Static task
static1
Behavioral task
behavioral1
Sample
19c2eb2e4a9d3d944cbbf8583513b0c30f7ead8ad01752ff23bd0dfc76ab96a5.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
19c2eb2e4a9d3d944cbbf8583513b0c30f7ead8ad01752ff23bd0dfc76ab96a5.exe
Resource
win10v2004-20220812-en
General
-
Target
19c2eb2e4a9d3d944cbbf8583513b0c30f7ead8ad01752ff23bd0dfc76ab96a5
-
Size
1.1MB
-
MD5
5fde5f1ef8ced0c72229b0add77fc088
-
SHA1
de499b28f93dbeb9783c9d7edd3da99d3a9e3022
-
SHA256
19c2eb2e4a9d3d944cbbf8583513b0c30f7ead8ad01752ff23bd0dfc76ab96a5
-
SHA512
05f01eb4159aef270db91c6d3b872399fab9433f0d63e0ad856c74f88f3c4b1de6c8a0deb80b02f4c5f0698655294ab29e362055db0e0f0645550058ba4d207b
-
SSDEEP
12288:tWl0oaQSW3T4vEk58tlNMGu1OzwpFfQ3XmSLUuUZrHExVPHXR2j3qs:twVSWDyEk56ezpAmC9UZoH/h2Dqs
Malware Config
Signatures
Files
-
19c2eb2e4a9d3d944cbbf8583513b0c30f7ead8ad01752ff23bd0dfc76ab96a5.exe windows x86
6f2f2c3e5ddb4757c2d51822aa051f85
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentThread
GetStringTypeExW
GetThreadTimes
OpenFileMappingW
DeviceIoControl
IsValidCodePage
FindAtomA
ReadDirectoryChangesW
ConvertDefaultLocale
CopyFileExA
GetFullPathNameW
CreateIoCompletionPort
IsSystemResumeAutomatic
SetFileTime
QueryInformationJobObject
GetCurrentDirectoryA
MapUserPhysicalPages
ReleaseSemaphore
GetDriveTypeW
GetLogicalDriveStringsW
GetTapeStatus
GetLongPathNameW
LocalFileTimeToFileTime
GetSystemDefaultLCID
OpenEventA
GetProfileIntA
PostQueuedCompletionStatus
SetThreadAffinityMask
GetLogicalDriveStringsA
BindIoCompletionCallback
GetUserDefaultLangID
ReleaseMutex
GetStringTypeW
LCMapStringW
HeapReAlloc
HeapAlloc
HeapSize
RtlUnwind
GetOEMCP
GetACP
GetCPInfo
Sleep
HeapFree
GetCurrentProcess
TerminateProcess
IsDebuggerPresent
UnhandledExceptionFilter
LoadLibraryW
EnterCriticalSection
LeaveCriticalSection
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
FindFirstVolumeMountPointA
GetStdHandle
CreateMutexW
MultiByteToWideChar
GetFileAttributesA
AreFileApisANSI
FindFirstVolumeW
DeleteTimerQueueEx
GetNamedPipeHandleStateA
SetThreadPriorityBoost
FreeUserPhysicalPages
OpenEventW
OpenSemaphoreA
GetFullPathNameA
DisconnectNamedPipe
OpenWaitableTimerW
GetProcessTimes
GetTempPathW
SetConsoleTextAttribute
GetShortPathNameA
GetDateFormatA
GetConsoleAliasesW
GetPrivateProfileSectionNamesA
GetConsoleAliasW
GetProcAddress
FormatMessageW
ResetEvent
SetLocaleInfoW
CompareFileTime
GetModuleHandleA
SetNamedPipeHandleState
CreateMailslotW
SetCalendarInfoW
GetMailslotInfo
ProcessIdToSessionId
CreateSemaphoreA
HeapSetInformation
ReadProcessMemory
LCMapStringA
ReplaceFileA
SwitchToThread
GetComputerNameExW
SetConsoleCP
FreeEnvironmentStringsA
GetProfileSectionW
CreateTimerQueue
GetLocaleInfoA
SetWaitableTimer
GetPrivateProfileStringA
GetProfileSectionA
SetCurrentDirectoryW
SetLocaleInfoA
FindResourceExW
GetVolumeNameForVolumeMountPointA
GetConsoleAliasExesLengthW
GetDiskFreeSpaceExW
CreateEventA
CreateFileW
GetPrivateProfileIntA
GetPriorityClass
CopyFileExW
DeleteAtom
OpenThread
GetDriveTypeA
FreeConsole
SetTapePosition
EnumCalendarInfoW
CreateDirectoryW
GetCurrencyFormatA
GetAtomNameW
SetEnvironmentVariableA
FlushConsoleInputBuffer
GetEnvironmentStrings
DnsHostnameToComputerNameW
VirtualAlloc
CancelIo
PeekNamedPipe
HeapCreate
InterlockedDecrement
GetLastError
GetCurrentThreadId
SetLastError
InterlockedIncrement
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
EncodePointer
DeleteCriticalSection
GetStartupInfoW
GetFileType
InitializeCriticalSectionAndSpinCount
SetHandleCount
GetEnvironmentStringsW
WideCharToMultiByte
GetCommandLineA
SetUnhandledExceptionFilter
GetModuleHandleW
ExitProcess
DecodePointer
WriteFile
GetModuleFileNameW
GetModuleFileNameA
FreeEnvironmentStringsW
IsProcessorFeaturePresent
user32
SetDlgItemTextA
SetWindowPlacement
DestroyIcon
OffsetRect
GetCapture
DeferWindowPos
IsWindowEnabled
LoadIconA
InsertMenuW
GetCursor
ShowWindow
RemovePropW
SetClipboardData
PostMessageA
WaitMessage
DrawTextW
GetSubMenu
SendMessageTimeoutW
EqualRect
SetDlgItemTextW
GetMenuItemID
SystemParametersInfoA
CharLowerBuffW
RegisterClipboardFormatW
MessageBoxA
GetAltTabInfoA
LoadAcceleratorsW
comctl32
ImageList_DragEnter
ImageList_LoadImageA
ImageList_Destroy
PropertySheetW
DestroyPropertySheetPage
ImageList_GetBkColor
ImageList_GetIcon
ImageList_LoadImageW
ImageList_GetIconSize
ImageList_AddMasked
ImageList_SetIconSize
CreatePropertySheetPageW
ImageList_Read
PropertySheetA
CreateToolbarEx
ImageList_ReplaceIcon
FlatSB_SetScrollProp
ImageList_DrawIndirect
ImageList_GetDragImage
ImageList_Write
CreateStatusWindowW
ImageList_SetDragCursorImage
ImageList_BeginDrag
ImageList_DragMove
ImageList_Create
ImageList_Copy
ImageList_DragLeave
InitCommonControlsEx
ImageList_Replace
_TrackMouseEvent
FlatSB_GetScrollInfo
CreatePropertySheetPageA
ImageList_Remove
ord17
FlatSB_GetScrollPos
ImageList_EndDrag
ImageList_SetBkColor
ImageList_SetImageCount
ImageList_GetImageInfo
ImageList_Add
InitializeFlatSB
FlatSB_SetScrollPos
ImageList_DragShowNolock
ImageList_DrawEx
FlatSB_SetScrollInfo
ImageList_GetImageCount
ImageList_SetOverlayImage
ImageList_Draw
advapi32
RegQueryValueExA
RegCreateKeyExW
RegNotifyChangeKeyValue
GetSidIdentifierAuthority
AddAccessDeniedAce
GetCurrentHwProfileW
GetTokenInformation
AddAccessAllowedAce
AddAuditAccessAce
SetTokenInformation
AreAllAccessesGranted
RegSetValueW
RegCreateKeyExA
RegSetKeySecurity
InitializeSecurityDescriptor
GetSidSubAuthorityCount
GetKernelObjectSecurity
GetSidLengthRequired
InitializeAcl
RegQueryMultipleValuesA
SetKernelObjectSecurity
AreAnyAccessesGranted
RegQueryMultipleValuesW
GetSidSubAuthority
RegSetValueExA
RegSetValueExW
RegSetValueA
oleaut32
SafeArrayCreate
SysStringLen
SafeArrayGetLBound
SysFreeString
SafeArrayGetUBound
GetActiveObject
GetErrorInfo
VariantInit
VariantClear
VariantCopyInd
VariantChangeTypeEx
VariantCopy
SafeArrayPtrOfIndex
SysAllocStringLen
VariantChangeType
SysReAllocStringLen
SysAllocStringByteLen
Sections
.text Size: 321KB - Virtual size: 320KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 244KB - Virtual size: 244KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 359KB - Virtual size: 519KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.aspack Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bdata Size: 129KB - Virtual size: 128KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 44KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ