Static task
static1
Behavioral task
behavioral1
Sample
38ffe9a76da60c9f9c104f26b2c87db0857f63e87ffb345f636ba2c09b47cac4.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
38ffe9a76da60c9f9c104f26b2c87db0857f63e87ffb345f636ba2c09b47cac4.exe
Resource
win10v2004-20220901-en
General
-
Target
38ffe9a76da60c9f9c104f26b2c87db0857f63e87ffb345f636ba2c09b47cac4
-
Size
496KB
-
MD5
33375cb69e6c8ee9618fca459b3522bb
-
SHA1
673aca38e0599fc161a2d66eec28995826d1a1b9
-
SHA256
38ffe9a76da60c9f9c104f26b2c87db0857f63e87ffb345f636ba2c09b47cac4
-
SHA512
4d680a4c93892cba31bf7dfbbcf83c9d4e660244f9b99ab8f22b42bccfbf252f686da20f8648f1d4e6c23171264226ed08fbe83c86c899b434bc8202dfd53bec
-
SSDEEP
12288:/eolQBhgfL3oKRa/DQHIrXjml57kuaokxgOEOPj3EbX1svTsGo2Bt:VBkSOvw71svTOO
Malware Config
Signatures
Files
-
38ffe9a76da60c9f9c104f26b2c87db0857f63e87ffb345f636ba2c09b47cac4.exe windows x86
518a00a06e537efa2b132b6a0b6981a9
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
RemoveDirectoryA
DeviceIoControl
GetVersionExA
CreateDirectoryA
GetWindowsDirectoryA
GetProcessHeap
GetFullPathNameA
FormatMessageA
GetShortPathNameA
GetLocaleInfoA
CompareStringW
CompareStringA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
GetConsoleMode
GetConsoleCP
QueryPerformanceCounter
GetEnvironmentStringsW
CreateEventA
GetEnvironmentStrings
FreeEnvironmentStringsA
HeapSize
GetFileType
SetHandleCount
GetStringTypeW
GetStringTypeA
GetStdHandle
ExitProcess
HeapReAlloc
CreateProcessA
VirtualFree
LCMapStringW
LCMapStringA
SetLastError
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
IsValidCodePage
GetOEMCP
GetCPInfo
GetStartupInfoA
GetCommandLineA
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RaiseException
GetDateFormatA
GetTimeFormatA
GetDriveTypeA
FileTimeToLocalFileTime
FileTimeToSystemTime
CreateThread
ExitThread
GetSystemTimeAsFileTime
RtlUnwind
SetEvent
GetSystemTime
ResumeThread
CopyFileA
TerminateThread
DeleteCriticalSection
GetFileTime
SetFileTime
SetEnvironmentVariableA
OutputDebugStringA
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
SetEndOfFile
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
GetFileSize
GetCurrentDirectoryA
SetCurrentDirectoryA
FindFirstFileA
GetFileAttributesA
FlushFileBuffers
ReleaseMutex
CreateMutexA
TerminateProcess
OpenProcess
GetCurrentProcess
GetACP
GetComputerNameA
GetTimeZoneInformation
GetModuleHandleA
GetVolumeInformationA
HeapDestroy
HeapCreate
HeapFree
HeapAlloc
GetCurrentProcessId
GetCurrentThreadId
GetModuleFileNameA
InterlockedIncrement
lstrlenA
WideCharToMultiByte
VirtualAlloc
InterlockedDecrement
SetFileAttributesA
FindNextFileA
FindClose
WaitForSingleObject
Sleep
FreeLibrary
GetLastError
LoadLibraryA
GetProcAddress
LocalFree
MoveFileA
DeleteFileA
GetVersion
GetSystemDirectoryA
GetTickCount
MultiByteToWideChar
WriteFile
CreateFileA
ReadFile
SetFilePointer
CloseHandle
FreeEnvironmentStringsW
VirtualProtect
user32
PostThreadMessageA
KillTimer
DispatchMessageA
TranslateMessage
GetMessageA
SetTimer
GetCursorPos
wsprintfA
GetForegroundWindow
ExitWindowsEx
GetSystemMetrics
CreateDialogParamA
UpdateWindow
ShowWindow
IsWindow
EndDialog
PostQuitMessage
SetCursor
MessageBoxA
LoadStringA
DestroyWindow
LoadIconA
LoadCursorA
RegisterClassA
CreateWindowExA
PostMessageA
UnregisterClassA
GetPropA
SetPropA
DefWindowProcA
GetDC
ReleaseDC
gdi32
GetStockObject
GetDeviceCaps
advapi32
RegDeleteValueA
RegSetKeySecurity
RegOpenKeyExA
RegGetKeySecurity
RegCloseKey
GetTokenInformation
GetSecurityInfo
SetEntriesInAclA
SetSecurityInfo
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
GetUserNameA
RegCreateKeyExA
RegDeleteKeyA
RegEnumKeyExA
RegQueryValueExA
RegEnumValueA
DeregisterEventSource
CloseServiceHandle
OpenServiceA
OpenSCManagerA
StartServiceA
QueryServiceStatus
ControlService
SetServiceStatus
ReportEventA
RegisterEventSourceA
DeleteService
RegCreateKeyA
CreateServiceA
RegisterServiceCtrlHandlerA
StartServiceCtrlDispatcherA
InitiateSystemShutdownA
RegConnectRegistryA
RegSetValueExA
shell32
SHGetMalloc
SHGetSpecialFolderLocation
SHGetPathFromIDListA
ole32
StringFromCLSID
CoInitialize
CoCreateInstance
CoInitializeEx
CoUninitialize
CoTaskMemFree
oleaut32
SysAllocStringLen
SysFreeString
SysAllocString
Sections
.text Size: 280KB - Virtual size: 279KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 172KB - Virtual size: 168KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 36KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 392B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ