Static task
static1
Behavioral task
behavioral1
Sample
57c91947e8e9a4d814278f5d2142bbfe440048d1580eef7503053e48f23d1605.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
57c91947e8e9a4d814278f5d2142bbfe440048d1580eef7503053e48f23d1605.exe
Resource
win10v2004-20221111-en
General
-
Target
57c91947e8e9a4d814278f5d2142bbfe440048d1580eef7503053e48f23d1605
-
Size
1.1MB
-
MD5
6389103e8971334d0e1788154cdb86cf
-
SHA1
026078b70e435f207cc563c1cf20fe40b06d7d8f
-
SHA256
57c91947e8e9a4d814278f5d2142bbfe440048d1580eef7503053e48f23d1605
-
SHA512
eb7bed94e687d483515b34f9611d27e0837099ac76045d10e429904de8914f216af3556f0d2e825f81ce6a52453572314340301102b605e696dcd59c0e9d97b8
-
SSDEEP
12288:OmnwuWGyqJEjVAFR9QCIAAKK2GhouKx2RnglGAEqnjFGRueuFAB6hSFCG+5NNpDi:OQm8QCIN/LKxcIEDRueMEox9pDQKC
Malware Config
Signatures
Files
-
57c91947e8e9a4d814278f5d2142bbfe440048d1580eef7503053e48f23d1605.exe windows x86
6978015d8edf448b9e71f0d9616d835e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLongPathNameA
GlobalLock
GetProcessWorkingSetSize
ReplaceFileW
DefineDosDeviceW
SetFileAttributesA
GetConsoleOutputCP
WritePrivateProfileStringA
SetTapeParameters
Module32FirstW
GetAtomNameA
WaitForMultipleObjects
FindFirstVolumeMountPointA
GlobalMemoryStatus
SetConsoleOutputCP
GetVersion
GetCurrencyFormatA
UnlockFile
FlushViewOfFile
CreateEventA
GetACP
CompareStringA
OpenEventA
FindResourceW
MapViewOfFileEx
CreateNamedPipeA
FlushConsoleInputBuffer
SetHandleCount
SetThreadIdealProcessor
GetComputerNameA
CreateDirectoryA
CreateIoCompletionPort
SetSystemTimeAdjustment
GetPrivateProfileStructA
MapUserPhysicalPages
GetPrivateProfileStringW
FlushInstructionCache
GetShortPathNameA
ExpandEnvironmentStringsA
SetConsoleActiveScreenBuffer
GetDriveTypeW
GetUserDefaultUILanguage
OpenMutexA
FindFirstVolumeW
GetConsoleAliasW
ReadProcessMemory
FindResourceExW
SetThreadPriorityBoost
GetProfileIntW
GetShortPathNameW
DeleteTimerQueueEx
LCMapStringA
GetFileAttributesW
SetTapePosition
GetSystemDirectoryW
MoveFileWithProgressW
CopyFileW
GetLogicalDriveStringsW
WriteConsoleA
GetSystemWindowsDirectoryW
GetFileInformationByHandle
AddAtomW
GetModuleHandleW
CreateMailslotA
HeapSize
CopyFileExA
GetCPInfoExW
OpenThread
SetWaitableTimer
GetDiskFreeSpaceExW
OpenWaitableTimerA
MoveFileW
GetThreadContext
GetPrivateProfileStructW
GetVolumeInformationA
MapViewOfFile
GetCurrentDirectoryW
GetDiskFreeSpaceA
AddAtomA
FindFirstFileA
SearchPathW
GetDateFormatW
lstrcatA
SetThreadPriority
CreateTimerQueue
GetStringTypeExW
SetLocaleInfoW
SetErrorMode
GetVolumeNameForVolumeMountPointA
GetFileSizeEx
SetFileAttributesW
GetEnvironmentVariableA
GetPrivateProfileStringA
SetConsoleCP
GetWindowsDirectoryW
GetCurrentDirectoryA
SetEvent
DosDateTimeToFileTime
OpenJobObjectA
MapUserPhysicalPagesScatter
GetBinaryTypeW
AssignProcessToJobObject
OpenFileMappingW
GetNumberOfConsoleInputEvents
GetDriveTypeA
GlobalHandle
CreateFileMappingA
SetSystemPowerState
SetComputerNameExW
GetThreadLocale
CreateMailslotW
FoldStringA
GetFileAttributesExW
GetVolumePathNameW
DeviceIoControl
CopyFileExW
GetConsoleCursorInfo
GetUserDefaultLangID
GetTimeFormatA
FlushFileBuffers
GetEnvironmentStrings
LCMapStringW
GetProcessVersion
CreateToolhelp32Snapshot
GetConsoleMode
GetCPInfoExA
GetConsoleAliasExesW
SetComputerNameExA
EnumCalendarInfoA
VerSetConditionMask
OpenWaitableTimerW
GetConsoleScreenBufferInfo
BindIoCompletionCallback
CreateSemaphoreW
CreateHardLinkW
CompareStringW
EnumCalendarInfoExA
GetDiskFreeSpaceW
SetProcessWorkingSetSize
ReadDirectoryChangesW
Module32NextW
SetConsoleMode
FindResourceExA
GetCPInfo
IsValidCodePage
GetMailslotInfo
GetSystemDefaultUILanguage
CreateDirectoryExW
SetNamedPipeHandleState
FoldStringW
ReleaseSemaphore
GetFileTime
CreateHardLinkA
DuplicateHandle
FindFirstFileExA
VirtualQuery
GetThreadPriority
ResetEvent
GetFileAttributesExA
GetProfileSectionA
SetThreadExecutionState
GetFileAttributesA
GetLogicalDriveStringsA
GetSystemDefaultLangID
Module32Next
GetTapeStatus
GetProcessPriorityBoost
FindVolumeMountPointClose
GetProcessTimes
GetNumberFormatA
ReadFile
IsSystemResumeAutomatic
SetConsoleCtrlHandler
VirtualAlloc
GetCurrentThread
GetStringTypeW
MultiByteToWideChar
HeapReAlloc
HeapAlloc
RtlUnwind
GetOEMCP
Sleep
HeapFree
TerminateProcess
IsDebuggerPresent
UnhandledExceptionFilter
LoadLibraryW
EnterCriticalSection
LeaveCriticalSection
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
HeapCreate
InterlockedDecrement
GetLastError
GetCurrentThreadId
SetLastError
InterlockedIncrement
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
EncodePointer
DeleteCriticalSection
DisconnectNamedPipe
FindVolumeClose
CreateFileW
GetCurrentProcess
Module32First
SetCurrentDirectoryW
GetProcessAffinityMask
FormatMessageA
GetNamedPipeHandleStateW
GetFullPathNameA
CreateDirectoryExA
GetTempPathW
GetPriorityClass
SearchPathA
GetAtomNameW
GetNamedPipeInfo
GetUserDefaultLCID
FindAtomW
CreateDirectoryW
GetProfileStringW
FindNextChangeNotification
ConvertThreadToFiber
GetLogicalDrives
SwitchToThread
GetModuleFileNameA
VerifyVersionInfoW
ExpandEnvironmentStringsW
GetConsoleAliasesA
GetProfileSectionW
SetEndOfFile
SetConsoleTextAttribute
GetCompressedFileSizeW
CreateSemaphoreA
ConvertDefaultLocale
GetCalendarInfoA
CancelIo
SetConsoleDisplayMode
GetModuleHandleA
GetVolumePathNameA
OpenSemaphoreA
ReplaceFileA
CreateJobObjectA
GetConsoleWindow
SetUnhandledExceptionFilter
GetWindowsDirectoryA
GetDevicePowerState
GetProcAddress
EnumCalendarInfoW
GetBinaryTypeA
GetStringTypeA
MoveFileWithProgressA
GetDateFormatA
LoadResource
SetProcessPriorityBoost
GetLongPathNameW
GetEnvironmentVariableW
PostQueuedCompletionStatus
GetThreadTimes
SetInformationJobObject
GetPrivateProfileSectionA
OpenSemaphoreW
PrepareTape
GetProfileStringA
GetStartupInfoW
GetFileType
InitializeCriticalSectionAndSpinCount
GetEnvironmentStringsW
WideCharToMultiByte
FreeEnvironmentStringsW
GetModuleFileNameW
GetStdHandle
WriteFile
DecodePointer
ExitProcess
HeapSetInformation
GetCommandLineA
IsProcessorFeaturePresent
user32
IsDialogMessageW
SendMessageTimeoutW
CloseWindowStation
SendDlgItemMessageA
EmptyClipboard
IsDlgButtonChecked
SetDlgItemInt
WaitMessage
SetForegroundWindow
CharPrevA
DialogBoxParamW
LoadStringA
LoadMenuW
GetSysColorBrush
CreatePopupMenu
ShowCursor
SetParent
SetRect
AttachThreadInput
PostThreadMessageA
CheckDlgButton
RegisterWindowMessageA
CharUpperW
CharLowerA
InflateRect
SetCursor
GetSubMenu
EndPaint
OpenInputDesktop
GetUpdateRect
LoadStringW
GetCursorPos
RedrawWindow
EnableWindow
advapi32
GetSecurityDescriptorOwner
SetServiceStatus
RegQueryValueW
GetUserNameW
GetSidLengthRequired
RegQueryInfoKeyW
OpenSCManagerW
LsaQueryInformationPolicy
RegQueryValueExA
SetSecurityDescriptorDacl
RegCloseKey
OpenThreadToken
AllocateAndInitializeSid
RegSetKeySecurity
RegCreateKeyExA
RegOpenKeyExA
CryptCreateHash
ChangeServiceConfigW
GetAce
LsaClose
QueryServiceStatus
GetSidSubAuthorityCount
LookupAccountSidW
QueryServiceConfigW
RegDeleteKeyW
FreeSid
GetSecurityDescriptorLength
OpenSCManagerA
CryptGetHashParam
RegCreateKeyExW
EqualSid
ImpersonateLoggedOnUser
GetSecurityDescriptorDacl
LsaOpenPolicy
LsaFreeMemory
InitializeAcl
RegSetValueExW
GetSecurityDescriptorGroup
CryptAcquireContextW
RegEnumKeyExA
RegCreateKeyA
OpenServiceW
GetLengthSid
CryptDestroyKey
OpenProcessToken
ControlService
RegNotifyChangeKeyValue
RegCreateKeyW
AddAce
RegQueryValueExW
GetTokenInformation
RegOpenKeyW
CryptHashData
GetSidSubAuthority
RegSetValueW
RegDeleteKeyA
CryptReleaseContext
RegEnumValueA
RegSetValueExA
IsValidSid
StartServiceW
RegEnumKeyW
shell32
SHGetSpecialFolderPathW
SHGetFileInfoW
ShellExecuteExW
ShellExecuteW
SHGetFolderPathW
SHFileOperationW
SHGetMalloc
SHChangeNotify
SHBrowseForFolderW
SHGetSpecialFolderLocation
SHGetDesktopFolder
CommandLineToArgvW
SHBindToParent
oleaut32
GetActiveObject
SafeArrayGetLBound
SysAllocStringLen
VariantCopyInd
VariantClear
SafeArrayCreate
SafeArrayGetUBound
VariantInit
SysAllocStringByteLen
SysStringLen
VariantChangeType
VariantChangeTypeEx
SysFreeString
SysReAllocStringLen
GetErrorInfo
VariantCopy
SafeArrayPtrOfIndex
Sections
.text Size: 446KB - Virtual size: 445KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 39KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 634KB - Virtual size: 1.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ