Static task
static1
Behavioral task
behavioral1
Sample
557882f400e69f505471263300390961df62255dc1ada499fa3be5b5192f22f3.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
557882f400e69f505471263300390961df62255dc1ada499fa3be5b5192f22f3.exe
Resource
win10v2004-20220812-en
General
-
Target
557882f400e69f505471263300390961df62255dc1ada499fa3be5b5192f22f3
-
Size
254KB
-
MD5
0a4d00d6b3f4e24db0e02b71f654ca44
-
SHA1
173d7f4f10b334aaf573588f2e676d2de3cbf5e7
-
SHA256
557882f400e69f505471263300390961df62255dc1ada499fa3be5b5192f22f3
-
SHA512
80563fa8e4178df79060110473eba222d6c3ccf0d06bbb1ae9cf04fa5c53b833b2f073224c845931ab93d64d79b48ffdef2026b79fc196e3eca1046bb9d39d19
-
SSDEEP
6144:IlHRK6RZ/LuFzEDTMZZfIZXNjNsRJNaNWx0IKaZhWZKln10j:IlHg63/LuAMQjsNaIxNTZhCA10j
Malware Config
Signatures
Files
-
557882f400e69f505471263300390961df62255dc1ada499fa3be5b5192f22f3.exe windows x86
50f763d828d1e1a7b372651b0f5de0b9
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
netapi32
NetApiBufferFree
NetUserEnum
kernel32
lstrcmpW
CompareFileTime
lstrlenA
lstrlenW
lstrcpynW
FreeLibrary
CreateDirectoryW
LocalAlloc
RemoveDirectoryW
GetWindowsDirectoryW
LocalFree
IsDebuggerPresent
GetCurrentThreadId
WaitForSingleObject
CreateEventW
ExpandEnvironmentStringsA
OpenEventW
GetModuleHandleW
GetTempPathW
SetUnhandledExceptionFilter
GetVersion
GetProcAddress
user32
GetForegroundWindow
GetSystemMetrics
CopyRect
RegisterWindowMessageW
GetCursorPos
InvalidateRect
GetFocus
LoadCursorW
DestroyIcon
GetSysColor
MoveWindow
IsWindow
GetTopWindow
SetTimer
OffsetRect
PostMessageW
SetWindowPos
SendMessageW
EnableWindow
gdi32
CreateFontIndirectW
CreateRectRgn
CreateCompatibleDC
DeleteObject
CreatePatternBrush
CreateSolidBrush
advapi32
IsValidSecurityDescriptor
FreeSid
RegOpenKeyExA
RegQueryValueExA
OpenServiceW
StartServiceW
QueryServiceStatus
OpenSCManagerW
CloseServiceHandle
RegCreateKeyExW
RegDeleteValueW
RegSetValueExW
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
RevertToSelf
AddAccessAllowedAce
SetSecurityDescriptorOwner
AllocateAndInitializeSid
InitializeAcl
ImpersonateSelf
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
AccessCheck
SetSecurityDescriptorGroup
OpenThreadToken
OpenProcessToken
GetLengthSid
shell32
ShellExecuteW
usp10
UspFreeMem
ScriptApplyDigitSubstitution
ScriptCPtoX
ScriptJustify
icmp
IcmpCloseHandle
IcmpParseReplies
Sections
.text Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.IjU Size: 2KB - Virtual size: 207KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.kXA Size: 2KB - Virtual size: 395KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ze Size: 2KB - Virtual size: 543KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 2KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.UsAk Size: 2KB - Virtual size: 310KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.CW Size: 93KB - Virtual size: 138KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.XLbC Size: 2KB - Virtual size: 74KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 7KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.w Size: 122KB - Virtual size: 156KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ