Static task
static1
Behavioral task
behavioral1
Sample
d3b53ef8038633bf74465d87da2b8168187bb8a705d0b078790138e82d01f344.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d3b53ef8038633bf74465d87da2b8168187bb8a705d0b078790138e82d01f344.exe
Resource
win10v2004-20221111-en
General
-
Target
d3b53ef8038633bf74465d87da2b8168187bb8a705d0b078790138e82d01f344
-
Size
151KB
-
MD5
3dde100835a2cdf98747f33a6d326730
-
SHA1
5dac9177d4b9be1c4648f9da77bf4a87ae765d25
-
SHA256
d3b53ef8038633bf74465d87da2b8168187bb8a705d0b078790138e82d01f344
-
SHA512
25fca2884122cb6e543c70ec7ed2ee19506da2524b6ff605c167a888103ae398768a5b6a413a82f53eaac5cff3c30ce4258ac12329188fca3714eacf6256b4f2
-
SSDEEP
3072:JuWmqVW6dAEqshM7Du76pgTqhlkZ+rWVfzPKdfRnANwr:JuWmR6deVPpgGAZ8gzPKdpANW
Malware Config
Signatures
Files
-
d3b53ef8038633bf74465d87da2b8168187bb8a705d0b078790138e82d01f344.exe windows x86
a53a53db630e76990af549938f184131
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WaitForSingleObject
ReleaseMutex
GetModuleFileNameA
DefineDosDeviceA
MoveFileExA
SetFileAttributesA
GlobalMemoryStatusEx
GetDiskFreeSpaceExA
GlobalFree
GetProcessHeap
HeapAlloc
HeapFree
GetLocalTime
MoveFileA
OpenProcess
GetStartupInfoA
WriteProcessMemory
CreateRemoteThread
GetCurrentProcess
CreateProcessA
SetLastError
GetLastError
GetProcAddress
ReadFile
WriteFile
RemoveDirectoryA
GetDriveTypeA
CreateDirectoryA
GetVersionExA
lstrcmpA
WideCharToMultiByte
CreateMutexA
ExitProcess
SetErrorMode
OpenEventA
CloseHandle
VirtualAllocEx
GetTickCount
MultiByteToWideChar
lstrcatA
GetPrivateProfileSectionNamesA
lstrlenA
InterlockedExchange
SetEvent
lstrcpyA
ResetEvent
Sleep
CreateEventA
VirtualAlloc
LoadLibraryA
GetModuleHandleA
user32
GetKeyState
SetCapture
WindowFromPoint
SetCursorPos
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
GetSystemMetrics
GetAsyncKeyState
ReleaseDC
SetRect
GetCursorPos
wsprintfA
SetProcessWindowStation
OpenWindowStationA
GetProcessWindowStation
GetWindowThreadProcessId
IsWindowVisible
CloseDesktop
GetThreadDesktop
IsWindow
CharNextA
GetWindowTextA
GetForegroundWindow
LoadCursorA
SendMessageA
CloseWindow
CreateWindowExA
PostMessageA
OpenDesktopA
gdi32
CreateDIBSection
SelectObject
BitBlt
CreateCompatibleBitmap
GetDIBits
DeleteObject
DeleteDC
advapi32
RegCreateKeyExA
OpenServiceA
QueryServiceStatus
ControlService
DeleteService
CloseServiceHandle
RegQueryValueA
RegCloseKey
LsaOpenPolicy
LsaRetrievePrivateData
LsaClose
LookupAccountNameA
IsValidSid
RegSetValueExA
RegCreateKeyA
SetNamedSecurityInfoA
BuildExplicitAccessWithNameA
GetNamedSecurityInfoA
SetEntriesInAclA
RegQueryValueExA
RegOpenKeyA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
FreeSid
RegSetKeySecurity
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
AddAccessAllowedAce
InitializeAcl
GetLengthSid
AllocateAndInitializeSid
RegEnumValueA
RegEnumKeyExA
RegDeleteValueA
RegDeleteKeyA
CreateProcessAsUserA
SetTokenInformation
DuplicateTokenEx
LookupAccountSidA
GetTokenInformation
OpenSCManagerA
shell32
SHGetFileInfoA
SHGetSpecialFolderPathA
shlwapi
SHDeleteKeyA
msvcrt
_strnicmp
_beginthreadex
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
??1type_info@@UAE@XZ
calloc
_strupr
strncat
strtok
_errno
atoi
strncmp
strcat
rename
strrchr
_except_handler3
free
??3@YAXPAX@Z
__CxxFrameHandler
_CxxThrowException
memcpy
memmove
ceil
_ftol
strlen
strstr
memset
??2@YAPAXI@Z
strcpy
strchr
malloc
strcmp
ws2_32
inet_ntoa
inet_addr
getsockname
bind
getpeername
accept
listen
sendto
recvfrom
__WSAFDIsSet
send
closesocket
recv
ntohs
gethostbyname
htons
WSAStartup
WSACleanup
WSAIoctl
setsockopt
gethostname
select
connect
socket
msvcp60
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBDABV?$allocator@D@1@@Z
?c_str@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEPBDXZ
wtsapi32
WTSFreeMemory
WTSQueryUserToken
WTSQuerySessionInformationA
userenv
CreateEnvironmentBlock
psapi
EnumProcessModules
Sections
.text Size: 118KB - Virtual size: 117KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 14KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ