Static task
static1
Behavioral task
behavioral1
Sample
160b26a79e427524897db1d95bf4fcfed101da6ac2ab0068cc0cf9449940d29e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
160b26a79e427524897db1d95bf4fcfed101da6ac2ab0068cc0cf9449940d29e.exe
Resource
win10v2004-20220812-en
General
-
Target
160b26a79e427524897db1d95bf4fcfed101da6ac2ab0068cc0cf9449940d29e
-
Size
940KB
-
MD5
9f88e142f789ad600f739c7f32c84c1a
-
SHA1
c4044eaf21dec4e82deeae405b65a9aab4f38b35
-
SHA256
160b26a79e427524897db1d95bf4fcfed101da6ac2ab0068cc0cf9449940d29e
-
SHA512
ca73a7b2bdd7f93be52dd9369bb36d271e94c503a5da3b9921cb85a557a0e8508404293a82574804829442c6d8323c5f7d8e66056b2ec344b9e6f22df3d7cd37
-
SSDEEP
24576:ZWeWIm19/xqQ+ICQY49n5RTsDMxZO4udxE20cPUIAKqKlqeb:QLnxqQZ9sDMw500PlX
Malware Config
Signatures
Files
-
160b26a79e427524897db1d95bf4fcfed101da6ac2ab0068cc0cf9449940d29e.exe windows x86
6ee5c90ce75ad5827bbd89492070ca28
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
netapi32
NetLocalGroupAddMembers
DsEnumerateDomainTrustsW
NetUserChangePassword
I_NetServerReqChallenge
NetUserModalsGet
NetAlertRaiseEx
NetUseGetInfo
NetShareEnum
NetWkstaGetInfo
NetStatisticsGet
NetGroupGetInfo
NetLocalGroupEnum
NetGroupDel
msvcrt
rand
wcsstr
iswprint
_wfreopen
isupper
_CIcos
_ismbcalpha
_timezone
toupper
longjmp
_mbsnextc
memcmp
_mbsupr
_ismbblead
__setusermatherr
user32
BeginPaint
CheckMenuItem
SetWindowsHookA
EmptyClipboard
SetWindowRgn
SendNotifyMessageW
SendMessageW
MonitorFromWindow
SetKeyboardState
PtInRect
msacm32
acmStreamUnprepareHeader
acmFormatSuggest
acmFormatDetailsW
acmDriverOpen
acmStreamPrepareHeader
acmFormatChooseW
acmStreamConvert
acmGetVersion
acmMetrics
acmFormatTagDetailsW
acmStreamSize
acmStreamOpen
acmDriverEnum
acmStreamClose
acmDriverClose
advapi32
LogonUserW
GetKernelObjectSecurity
RegRestoreKeyW
AddAccessAllowedAce
InitializeSecurityDescriptor
RegSetKeySecurity
LookupPrivilegeValueW
RegisterEventSourceW
ElfDeregisterEventSource
EnumServicesStatusW
kernel32
GetSystemTime
OutputDebugStringW
GetPrivateProfileSectionW
GetVersion
SetupComm
AddAtomA
GetWindowsDirectoryW
CreateRemoteThread
VirtualAlloc
CreateConsoleScreenBuffer
EnumDateFormatsExW
GetProcessTimes
SetVolumeLabelA
EnumResourceLanguagesW
SystemTimeToFileTime
QueryInformationJobObject
ReplaceFileW
ExpandEnvironmentStringsW
GetCalendarInfoW
Sections
.text Size: 85KB - Virtual size: 84KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.idata Size: 148KB - Virtual size: 307KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 335KB - Virtual size: 377KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 141KB - Virtual size: 325KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: 107KB - Virtual size: 149KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 121KB - Virtual size: 121KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ