Static task
static1
Behavioral task
behavioral1
Sample
a71f152f1c99e8779030b9601351230271e620a79e8411bc6bfc0e2863a8b995.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a71f152f1c99e8779030b9601351230271e620a79e8411bc6bfc0e2863a8b995.exe
Resource
win10v2004-20221111-en
General
-
Target
a71f152f1c99e8779030b9601351230271e620a79e8411bc6bfc0e2863a8b995
-
Size
335KB
-
MD5
daeb29968a7bbce0bff3c3598131b6a0
-
SHA1
16288a50f4bd14f2fc98683eed8d986246683e57
-
SHA256
a71f152f1c99e8779030b9601351230271e620a79e8411bc6bfc0e2863a8b995
-
SHA512
8fd09f1759c20ff4bbcac7ab2453ca28beece5e9e39e7a512db26ac4665ae68f324b6478076969b612a59f813c598aac15579c9106d4dc49fe5cebb3dce0c35a
-
SSDEEP
6144:UsSpKvS7xGzRZjMKzyJSCADAX7FC4IUJ0xd5emTV+6TkaY:UjkvX9z7r8FaUKheSVVi
Malware Config
Signatures
Files
-
a71f152f1c99e8779030b9601351230271e620a79e8411bc6bfc0e2863a8b995.exe windows x86
6e363329a9b521ae138497201dde8b40
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetDevicePowerState
SetEnvironmentVariableA
FillConsoleOutputCharacterA
OpenWaitableTimerW
ReadDirectoryChangesW
CreateMailslotA
GetVersionExA
WriteConsoleA
WriteFileGather
RequestDeviceWakeup
WriteConsoleOutputCharacterA
DisconnectNamedPipe
GetThreadTimes
lstrlenA
HeapCompact
ScrollConsoleScreenBufferA
SetProcessPriorityBoost
SetSystemTimeAdjustment
TerminateThread
EnumSystemCodePagesW
GetWindowsDirectoryA
GetLastError
SetConsoleScreenBufferSize
SetThreadLocale
Heap32ListNext
PeekConsoleInputA
VirtualLock
QueryPerformanceFrequency
GetVersionExW
QueueUserAPC
WriteProfileSectionA
GetStartupInfoA
GetFileType
RequestWakeupLatency
SetUnhandledExceptionFilter
UnhandledExceptionFilter
_lcreat
InitializeCriticalSection
GetModuleHandleA
ContinueDebugEvent
user32
EnumWindowStationsA
SetTimer
EndDialog
PtInRect
SendDlgItemMessageW
DestroyCaret
GetCapture
GetClientRect
OpenDesktopW
OemKeyScan
ChangeMenuW
IsDlgButtonChecked
EnumDesktopsA
LoadMenuA
MessageBoxA
RegisterWindowMessageW
ShowOwnedPopups
DestroyWindow
LoadCursorFromFileA
DeferWindowPos
RegisterClassExA
PostMessageW
GetDlgItemTextW
LoadImageW
TranslateMDISysAccel
ModifyMenuA
EndDeferWindowPos
LoadCursorFromFileW
MessageBoxIndirectA
CountClipboardFormats
ChangeDisplaySettingsExA
LoadBitmapW
ValidateRgn
GetWindowLongA
SetDebugErrorLevel
CopyAcceleratorTableW
PostMessageA
gdi32
ExtFloodFill
ExcludeClipRect
OffsetRgn
SetViewportOrgEx
SetWindowExtEx
PaintRgn
GetMiterLimit
UnrealizeObject
EnumObjects
GetKerningPairsA
Pie
CreateColorSpaceA
GetTextFaceA
GetCharABCWidthsW
CreatePatternBrush
CreateColorSpaceW
GetEnhMetaFilePaletteEntries
comdlg32
GetFileTitleA
advapi32
CryptDeriveKey
GetOldestEventLogRecord
CryptEnumProvidersA
SetSecurityInfo
GetSecurityDescriptorLength
SetKernelObjectSecurity
RegisterEventSourceW
RegReplaceKeyW
RegQueryValueExW
QueryServiceObjectSecurity
DuplicateTokenEx
GetSidSubAuthority
InitiateSystemShutdownW
RegNotifyChangeKeyValue
AccessCheck
BuildTrusteeWithSidW
SetTokenInformation
GetEffectiveRightsFromAclA
BuildTrusteeWithSidA
shell32
DragQueryFileW
SHGetFileInfoW
ShellAboutW
SHGetFileInfoA
ExtractIconExW
msvcrt
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
Sections
.text Size: 269KB - Virtual size: 272KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
5qj51xx4 Size: 45KB - Virtual size: 48KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
4wykgshn Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ