Static task
static1
Behavioral task
behavioral1
Sample
885ffda3000395d23c0dbc785ac94f32088ac8b5f3a1d7c5c76eba916bc9cc5a.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
885ffda3000395d23c0dbc785ac94f32088ac8b5f3a1d7c5c76eba916bc9cc5a.exe
Resource
win10v2004-20221111-en
General
-
Target
885ffda3000395d23c0dbc785ac94f32088ac8b5f3a1d7c5c76eba916bc9cc5a
-
Size
216KB
-
MD5
863828cfb6a51c72affb6f6a6f692d74
-
SHA1
8f002700bfc9c098775ae508a5cb07995c23cf5b
-
SHA256
885ffda3000395d23c0dbc785ac94f32088ac8b5f3a1d7c5c76eba916bc9cc5a
-
SHA512
c6731ac9d22dd5e017db9679d04ab0f5985923ecf8d9638817a222580627efcdda6a8602fbe38e93f49ce107fc5e8665fceae205e0ae7fc857885be60a8a7669
-
SSDEEP
3072:S6IHiv8vniKX6AXOCACFz76NLxa8XxvCdXeGcjQIP41Pa5AcfB01aDQ/:S6IHJvnJ6A0CF/Uxa8UUGq1kPatB9D+
Malware Config
Signatures
Files
-
885ffda3000395d23c0dbc785ac94f32088ac8b5f3a1d7c5c76eba916bc9cc5a.exe windows x86
b752abb2de98f46d4c672d400995387a
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalUnlock
OutputDebugStringA
GlobalFree
SetErrorMode
GetProcessHeap
HeapAlloc
HeapFree
CreateEventA
GetLocalTime
MoveFileA
ExitProcess
OpenProcess
VirtualAllocEx
WriteProcessMemory
CreateRemoteThread
GetCurrentProcess
CreateProcessA
SetLastError
GetLastError
SetFilePointer
ReadFile
Sleep
WriteFile
RemoveDirectoryA
LocalAlloc
LocalFree
GetDriveTypeA
CreateDirectoryA
GetVersionExA
lstrcmpA
WideCharToMultiByte
GetProcAddress
MultiByteToWideChar
FreeLibrary
lstrcatA
GetPrivateProfileSectionNamesA
lstrlenA
SetEvent
lstrcpyA
VirtualAlloc
VirtualFree
CloseHandle
LoadLibraryA
ReleaseMutex
RaiseException
InterlockedExchange
GetStartupInfoA
GetModuleHandleA
advapi32
SetSecurityDescriptorDacl
GetTokenInformation
LookupAccountSidA
RegDeleteKeyA
RegDeleteValueA
RegEnumKeyExA
RegEnumValueA
AllocateAndInitializeSid
GetLengthSid
InitializeAcl
AddAccessAllowedAce
InitializeSecurityDescriptor
RegSetKeySecurity
FreeSid
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegCreateKeyExA
RegOpenKeyA
RegQueryValueExA
SetEntriesInAclA
GetNamedSecurityInfoA
BuildExplicitAccessWithNameA
SetNamedSecurityInfoA
RegCreateKeyA
RegSetValueExA
OpenSCManagerA
OpenServiceA
QueryServiceStatus
ControlService
DeleteService
CloseServiceHandle
RegQueryValueA
RegCloseKey
LsaOpenPolicy
LsaRetrievePrivateData
LsaClose
LookupAccountNameA
IsValidSid
msvcrt
_errno
strtok
strncat
_beginthreadex
calloc
??1type_info@@UAE@XZ
_exit
_XcptFilter
exit
_acmdln
__getmainargs
atoi
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_controlfp
__dllonexit
_onexit
_strnicmp
??2@YAPAXI@Z
strncmp
rename
strrchr
_except_handler3
free
malloc
strchr
strstr
_ftol
ceil
_initterm
_CxxThrowException
??3@YAXPAX@Z
__CxxFrameHandler
memmove
_strupr
shlwapi
SHDeleteKeyA
msvcp60
?_Xran@std@@YAXXZ
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
msvfw32
ICSendMessage
ICSeqCompressFrameEnd
Sections
.data Size: 168KB - Virtual size: 170KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ