Static task
static1
Behavioral task
behavioral1
Sample
00d61f8c22be0753ede5602bd574b9d8e4924e030475b32a10939a0dc453afd1.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
00d61f8c22be0753ede5602bd574b9d8e4924e030475b32a10939a0dc453afd1.exe
Resource
win10v2004-20220812-en
General
-
Target
00d61f8c22be0753ede5602bd574b9d8e4924e030475b32a10939a0dc453afd1
-
Size
114KB
-
MD5
3b7d706f448bcb050c83e6edbd4cdafe
-
SHA1
6bbeace106ee36356746845e8779c5295d326814
-
SHA256
00d61f8c22be0753ede5602bd574b9d8e4924e030475b32a10939a0dc453afd1
-
SHA512
bdd0c949b83391efed2d78f2a12a9eb855f011085c44be53bab225238bc2beb328b3fda8f8a74e3341eae6019296b7a6d8ccec0c34578a51baee2f42d07e89a8
-
SSDEEP
1536:5kVksCr5jJxsHf4JoEqlqC6gvBo+uCKEFXvxdqHsvgXCRj+j4YjQoXMTKYrkUC:NhjLsHgaEq2OBo+uCX5ybXCRjvYjjKKL
Malware Config
Signatures
Files
-
00d61f8c22be0753ede5602bd574b9d8e4924e030475b32a10939a0dc453afd1.exe windows x86
4227c4557a171e5e5c5c3d2d81fd32cb
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
InterlockedDecrement
GetCurrentThreadId
SetLastError
GetCurrentThread
TlsFree
TlsSetValue
HeapFree
GetModuleFileNameA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
LoadLibraryW
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
LeaveCriticalSection
FatalAppExitA
EnterCriticalSection
SetConsoleCtrlHandler
FreeLibrary
InterlockedExchange
GetLocaleInfoW
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
Sleep
RtlUnwind
HeapSize
LCMapStringW
MultiByteToWideChar
FindResourceA
LockResource
LoadLibraryA
GetProcAddress
TerminateProcess
GetCurrentProcess
LoadResource
FreeResource
InterlockedIncrement
TlsGetValue
TlsAlloc
EncodePointer
HeapDestroy
HeapCreate
GetModuleFileNameW
GetStdHandle
WriteFile
HeapAlloc
GetLastError
HeapReAlloc
GetSystemTimeAsFileTime
GetCommandLineA
HeapSetInformation
GetStartupInfoW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
GetModuleHandleW
ExitProcess
DecodePointer
GetStringTypeW
user32
CloseClipboard
DestroyAcceleratorTable
GetSystemMenu
SetActiveWindow
GetMenuItemID
IsZoomed
GetSubMenu
GetFocus
IsClipboardFormatAvailable
GetParent
SetParent
FindWindowW
SetFocus
ModifyMenuW
GetMenu
SetRect
CreateAcceleratorTableA
ReleaseDC
EmptyClipboard
GetMenuState
LoadAcceleratorsA
SetMenu
GetActiveWindow
GetMenuItemCount
RemoveMenu
SetMenuDefaultItem
InsertMenuW
OpenClipboard
AdjustWindowRectEx
MessageBoxW
LoadImageA
SetClipboardData
FindWindowA
CopyRect
GrayStringA
gdi32
SetViewportExtEx
GetBitmapBits
SetBitmapBits
SetViewportOrgEx
CreateDIBSection
GetDIBits
ResetDCA
CreateRectRgnIndirect
RectInRegion
Rectangle
SetDIBits
ScaleViewportExtEx
GetBkColor
RectVisible
CreateDIBitmap
GetStockObject
OffsetViewportOrgEx
GetTextColor
RestoreDC
advapi32
RegDeleteValueW
GetSecurityDescriptorDacl
AdjustTokenPrivileges
RegEnumKeyExW
RegOpenKeyA
FreeSid
RegEnumValueW
AllocateAndInitializeSid
LookupPrivilegeValueW
SetSecurityDescriptorDacl
RegDeleteKeyW
InitializeSecurityDescriptor
RegQueryInfoKeyW
EqualSid
RegEnumKeyW
GetTokenInformation
OpenThreadToken
OpenProcessToken
shell32
ShellAboutA
ShellExecuteW
SHGetMalloc
SHGetSpecialFolderLocation
ShellExecuteExW
Shell_NotifyIconW
SHGetDesktopFolder
Sections
.text Size: 49KB - Virtual size: 49KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 52KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ