Static task
static1
Behavioral task
behavioral1
Sample
45f5bf18ea39e69745e629e9f309adf04303f7c299467315178b85fcacb5e004.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
45f5bf18ea39e69745e629e9f309adf04303f7c299467315178b85fcacb5e004.exe
Resource
win10v2004-20221111-en
General
-
Target
45f5bf18ea39e69745e629e9f309adf04303f7c299467315178b85fcacb5e004
-
Size
234KB
-
MD5
68df38a1b0b7a445d697c08963f04ca6
-
SHA1
c6800ae73ee2687723cb17d5f606e907ca55761b
-
SHA256
45f5bf18ea39e69745e629e9f309adf04303f7c299467315178b85fcacb5e004
-
SHA512
305914149fc3c703bcfe838ad8fd4528e3152d8c9d5e671b1f3c174298037eae64407059c0c9560e0d0874651b731a5b0a5f197cfd61199bbfb45d1cff3b8683
-
SSDEEP
6144:JS669sV5HpHhPp0RnoHVlGaGErTfZUr/Ux6mvDlnnVMPk9SoHtjbTV:JS6wsV5HpHhPp0SHCanlUs6mvD5Vik9d
Malware Config
Signatures
Files
-
45f5bf18ea39e69745e629e9f309adf04303f7c299467315178b85fcacb5e004.exe windows x86
e1cfdff372d4dfe89bc91cc341e0f565
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comdlg32
GetFileTitleA
advapi32
SystemFunction016
MSChapSrvChangePassword
RegOpenKeyExA
RegCreateKeyExA
RegDeleteValueA
LsaICLookupNamesWithCreds
GetAclInformation
LsaEnumeratePrivileges
AddUsersToEncryptedFile
OpenThreadToken
RegCloseKey
LockServiceDatabase
SetSecurityDescriptorControl
kernel32
FreeEnvironmentStringsA
RaiseException
lstrcatA
SetFileAttributesA
SetErrorMode
LocalFree
InterlockedDecrement
GlobalAddAtomA
GetModuleHandleA
FlushFileBuffers
ExitProcess
LockResource
Beep
VirtualFree
DuplicateHandle
FindNextFileA
InterlockedIncrement
CompareStringA
GetProcAddress
InitializeCriticalSection
FindResourceA
GetTimeZoneInformation
SystemTimeToFileTime
SetConsoleCursorInfo
GetStringTypeW
HeapCreate
WideCharToMultiByte
HeapSize
GetCurrentThread
HeapAlloc
GetCommandLineA
HeapReAlloc
TlsFree
LoadResource
GlobalFree
IsBadCodePtr
TlsSetValue
FileTimeToSystemTime
GlobalAlloc
lstrcpyA
lstrcmpA
LoadLibraryA
FindClose
GetWindowsDirectoryA
FlushInstructionCache
FileTimeToLocalFileTime
SetEndOfFile
UnhandledExceptionFilter
GetOEMCP
LocalFileTimeToFileTime
EnterCriticalSection
GetVersion
GetLastError
LocalAlloc
GetCurrentProcess
GetThreadLocale
TlsAlloc
IsBadReadPtr
FreeLibrary
LocalUnlock
WriteFile
DeleteCriticalSection
SetUnhandledExceptionFilter
GlobalFindAtomA
RtlUnwind
GlobalDeleteAtom
CompareStringW
GetFileTime
GetVersionExA
VirtualAlloc
SetConsoleTextAttribute
SetSystemTime
GetEnvironmentStringsW
GetFileAttributesA
lstrcpynA
GetDriveTypeA
SetStdHandle
GetStringTypeA
SetLastError
GetVolumeInformationA
LCMapStringA
GetProcessVersion
lstrcmpiA
SetFilePointer
LockFile
GetCPInfo
ReadFile
UnlockFile
lstrlenA
SetEnvironmentVariableA
SystemTimeToTzSpecificLocalTime
DeleteFileA
GetEnvironmentVariableA
GlobalGetAtomNameA
GetSystemDirectoryA
CreateFileA
GetFullPathNameA
GetStdHandle
SetHandleCount
HeapFree
MultiByteToWideChar
HeapDestroy
FindFirstFileA
GetFileType
GetEnvironmentStringsA
IsValidLocale
FreeEnvironmentStringsW
GetACP
LeaveCriticalSection
IsDebuggerPresent
GlobalUnlock
GetStartupInfoA
GetFileSize
LCMapStringW
IsBadWritePtr
GetCurrentThreadId
TlsGetValue
GlobalFlags
MulDiv
InitializeSListHead
DosDateTimeToFileTime
LocalReAlloc
CloseHandle
GlobalHandle
GetCurrentDirectoryA
GetModuleFileNameA
SetCurrentDirectoryA
Sleep
GlobalLock
ReleaseActCtx
gdi32
ScaleViewportExtEx
GetDeviceCaps
SetWindowExtEx
TextOutA
DeleteObject
GetRelAbs
SetViewportExtEx
GetClipBox
DeleteDC
RestoreDC
CreateDIBitmap
SetMapMode
RoundRect
CreateEllipticRgn
winmm
timeGetSystemTime
mixerOpen
mmioAdvance
user32
GetLastActivePopup
GetWindowLongA
PostMessageA
DestroyWindow
CopyRect
SetWindowLongA
IsWindowVisible
EndDialog
GetForegroundWindow
ValidateRect
CreateDialogIndirectParamA
CreateWindowExA
TranslateMessage
GetWindowPlacement
GetMenu
EnableWindow
LoadStringA
ReleaseDC
GetTopWindow
GetActiveWindow
GetMessagePos
ShowWindow
SendDlgItemMessageA
wsprintfA
EnableMenuItem
GetDlgCtrlID
SystemParametersInfoA
DrawIcon
UpdateWindow
GetMenuCheckMarkDimensions
MessageBoxA
SetMenuItemBitmaps
ExitWindowsEx
IsWindow
PostQuitMessage
GetParent
GetWindowRect
SetPropA
SetActiveWindow
LoadBitmapA
GetWindow
GetCursorPos
RegisterClassA
GetSubMenu
GetKeyState
GetCapture
SetWindowTextA
GetSysColor
DefWindowProcA
CheckMenuItem
GetSystemMetrics
PtInRect
SendMessageA
GrayStringA
GetMenuState
SetWindowPos
LoadIconA
PeekMessageA
IsWindowEnabled
CallNextHookEx
DestroyMenu
BeginPaint
GetClassNameA
GetMenuItemCount
UnregisterClassA
RemovePropA
ClientToScreen
GetClientRect
LoadCursorA
GetDlgItem
GetClassInfoA
GetDC
GetMenuItemID
CallWindowProcA
GetPropA
SetWindowsHookExA
CharUpperA
GetMessageA
IsDialogMessageA
GetWindowTextA
MapWindowPoints
GetWindowTextLengthA
WinHelpA
GetFocus
Sections
.text Size: 200KB - Virtual size: 200KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 504B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ