Static task
static1
Behavioral task
behavioral1
Sample
1b267998a58279e6b8f3dfe04d80f4923ca28c0e39eb84bd9336026a3cb2c960.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
1b267998a58279e6b8f3dfe04d80f4923ca28c0e39eb84bd9336026a3cb2c960.exe
Resource
win10v2004-20220901-en
General
-
Target
1b267998a58279e6b8f3dfe04d80f4923ca28c0e39eb84bd9336026a3cb2c960
-
Size
100KB
-
MD5
42a1c7828bdf90fb3c55e8e8f4735995
-
SHA1
75482b652119759638185f2708f89ca986ca8d5d
-
SHA256
1b267998a58279e6b8f3dfe04d80f4923ca28c0e39eb84bd9336026a3cb2c960
-
SHA512
f30bcb1358e2e50093c34588e13d32a96e3af1f7f7562bfc49719ec6a396d72947a06a1951de14c720c736dfe8b411bd2f40ce110d315c2ec7eb2f1f15df6500
-
SSDEEP
1536:420jco6Cn1UCB1dksuxUqCtnFhs6fMkiMgkNiGNo0+UXjQxcclI6GvabzWvpgobM:t0wxC1WsuWF/fMkRFiTOExFGybzZ2U
Malware Config
Signatures
Files
-
1b267998a58279e6b8f3dfe04d80f4923ca28c0e39eb84bd9336026a3cb2c960.exe windows x86
e53010cf451899b0aaea306a7d9b3cd6
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LocalShrink
MulDiv
OpenJobObjectW
ReadFile
HeapFree
SetEnvironmentVariableA
TlsGetValue
TryEnterCriticalSection
WaitForMultipleObjectsEx
HeapCreate
HeapAlloc
GlobalAlloc
GetVersionExA
GetTimeZoneInformation
GetTempPathW
GetSystemInfo
GetStringTypeExW
GetModuleHandleA
GetLogicalDriveStringsW
GetFileAttributesExA
GetExitCodeProcess
GetConsoleOutputCP
GetCommandLineA
ExitProcess
EraseTape
EndUpdateResourceA
DuplicateHandle
DeleteCriticalSection
CloseHandle
RemoveDirectoryW
BeginUpdateResourceA
ole32
CoUninitialize
CoFreeUnusedLibraries
IsEqualGUID
winmm
midiOutCacheDrumPatches
mmioDescend
mxd32Message
waveInGetDevCapsW
waveInGetNumDevs
waveInOpen
waveInReset
waveInStop
joyGetPos
waveOutUnprepareHeader
waveOutPrepareHeader
ws2_32
WSAGetLastError
WSAStringToAddressA
WSAUnhookBlockingHook
send
socket
connect
closesocket
WSAWaitForMultipleEvents
listen
dinput
DirectInputCreateW
user32
TranslateMessage
AdjustWindowRect
CharLowerBuffA
CharToOemA
CheckMenuItem
ClientToScreen
DefWindowProcA
DestroyWindow
DialogBoxIndirectParamW
DispatchMessageA
DrawFrame
EmptyClipboard
EnumDisplayMonitors
EnumWindowStationsA
GetForegroundWindow
GetTitleBarInfo
IsWindowEnabled
LoadIconA
MessageBeep
MessageBoxW
MsgWaitForMultipleObjects
OpenClipboard
PeekMessageA
RegisterShellHookWindow
RegisterWindowMessageA
UpdateWindow
UpdateLayeredWindow
version
VerQueryValueA
GetFileVersionInfoA
shell32
ShellExecuteA
SHGetSpecialFolderPathW
SHFileOperationW
advapi32
SetSecurityDescriptorDacl
AddAccessDeniedAce
CryptEncrypt
EqualSid
FileEncryptionStatusW
GetAce
GetAclInformation
GetLengthSid
GetTrusteeNameW
InitializeSecurityDescriptor
LsaClearAuditLog
LsaSetSecret
OpenProcessToken
OpenServiceA
QueryServiceConfig2A
RegOpenKeyA
RegOpenKeyExA
RegQueryValueExA
SystemFunction013
Sections
.text Size: 80KB - Virtual size: 79KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ