Static task
static1
Behavioral task
behavioral1
Sample
796597ada2b2c4b648f69f6abe56aa0408ad70837ff3af5135f845155fb83f9d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
796597ada2b2c4b648f69f6abe56aa0408ad70837ff3af5135f845155fb83f9d.exe
Resource
win10v2004-20220812-en
General
-
Target
796597ada2b2c4b648f69f6abe56aa0408ad70837ff3af5135f845155fb83f9d
-
Size
372KB
-
MD5
a6a568cb8da71158e3959bb42f85281a
-
SHA1
dce45a85690f0ce721f9a73df4b887ca6b49aa4c
-
SHA256
796597ada2b2c4b648f69f6abe56aa0408ad70837ff3af5135f845155fb83f9d
-
SHA512
9ddbe3dc56d050196efa78a25f7cb928285fb405515611d5379e02b0183dc20336496703f4836fd1b106c6cc8521f7204a7076deda6412c2d0818639ef36a509
-
SSDEEP
6144:bcHovxi6/HZGrnCPO1IjdSZE0M3gtibqGj5TUiOZqDKDYqQ/lQHbhFMm1G9IEhwl:b/MuPO+uM3Hbq4riCIYqQ/l2XMgZ+wT
Malware Config
Signatures
Files
-
796597ada2b2c4b648f69f6abe56aa0408ad70837ff3af5135f845155fb83f9d.exe windows x86
345ba20e582dd6e1ea69044a1974887e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
RegSetValueExW
RegCreateKeyExW
IsValidSid
AdjustTokenPrivileges
RegEnumKeyExA
OpenThreadToken
OpenProcessToken
RegOpenKeyExA
RegQueryValueExA
LookupPrivilegeValueW
kernel32
DeleteCriticalSection
GetProcessAffinityMask
SetCurrentDirectoryA
SetFilePointer
OpenProcess
MultiByteToWideChar
EnterCriticalSection
GetThreadTimes
SetFileAttributesA
HeapDestroy
OpenSemaphoreA
FindResourceA
GetModuleHandleA
GetPriorityClass
lstrcmpW
SetEvent
FreeEnvironmentStringsA
GetACP
GetComputerNameExW
CreateEventA
CreateEventW
FindResourceExW
GetComputerNameW
Sleep
FreeLibrary
AreFileApisANSI
GetConsoleOutputCP
SetProcessAffinityMask
OpenSemaphoreW
InterlockedDecrement
LoadLibraryA
PulseEvent
QueryPerformanceCounter
FindAtomA
GetSystemTimeAsFileTime
GetCurrentDirectoryW
GetSystemDefaultLCID
SetUnhandledExceptionFilter
CreateSemaphoreW
lstrcmpiW
GetTickCount
HeapSize
VirtualAlloc
CreateFileA
GetStartupInfoA
GetUserDefaultLCID
OpenEventW
GetProcAddress
GetVersion
ResetEvent
lstrlenA
GetOEMCP
GetNumberFormatW
HeapReAlloc
lstrlenW
GetCurrentProcess
SetPriorityClass
GlobalMemoryStatusEx
GlobalFree
GetCommandLineW
GetStartupInfoW
GetModuleHandleW
TlsAlloc
GetLogicalDrives
ExitProcess
CreateMutexW
GetCurrentProcessId
ProcessIdToSessionId
GetThreadLocale
ReleaseMutex
SetProcessShutdownParameters
WaitForSingleObject
GetUserDefaultLangID
IsDebuggerPresent
ExpandEnvironmentStringsW
CreateProcessW
FindResourceExA
GetCurrentThreadId
FormatMessageW
GlobalAlloc
lstrcatW
GetModuleFileNameA
GetSystemDefaultLangID
GetVersionExW
GetLocaleInfoW
LocalAlloc
LocalFree
HeapFree
GetWindowsDirectoryW
WriteFile
GetAtomNameA
HeapAlloc
GetProcessHeap
CreateThread
CloseHandle
lstrcpynW
lstrcpyW
GetLastError
FindClose
LoadLibraryW
InterlockedCompareExchange
GetVersionExA
IsBadWritePtr
GetCurrentDirectoryA
SetLastError
WideCharToMultiByte
GetCurrentThread
DelayLoadFailureHook
UnhandledExceptionFilter
gdi32
CreateFontIndirectW
GetCharWidth32W
CreateCompatibleBitmap
Rectangle
SetBkMode
SetTextColor
CreateCompatibleDC
DeleteDC
GetCurrentObject
GetObjectW
BitBlt
SelectObject
MoveToEx
LineTo
CreatePen
GetStockObject
CreateBrushIndirect
CreateRectRgn
DeleteObject
CreateSolidBrush
CombineRgn
SetPixel
ExtCreatePen
SetRectRgn
GetDeviceCaps
FillRgn
user32
DestroyIcon
LoadImageW
BeginDeferWindowPos
GetMenuItemCount
EnableMenuItem
GetSystemMetrics
SetMenuItemInfoW
GetCapture
LoadMenuW
FindWindowExA
DestroyMenu
ExitWindowsEx
LockWorkStation
GetAsyncKeyState
SetForegroundWindow
OpenIcon
LoadAcceleratorsW
MessageBoxW
CheckDlgButton
UnregisterClassA
EndDialog
GetWindowTextW
IsDlgButtonChecked
LoadCursorA
GetSubMenu
InvalidateRect
GetSysColor
MonitorFromRect
SetTimer
LoadIconW
GetThreadDesktop
GetDialogBaseUnits
GetClipboardOwner
GetDoubleClickTime
KillTimer
GetDesktopWindow
DestroyWindow
MessageBeep
MoveWindow
PostQuitMessage
IsZoomed
DispatchMessageW
TranslateMessage
IsDialogMessageW
TranslateAcceleratorW
GetMessageW
CreateDialogParamW
SendMessageTimeoutW
AllowSetForegroundWindow
GetWindowThreadProcessId
FindWindowW
RegisterWindowMessageW
SendMessageA
FillRect
DrawTextW
UpdateWindow
GetDlgCtrlID
SetFocus
CreateWindowExW
GetCursor
DialogBoxParamW
GetShellWindow
SetScrollPos
GetScrollInfo
IsWindow
EnableWindow
GetFocus
CharLowerBuffW
TrackPopupMenuEx
GetGuiResources
EnumWindowStationsW
GetClassLongW
IsHungAppWindow
InternalGetWindowText
IsWindowVisible
GetWindow
SetMenuDefaultItem
EnumWindows
CloseDesktop
DispatchMessageA
SetThreadDesktop
OpenDesktopW
EnumDesktopsW
CloseWindowStation
SetProcessWindowStation
GetProcessWindowStation
OpenWindowStationW
CascadeWindows
TileWindows
SwitchToThisWindow
GetLastActivePopup
EndTask
PostMessageW
ShowWindowAsync
GetCursorPos
CountClipboardFormats
SetDlgItemTextW
GetParent
GetWindowTextLengthW
SetRect
SetCursor
LoadCursorW
GetWindowRect
DeferWindowPos
EndDeferWindowPos
GetMenuItemInfoW
IsIconic
BeginPaint
EndPaint
DrawEdge
GetForegroundWindow
RegisterClassExA
GetKeyState
PostThreadMessageW
wsprintfW
GetClientRect
SetScrollInfo
CreateWindowExA
ShowWindow
SetWindowPos
SetMenu
GetDlgItem
GetActiveWindow
GetMessageA
MapWindowPoints
SendMessageW
GetMenu
GetCaretBlinkTime
CheckMenuRadioItem
CheckMenuItem
DeleteMenu
LoadStringW
SetWindowTextW
GetClassInfoW
RegisterClassW
GetDC
ReleaseDC
SystemParametersInfoW
GetWindowLongW
SetWindowLongW
CallWindowProcW
DefWindowProcW
RemoveMenu
GetWindowLongA
ntdll
_chkstk
_snwprintf
NtFlushBuffersFile
RtlUnwind
_wcsicmp
NtQueryVirtualMemory
NtOpenThread
NtClose
strrchr
RtlLargeIntegerToChar
RtlAnsiStringToUnicodeString
NtDeleteKey
NtQueryObject
mbstowcs
memmove
NtQuerySystemInformation
wcstol
NtShutdownSystem
NtGetPlugPlayEvent
NtRemoveIoCompletion
NtInitiatePowerAction
NtQueryMultipleValueKey
NtPowerInformation
RtlTimeToElapsedTimeFields
iphlpapi
GetInterfaceInfo
GetNumberOfInterfaces
GetIfEntry
comctl32
ImageList_Remove
ImageList_ReplaceIcon
ImageList_SetIconSize
ImageList_Create
CreateStatusWindowW
shell32
Shell_NotifyIconW
ShellAboutW
secur32
GetUserNameExW
vdmdbg
VDMEnumTaskWOWEx
VDMTerminateTaskWOW
Sections
.text Size: 112KB - Virtual size: 109KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 26KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 199KB - Virtual size: 215KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: - Virtual size: 23KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 29KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ