Static task
static1
Behavioral task
behavioral1
Sample
8cb603192a91a53dd2894e3c2a58a91a5ad049843e84f733012dbddfc68e9c00.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
8cb603192a91a53dd2894e3c2a58a91a5ad049843e84f733012dbddfc68e9c00.exe
Resource
win10v2004-20220901-en
General
-
Target
8cb603192a91a53dd2894e3c2a58a91a5ad049843e84f733012dbddfc68e9c00
-
Size
186KB
-
MD5
3c5b3fe3949724cdcd3a8aa9c7ed93cd
-
SHA1
8174da6d43e0097c4a7ba7dfe0353f2749ef838f
-
SHA256
8cb603192a91a53dd2894e3c2a58a91a5ad049843e84f733012dbddfc68e9c00
-
SHA512
ed6fe15f62bbec1fbdabc884ef1113b156495b380ed2e605dfc766b98532e5a514a6fc581c72749e814c25109584df3ee03af3195ca81a96c71a36e1d9a4cf1d
-
SSDEEP
3072:UU6AMDUTvlImPxPS6Qmn1lNq6g+SmZ82H:w1ouqxPS6Qmn1lNq6g+SmZ3
Malware Config
Signatures
Files
-
8cb603192a91a53dd2894e3c2a58a91a5ad049843e84f733012dbddfc68e9c00.exe windows x86
d4330f00c16ff578bde9a1b87c61599b
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegSetValueExA
AllocateAndInitializeSid
OpenThreadToken
CloseServiceHandle
RegQueryInfoKeyW
GetLengthSid
RegQueryValueExA
RegOpenKeyW
OpenProcessToken
RegOpenKeyExA
OpenProcessToken
RegDeleteKeyW
GetLengthSid
InitializeAcl
RegOpenKeyExA
AllocateAndInitializeSid
RegSetValueExA
RegCreateKeyExA
InitializeSecurityDescriptor
GetTokenInformation
GetTokenInformation
CloseServiceHandle
InitializeAcl
CloseServiceHandle
GetTokenInformation
RegDeleteKeyW
RegSetValueExW
RegQueryValueExW
AdjustTokenPrivileges
OpenProcessToken
AddAccessAllowedAce
RegCreateKeyExW
OpenProcessToken
FreeSid
RegDeleteValueW
RegDeleteValueW
RegOpenKeyExW
RegDeleteValueW
RegQueryValueExW
RegEnumValueW
AddAccessAllowedAce
GetLengthSid
OpenProcessToken
AddAccessAllowedAce
OpenThreadToken
FreeSid
RegDeleteValueW
SetSecurityDescriptorDacl
OpenThreadToken
InitializeSecurityDescriptor
RegDeleteValueW
RegCreateKeyExW
RegOpenKeyExA
RegCreateKeyExW
FreeSid
RegSetValueExW
OpenProcessToken
AdjustTokenPrivileges
RegQueryValueExA
RegCreateKeyExW
RegOpenKeyExW
RegCreateKeyExA
InitializeSecurityDescriptor
GetLengthSid
OpenThreadToken
RegQueryValueExA
RegCloseKey
RegQueryValueExW
RegOpenKeyExA
RegQueryValueExW
RegDeleteKeyW
RegCreateKeyExA
RegQueryValueExW
CloseServiceHandle
AdjustTokenPrivileges
RegDeleteValueW
FreeSid
RegCreateKeyExA
RegSetValueExA
RegEnumKeyExW
RegOpenKeyW
RegDeleteValueW
FreeSid
SetSecurityDescriptorDacl
RegQueryInfoKeyW
RegEnumValueW
FreeSid
AllocateAndInitializeSid
AdjustTokenPrivileges
RegCreateKeyExA
RegCloseKey
RegEnumValueW
RegQueryValueExW
RegSetValueExA
RegQueryValueExW
RegCreateKeyExW
RegDeleteKeyW
RegCloseKey
RegQueryValueExA
RegCreateKeyExW
CloseServiceHandle
InitializeAcl
RegSetValueExW
AdjustTokenPrivileges
SetSecurityDescriptorDacl
RegEnumKeyExW
RegDeleteValueW
InitializeSecurityDescriptor
OpenThreadToken
GetTokenInformation
RegOpenKeyExA
RegOpenKeyExW
SetSecurityDescriptorDacl
RegSetValueExW
AddAccessAllowedAce
RegCreateKeyExW
FreeSid
RegDeleteKeyW
GetLengthSid
RegEnumKeyExW
RegQueryValueExW
AdjustTokenPrivileges
RegEnumValueW
RegSetValueExA
CloseServiceHandle
CloseServiceHandle
RegEnumValueW
RegCloseKey
RegSetValueExW
RegSetValueExA
RegOpenKeyW
RegCreateKeyExA
RegQueryInfoKeyW
FreeSid
SetSecurityDescriptorDacl
RegCreateKeyExW
GetLengthSid
RegOpenKeyExW
user32
SystemParametersInfoW
CharNextW
MessageBeep
EnableMenuItem
GetSystemMetrics
KillTimer
DialogBoxParamW
IsWindowVisible
EnableMenuItem
IsWindowVisible
LoadStringW
IsWindowVisible
DestroyMenu
CopyRect
GetSysColor
FindWindowW
DestroyWindow
SetWindowLongW
EndPaint
UpdateWindow
PeekMessageW
CallWindowProcW
WinHelpW
GetWindow
SendMessageW
SetTimer
GetParent
DialogBoxParamW
CopyRect
GetWindowRect
GetWindowRect
GetWindowLongW
wsprintfW
KillTimer
EnableWindow
EndPaint
CreateDialogParamW
SetCursor
PeekMessageW
OffsetRect
EndDialog
GetSubMenu
LoadStringW
wsprintfA
GetWindowTextW
EndDialog
UpdateWindow
DestroyIcon
GetFocus
SystemParametersInfoW
KillTimer
GetDC
CheckDlgButton
MessageBoxW
GetDlgItem
OffsetRect
GetMenu
GetCursorPos
GetSystemMetrics
UpdateWindow
MoveWindow
GetKeyState
GetMenu
kernel32
InterlockedIncrement
GetModuleFileNameA
LeaveCriticalSection
CloseHandle
ExitProcess
GetVersionExA
GetModuleHandleW
SetLastError
LoadLibraryW
GetACP
SetUnhandledExceptionFilter
GetCurrentProcess
ReadFile
TerminateProcess
lstrlenW
WaitForSingleObject
WideCharToMultiByte
GetCurrentProcess
GetACP
HeapFree
MultiByteToWideChar
GetCommandLineW
QueryPerformanceCounter
GetCurrentProcessId
LoadLibraryW
HeapAlloc
TerminateProcess
Sections
Size: 141KB - Virtual size: 156KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Size: 6KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 512B
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE