Static task
static1
Behavioral task
behavioral1
Sample
817812e388f107f24e89445f328db2a7a5c6f3083520b4e16bf77c5b3d2185aa.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
817812e388f107f24e89445f328db2a7a5c6f3083520b4e16bf77c5b3d2185aa.exe
Resource
win10v2004-20220901-en
General
-
Target
817812e388f107f24e89445f328db2a7a5c6f3083520b4e16bf77c5b3d2185aa
-
Size
4.0MB
-
MD5
af1d3602a37cbcb9e28d2cba6e5664a3
-
SHA1
ec1259627615a3f4bb56e38d989f04ba79f3f09b
-
SHA256
817812e388f107f24e89445f328db2a7a5c6f3083520b4e16bf77c5b3d2185aa
-
SHA512
94281166eb9a407a30dcb9004fe7768e2ecc40a2db568a314fb70b6ae564c44605e2bd418b895de11c23d2b428b97050d4c4bb30a059a9009c2982c06d80388a
-
SSDEEP
98304:MsKhhepGI5NXrA+6gJf6PD3Nmn7AJEgLYXMKUCCCNYzQEr0WO0Yk84vIcTfZTxqs:M/wG6G+NJiPD3Nm7AJEgLYX8CNYzQErg
Malware Config
Signatures
Files
-
817812e388f107f24e89445f328db2a7a5c6f3083520b4e16bf77c5b3d2185aa.exe windows x86
5f8d7de9aa57704ebdf27ec039cfa891
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcatA
lstrlenA
Sleep
GetFileSize
lstrcmpA
ReadFile
SetFilePointer
GetModuleHandleA
FreeLibrary
MultiByteToWideChar
CopyFileA
GetSystemTime
FindClose
FindNextFileA
FindFirstFileA
EndUpdateResourceA
UpdateResourceA
BeginUpdateResourceA
GetSystemDefaultLangID
lstrcpyW
lstrlenW
CreateProcessA
MoveFileA
ExpandEnvironmentStringsA
GetWindowsDirectoryW
InitializeCriticalSection
DuplicateHandle
TerminateThread
OpenProcess
IsBadReadPtr
SetLastError
GetVersionExA
WaitForSingleObject
ResumeThread
SetThreadContext
GetThreadContext
CreateEventA
SuspendThread
GetLastError
SetEnvironmentVariableA
CompareStringW
CompareStringA
FlushFileBuffers
LCMapStringW
LCMapStringA
GetStringTypeW
GetStringTypeA
SetStdHandle
GetOEMCP
GetACP
GetCPInfo
IsBadCodePtr
InterlockedIncrement
InterlockedDecrement
SetUnhandledExceptionFilter
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
WideCharToMultiByte
FreeEnvironmentStringsW
FreeEnvironmentStringsA
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
IsBadWritePtr
HeapCreate
HeapDestroy
GetEnvironmentVariableA
HeapSize
HeapReAlloc
UnhandledExceptionFilter
HeapAlloc
TlsAlloc
GetCurrentThreadId
RaiseException
ExitProcess
GetVersion
UnmapViewOfFile
LoadLibraryA
GetProcAddress
CreateFileA
WriteFile
GetCurrentDirectoryA
OpenFileMappingA
GetCurrentProcessId
GetSystemDirectoryA
SetFileAttributesA
GetModuleFileNameA
VirtualProtect
VirtualAlloc
WinExec
CreateToolhelp32Snapshot
Process32First
Process32Next
Module32First
Module32Next
CloseHandle
GetCurrentProcess
TerminateProcess
DeleteFileA
GetCommandLineA
GetStartupInfoA
HeapFree
RtlUnwind
GetLocalTime
GetTimeZoneInformation
ExitThread
TlsGetValue
TlsSetValue
CreateThread
VirtualFree
lstrcpyA
CreateFileMappingA
MapViewOfFile
user32
EndDialog
SetTimer
MessageBoxA
SystemParametersInfoA
IsDlgButtonChecked
GetWindow
GetClassNameA
IsWindow
GetTopWindow
IsWindowVisible
FindWindowA
wsprintfA
KillTimer
LoadIconA
GetDlgItem
CheckDlgButton
EnableWindow
SetDlgItemTextA
GetDlgItemTextA
GetClassNameW
GetWindowThreadProcessId
GetKeyboardLayoutNameA
GetKeyboardLayoutList
UnloadKeyboardLayout
ReleaseCapture
ClientToScreen
SetCursor
SetCapture
LoadBitmapA
LoadCursorA
WindowFromPoint
GetParent
PtInRect
GetWindowDC
GetWindowRect
OffsetRect
IsRectEmpty
ReleaseDC
DialogBoxParamA
GetClassInfoExA
RegisterClassExA
WaitForInputIdle
SendMessageA
PeekMessageA
TranslateMessage
DispatchMessageA
PostMessageA
gdi32
PatBlt
advapi32
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegCloseKey
RegEnumKeyExA
RegCreateKeyA
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
RegDeleteKeyA
RegOpenKeyA
RegEnumValueA
shell32
ShellExecuteExA
ShellExecuteA
ws2_32
inet_addr
htons
connect
send
select
closesocket
socket
inet_ntoa
gethostbyname
WSAStartup
recv
__WSAFDIsSet
imm32
ImmGetDescriptionA
ImmIsIME
shlwapi
PathFindExtensionA
PathRemoveFileSpecA
PathFileExistsA
PathIsFileSpecA
PathFindFileNameA
StrCatW
PathRenameExtensionA
version
VerQueryValueA
GetFileVersionInfoSizeA
GetFileVersionInfoA
Sections
.text Size: 152KB - Virtual size: 149KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2.6MB - Virtual size: 2.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 55KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text0 Size: 68KB - Virtual size: 65KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text1 Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 68KB - Virtual size: 65KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ