Static task
static1
Behavioral task
behavioral1
Sample
5f6e697c23719aef4abe22aec16a07f87da673617ea9dd57d08b7a0dbcaf99f1.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5f6e697c23719aef4abe22aec16a07f87da673617ea9dd57d08b7a0dbcaf99f1.exe
Resource
win10v2004-20220901-en
General
-
Target
5f6e697c23719aef4abe22aec16a07f87da673617ea9dd57d08b7a0dbcaf99f1
-
Size
286KB
-
MD5
a1fabe2300e17f278926af29e37f635a
-
SHA1
1dbc28e562bc0123396efdb5f729aa2127cc044b
-
SHA256
5f6e697c23719aef4abe22aec16a07f87da673617ea9dd57d08b7a0dbcaf99f1
-
SHA512
6b25706b24988dbc1f3029f54b827c3e8a00eaabfa31ce93d42214fade68478fa2ed2cc60589126158a54db6d6c9a3b7a33ad2dc685ab9dbd5d3584f9b318d06
-
SSDEEP
6144:Y+Ybmlg8K8qv3hvGDjN5joirSrsTjGG22cWW:r2ml54hvQjNcrujGGE
Malware Config
Signatures
Files
-
5f6e697c23719aef4abe22aec16a07f87da673617ea9dd57d08b7a0dbcaf99f1.exe windows x86
5ce8d35df856b9400fc528f2a0f3964c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcpynA
CopyFileA
GetDateFormatA
DeleteCriticalSection
GetCurrentThreadId
OpenProcess
GetTempFileNameA
lstrcmpiA
lstrlenA
EnterCriticalSection
WritePrivateProfileStringA
CreateMutexA
HeapAlloc
GetWindowsDirectoryA
ReleaseMutex
GetModuleHandleA
DeleteFileA
WaitForSingleObject
CloseHandle
CreateEventA
ProcessIdToSessionId
GetComputerNameA
HeapFree
GetPrivateProfileStringA
LocalFree
LoadLibraryExA
GetLocalTime
FreeLibrary
GetCurrentDirectoryA
LeaveCriticalSection
GetCommandLineW
FormatMessageA
GetProcessHeap
GetACP
GetShortPathNameA
MoveFileExA
SetLastError
CreateProcessA
WideCharToMultiByte
GetCommandLineA
GetStartupInfoA
VirtualAlloc
shlwapi
PathFileExistsA
PathRemoveFileSpecA
version
VerQueryValueA
GetFileVersionInfoA
GetFileVersionInfoSizeA
user32
CharUpperA
SendMessageA
FindWindowExW
GetSystemMetrics
CharPrevA
ExitWindowsEx
FindWindowExA
PostMessageA
MessageBoxA
SetForegroundWindow
oleaut32
SysFreeString
SysAllocStringByteLen
advapi32
RegOpenKeyExA
SetTokenInformation
RevertToSelf
ImpersonateLoggedOnUser
RegOpenKeyExW
RegDeleteValueA
RegQueryInfoKeyA
RegSetValueExA
InitializeSecurityDescriptor
RegQueryValueExW
GetTokenInformation
ImpersonateSelf
LookupPrivilegeValueA
RegQueryValueExA
GetUserNameA
RegEnumKeyExA
SetSecurityDescriptorDacl
AdjustTokenPrivileges
OpenProcessToken
RegCloseKey
DuplicateTokenEx
ole32
CoCreateInstance
CoInitializeEx
CoUninitialize
esent
JetCreateTable
JetCreateDatabase
JetAttachDatabase
JetGetDatabaseFileInfo
JetGetInstanceInfo
JetIdle
JetCreateInstance2
JetSetCurrentIndex
JetOpenTempTable
JetBeginExternalBackupInstance
JetGetTableIndexInfo
JetBeginTransaction2
kbdfc
KbdLayerDescriptor
Sections
.text Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 258KB - Virtual size: 1.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 6KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ