Static task
static1
Behavioral task
behavioral1
Sample
85609705d74b06acd8871eb25cd6f4ce16129b3838416e8ad41887e8419e5601.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
85609705d74b06acd8871eb25cd6f4ce16129b3838416e8ad41887e8419e5601.exe
Resource
win10v2004-20220901-en
General
-
Target
85609705d74b06acd8871eb25cd6f4ce16129b3838416e8ad41887e8419e5601
-
Size
618KB
-
MD5
194b702a2906863eb6f46d62fe944c25
-
SHA1
ca5ced91bd74aff240119cde2c6d719575cb8053
-
SHA256
85609705d74b06acd8871eb25cd6f4ce16129b3838416e8ad41887e8419e5601
-
SHA512
d721706d656bb3e4549ce7f1c20503486af8880ebf8f7511d0321401c88f9ee279335d7575c9230fe0040584707d1768b84ba6c17cea85dc1f9e3fc6e87fb3b5
-
SSDEEP
6144:NqP7V69RcYhFXfXa38ClQCHJcG0XUm5pN0JrO246m:w7VsvXfK3hQCpcXdOJrO3r
Malware Config
Signatures
Files
-
85609705d74b06acd8871eb25cd6f4ce16129b3838416e8ad41887e8419e5601.exe windows x86
fc56112250d328c413c1705f652cb809
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ole32
CoTreatAsClass
GetRunningObjectTable
oleaut32
QueryPathOfRegTypeLi
VariantChangeType
SafeArrayRedim
SafeArrayCreate
SafeArrayGetLBound
SafeArrayUnaccessData
kernel32
GetCommConfig
VirtualUnlock
DebugBreak
DosDateTimeToFileTime
FindResourceExA
IsValidLocale
DeleteCriticalSection
SetProcessWorkingSetSize
SetProcessAffinityMask
GetCommandLineW
ExpandEnvironmentStringsW
GetDiskFreeSpaceExA
GetModuleFileNameW
SetConsoleActiveScreenBuffer
CreateFileW
SetCommMask
ReadConsoleInputW
GetProcessHeap
GetCommState
FlushFileBuffers
SetConsoleTitleA
_lread
TryEnterCriticalSection
PeekNamedPipe
GetSystemTimeAdjustment
SuspendThread
GlobalAddAtomA
GetCurrentProcessId
GetTapeParameters
GlobalFree
GetFileAttributesExA
FlushConsoleInputBuffer
LocalLock
SystemTimeToFileTime
GetSystemDirectoryW
GetDateFormatA
WriteConsoleOutputW
WritePrivateProfileStringW
GetSystemInfo
PeekConsoleInputW
CreateNamedPipeW
IsBadReadPtr
WritePrivateProfileStringA
ExitProcess
WriteConsoleOutputCharacterA
user32
GetFocus
ModifyMenuW
FillRect
CreateDialogIndirectParamW
WinHelpW
CheckDlgButton
DrawTextExW
wvsprintfA
IsClipboardFormatAvailable
MessageBoxA
DialogBoxIndirectParamA
GetSystemMenu
ValidateRgn
GetActiveWindow
DestroyMenu
ScrollWindow
SwitchDesktop
RemovePropW
ToUnicode
BeginPaint
ChangeClipboardChain
SetWindowWord
SetFocus
MenuItemFromPoint
SwitchToThisWindow
SetRectEmpty
advapi32
InitiateSystemShutdownW
OpenServiceA
GetSidSubAuthority
CryptGetUserKey
RegSaveKeyA
DuplicateTokenEx
SetThreadToken
RegEnumValueA
RegQueryValueA
RegisterEventSourceA
QueryServiceConfigA
RegQueryInfoKeyW
SetSecurityDescriptorGroup
LogonUserW
LookupAccountSidA
CloseServiceHandle
CryptGetKeyParam
SetEntriesInAclW
LogonUserA
PrivilegeCheck
InitializeSecurityDescriptor
Sections
.text Size: 311KB - Virtual size: 310KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 285KB - Virtual size: 284KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ