Static task
static1
Behavioral task
behavioral1
Sample
82d973a81bb286c0ee3d30dccb59e81d175c7e2a4527cfeaf3325d9e8088aa2a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
82d973a81bb286c0ee3d30dccb59e81d175c7e2a4527cfeaf3325d9e8088aa2a.exe
Resource
win10v2004-20220901-en
General
-
Target
82d973a81bb286c0ee3d30dccb59e81d175c7e2a4527cfeaf3325d9e8088aa2a
-
Size
825KB
-
MD5
81cafd44babf57117b01eaf971474f6d
-
SHA1
964b2481d35166f0a4a7192aab7e453977bd0399
-
SHA256
82d973a81bb286c0ee3d30dccb59e81d175c7e2a4527cfeaf3325d9e8088aa2a
-
SHA512
432cabcac429af784fa3de34aa2edaefddffddd304fd84ed9ed39aecde344614db50e6f9cc2ee0c11aca667666182abf14854bedaf10bd4524f575acf0bd12ac
-
SSDEEP
12288:w5ZP54r/06mApg2j0XXm50JbSNQYPTBVklcGLs5bkCKoXsQfAcSI8Dcc/V:wB4w6mZ2QXXI0lQjVo/Q1bKcTp8pN
Malware Config
Signatures
Files
-
82d973a81bb286c0ee3d30dccb59e81d175c7e2a4527cfeaf3325d9e8088aa2a.exe windows x86
fcf11fcde24a24eab8b2f6273396235a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadLibraryA
DeleteFileW
QueryInformationJobObject
WritePrivateProfileStringW
LockResource
GetProfileStringA
InitializeCriticalSectionAndSpinCount
GetSystemDefaultLangID
OpenFileMappingA
RtlUnwind
HeapCreate
BaseFlushAppcompatCache
FindFirstVolumeW
GetCurrentThread
AddLocalAlternateComputerNameA
EnumCalendarInfoExA
Process32Next
GlobalSize
QueryPerformanceCounter
LZClose
GetStartupInfoA
GetCPInfoExW
VirtualAlloc
GetCPInfoExA
RemoveVectoredExceptionHandler
GetVolumePathNameA
EnumResourceTypesA
msdart
?_ReadLockSpin@CReaderWriterLock@@AAEXXZ
?ReadLock@CSmallSpinLock@@QAEXXZ
?IsMillnm@CMdVersionInfo@@SAHXZ
?IsUnlocked@CLockedSingleList@@QBE_NXZ
?_CmpExch@CReaderWriterLock2@@AAE_NJJ@Z
?_TryWriteLock@CReaderWriterLock3@@AAE_NJ@Z
?WriteLock@CSpinLock@@QAEXXZ
?ReadLock@CReaderWriterLock@@QAEXXZ
?ConvertExclusiveToShared@CReaderWriterLock@@QAEXXZ
?ReadLock@CReaderWriterLock3@@QAEXXZ
?TryWriteLock@CReaderWriterLock2@@QAE_NXZ
?_ExtractKey@CLKRHashTable@@ABE?BKPBX@Z
?TryWriteLock@CFakeLock@@QAE_NXZ
??4CLockedSingleList@@QAEAAV0@ABV0@@Z
?_TryReadLock@CReaderWriterLock3@@AAE_NXZ
?Apply@CLKRHashTable@@QAEKP6G?AW4LK_ACTION@@PBXPAX@Z1W4LK_LOCKTYPE@@@Z
??0CLKRHashTableStats@@QAE@XZ
?_LockSpin@CSpinLock@@AAEXXZ
?IsWriteUnlocked@CLKRLinearHashTable@@QBE_NXZ
?IsWriteUnlocked@CSmallSpinLock@@QBE_NXZ
?ConvertSharedToExclusive@CLKRHashTable@@QBEXXZ
?SetDefaultSpinAdjustmentFactor@CReaderWriterLock2@@SGXN@Z
?Unlock@CLockedSingleList@@QAEXXZ
MPInitializeCriticalSection
msvcrt
_yn
iswpunct
_exit
_CIexp
__CxxRegisterExceptionObject
_setmode
_aexit_rtn
mblen
strncmp
_vscprintf
strspn
_mbsnccnt
_mbsrchr
_mbsinc
_CIfmod
_mbsbtype
??0bad_cast@@QAE@ABV0@@Z
_mbsncmp
_wcsnicoll
tmpfile
user32
DialogBoxParamW
IsDialogMessageW
EditWndProc
UnregisterClassA
RegisterClassA
KillTimer
SetProcessWindowStation
PostQuitMessage
GetMenuStringW
ChangeMenuW
SetProcessDefaultLayout
AppendMenuW
DragDetect
ScrollWindowEx
SetUserObjectInformationA
MapVirtualKeyA
DefWindowProcA
GetThreadDesktop
PostThreadMessageW
CreatePopupMenu
SetSysColorsTemp
GetMenuInfo
GetDC
DeleteMenu
GetAsyncKeyState
CharToOemW
GetClientRect
netapi32
DsGetDcOpenW
NetDfsRename
NetRemoveAlternateComputerName
NetShareDelSticky
DsGetDcNameWithAccountW
NetDfsSetClientInfo
NetGroupGetUsers
NlBindingSetAuthInfo
NetUserSetInfo
NetEnumerateComputerNames
NetFileGetInfo
I_NetAccountSync
NetLocalGroupGetInfo
NetDfsAdd
NetGetDisplayInformationIndex
I_BrowserDebugTrace
NetReplExportDirDel
NetLocalGroupSetInfo
DsAddressToSiteNamesExA
Sections
.text Size: 225KB - Virtual size: 225KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 288KB - Virtual size: 287KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 308KB - Virtual size: 1.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ