Static task
static1
Behavioral task
behavioral1
Sample
97e23149bbb67c2d3b6e993ea64c7b4d2b13ac10ffe73b0425d8db4efa41d2f2.exe
Resource
win7-20220812-en
General
-
Target
97e23149bbb67c2d3b6e993ea64c7b4d2b13ac10ffe73b0425d8db4efa41d2f2
-
Size
292KB
-
MD5
f335addf67338b57e06ac6c941498cf4
-
SHA1
5468d0d7dd80c37c27119f3b7963dca345a7f69e
-
SHA256
97e23149bbb67c2d3b6e993ea64c7b4d2b13ac10ffe73b0425d8db4efa41d2f2
-
SHA512
7bb9da0264c637e0b3876e5ebdda957d309d86809edbc81768b299a3d9508f7a22a356c3feeb87e5de53f8aeb871c7948e193b201fb7470d3618058d48c282ce
-
SSDEEP
3072:pdsFrF68imEa2bTRUoCydUUlmyB53jwY0iDXNcinSTJ7g5CI+a056AARc5C1sK7e:pbV93jrXn+7a46AAD1sKlfTX2b
Malware Config
Signatures
Files
-
97e23149bbb67c2d3b6e993ea64c7b4d2b13ac10ffe73b0425d8db4efa41d2f2.exe windows x86
b09ac0f5cff556316fae69f2b81f7912
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualFree
GetStartupInfoA
CreateProcessW
DeleteFileW
MapViewOfFile
CreateEventA
DuplicateHandle
GetSystemDefaultLangID
GetModuleFileNameW
SetEvent
ReleaseMutex
CopyFileW
GetWindowsDirectoryW
GetTempFileNameW
lstrlenW
GetVersionExW
ExpandEnvironmentStringsW
SearchPathW
lstrcpyW
lstrcpynW
GetDriveTypeW
lstrcmpiA
GetLocalTime
OpenEventA
GetTempFileNameA
OpenProcess
CreateRemoteThread
VirtualAllocEx
WriteProcessMemory
QueryDosDeviceA
TerminateProcess
FileTimeToSystemTime
lstrcmpA
CreateFileW
LoadLibraryW
lstrcmpiW
CreateDirectoryA
FormatMessageW
LocalFree
LocalAlloc
CreateFileMappingA
MapViewOfFileEx
FindResourceA
LoadResource
SetEndOfFile
SetFilePointer
WriteFile
UnmapViewOfFile
FlushFileBuffers
GetFileSize
ReadFile
ExpandEnvironmentStringsA
FindFirstFileA
FindNextFileA
FindClose
CreateFileA
DeviceIoControl
GetSystemDirectoryA
GetDiskFreeSpaceA
FreeLibrary
CreateProcessA
GetExitCodeProcess
DefineDosDeviceA
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
GetVersionExA
GetSystemInfo
GetEnvironmentVariableA
CreateMutexA
SetUnhandledExceptionFilter
FormatMessageA
ExitProcess
lstrcpynA
lstrcpyA
WaitForSingleObject
CloseHandle
CreateThread
GetModuleHandleA
GetCurrentProcess
Sleep
DeleteFileA
WideCharToMultiByte
GetWindowsDirectoryA
VirtualAlloc
SetCurrentDirectoryA
LoadLibraryA
GetFullPathNameA
CopyFileA
SetFileAttributesA
MultiByteToWideChar
GetProcAddress
RemoveDirectoryA
MoveFileExA
lstrlenA
SetLastError
GetModuleFileNameA
SetEnvironmentVariableA
GetFileAttributesA
MoveFileA
GetLastError
CompareFileTime
comctl32
PropertySheetW
CreatePropertySheetPageW
setupapi
SetupFindNextLine
SetupFindFirstLineA
SetupCloseInfFile
SetupOpenInfFileA
SetupGetStringFieldA
SetupSetDirectoryIdA
SetupGetSourceInfoA
SetupFindFirstLineW
SetupGetStringFieldW
SetupGetTargetPathW
SetupScanFileQueueA
SetupGetLineByIndexA
SetupGetFieldCount
SetupGetLineCountA
SetupDiGetClassDevsA
SetupDiEnumDeviceInfo
SetupDiGetDeviceInstanceIdA
SetupDiGetDeviceInstallParamsA
SetupDiOpenDevRegKey
SetupGetSourceFileLocationA
SetupDiGetDeviceRegistryPropertyA
SetupDiSetDeviceInstallParamsA
SetupDiBuildDriverInfoList
SetupDiGetDriverInfoDetailA
SetupDiEnumDriverInfoA
SetupDiDestroyDriverInfoList
SetupGetTargetPathA
SetupCopyErrorA
SetupDeleteErrorA
SetupPromptForDiskA
SetupOpenFileQueue
SetupInstallFilesFromInfSectionA
SetupGetBinaryField
SetupGetIntField
SetupGetLineTextW
SetupGetLineTextA
SetupDecompressOrCopyFileA
SetupInstallFromInfSectionA
SetupDefaultQueueCallbackA
SetupDefaultQueueCallbackW
SetupCommitFileQueueA
SetupInitDefaultQueueCallbackEx
user32
wvsprintfW
MessageBoxW
SendDlgItemMessageA
ShowWindow
SendMessageA
GetDlgItem
LoadStringW
LoadStringA
EndDialog
SetForegroundWindow
SendMessageW
PostMessageA
SetWindowTextW
SetWindowLongA
GetWindowLongA
LoadIconA
MessageBoxA
SetDlgItemTextA
DialogBoxParamA
SetWindowTextA
DialogBoxParamW
SetDlgItemTextW
DestroyWindow
GetParent
ntdll
_snprintf
_strnicmp
sprintf
NtClose
NtAdjustPrivilegesToken
NtOpenProcessToken
NtQuerySystemInformation
RtlCharToInteger
RtlFreeUnicodeString
RtlAnsiStringToUnicodeString
RtlInitAnsiString
NtQueryInformationProcess
NtShutdownSystem
RtlUnwind
strstr
_strlwr
strncpy
_strcmpi
strrchr
_itoa
strchr
_chkstk
wcslen
wcscpy
_snwprintf
_stricmp
ole32
CoInitialize
CoUninitialize
msvcrt
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
__setusermatherr
_initterm
_controlfp
_open
__getmainargs
_acmdln
_cexit
malloc
free
_strdup
strcspn
strtoul
memmove
swprintf
calloc
wcscmp
strspn
atol
strpbrk
_close
_lseek
_read
isdigit
_vsnprintf
atoi
wcstoul
exit
_wcsicmp
_c_exit
_exit
_XcptFilter
advapi32
RegEnumKeyA
RegCloseKey
RegDeleteKeyA
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
RegRestoreKeyA
RegCreateKeyExA
SetFileSecurityA
GetServiceDisplayNameA
ControlService
CloseServiceHandle
QueryServiceStatus
OpenServiceA
StartServiceA
OpenSCManagerA
EnumDependentServicesA
GetLengthSid
GetTokenInformation
AllocateAndInitializeSid
OpenProcessToken
DeregisterEventSource
ReportEventA
RegisterEventSourceA
AdjustTokenPrivileges
SetNamedSecurityInfoA
GetNamedSecurityInfoA
UnlockServiceDatabase
ChangeServiceConfigA
QueryServiceConfigA
LockServiceDatabase
GetFileSecurityA
InitiateSystemShutdownA
RegOpenKeyA
RegEnumKeyExA
RegQueryInfoKeyA
RegQueryValueExW
RegOpenKeyExW
OpenServiceW
RegDeleteValueA
gdi32
CreateFontIndirectA
GetObjectA
shell32
SHGetSpecialFolderPathA
version
VerQueryValueA
GetFileVersionInfoSizeA
GetFileVersionInfoA
psapi
GetModuleFileNameExA
userenv
ord138
ord121
Sections
.text Size: 99KB - Virtual size: 98KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1KB - Virtual size: 213KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 36KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tdata Size: 87KB - Virtual size: 88KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
erfxryq Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tdata Size: 60KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE