInformation
ExitProcess
DecodePointer
WriteFile
GetEnvironmentStringsW
InitializeCriticalSectionAndSpinCount
GetStartupInfoW
DeleteCriticalSection
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
GetLastError
InterlockedDecrement
HeapCreate
IsProcessorFeaturePresent
user32
IsCharAlphaA
advapi32
RegConnectRegistryW
CryptDestroyHash
MakeSelfRelativeSD
SetThreadToken
GetSecurityDescriptorOwner
RegEnumKeyA
LookupAccountNameW
CryptReleaseContext
QueryServiceConfigW
RegOpenKeyW
CryptHashData
ChangeServiceConfigW
RegEnumKeyExW
DuplicateTokenEx
RegSetValueExA
OpenServiceA
RegDeleteValueW
RegCreateKeyExW
RegSetValueExW
RegQueryInfoKeyW
RegEnumKeyW
QueryServiceStatus
CreateProcessAsUserW
SetEntriesInAclW
OpenProcessToken
RegQueryValueExW
CopySid
RegNotifyChangeKeyValue
RegOpenKeyExA
RegSetValueW
RegDeleteKeyW
GetSecurityDescriptorLength
RegCreateKeyExA
SetSecurityDescriptorDacl
SetNamedSecurityInfoW
CryptAcquireContextA
RegOpenKeyA
StartServiceW
RegEnumKeyExA
RegEnumValueW
CloseServiceHandle
OpenSCManagerW
IsValidSid
DeregisterEventSource
oleaut32
SysStringLen
SafeArrayGetLBound
VariantCopyInd
GetActiveObject
VariantChangeTypeEx
GetErrorInfo
SafeArrayCreate
VariantChangeType
SysAllocStringLen
SafeArrayGetUBound
SysReAllocStringLen
SysAllocStringByteLen
SysFreeString
SafeArrayPtrOfIndex
VariantInit
VariantCopy
VariantClear
Sections
.text Size: 272KB - Virtual size: 272KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 659KB - Virtual size: 658KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 13KB - Virtual size: 352KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ