Static task
static1
Behavioral task
behavioral1
Sample
61acde4f7a1d1d21e1e10fb80c323a8a76edfb1b16ecd54561fced8b3056df26.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
61acde4f7a1d1d21e1e10fb80c323a8a76edfb1b16ecd54561fced8b3056df26.exe
Resource
win10v2004-20220812-en
General
-
Target
61acde4f7a1d1d21e1e10fb80c323a8a76edfb1b16ecd54561fced8b3056df26
-
Size
669KB
-
MD5
12556f5337972489518d520fc01d62c0
-
SHA1
103aeb2de88ca42ac4987ff0b42a8910d173bf1a
-
SHA256
61acde4f7a1d1d21e1e10fb80c323a8a76edfb1b16ecd54561fced8b3056df26
-
SHA512
8941352f8109aa67ffc258788772c5183cf4392f677938b0091c6c952f578e5d76f66a2561e54617ec968c580f56621cc26aa4860d1479341f5533251faf71a2
-
SSDEEP
12288:axuj/5kQANn9MUHPVLoNjY+6z0AB0BZqBuA903FL+e66Q2qT:ao75kQArMyPVLAQPWO8bFKI
Malware Config
Signatures
Files
-
61acde4f7a1d1d21e1e10fb80c323a8a76edfb1b16ecd54561fced8b3056df26.exe windows x86
ccea3d96ef90697aefbd6d2712e875b9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
VirtualAlloc
GetCommandLineW
SetFileAttributesW
GetProfileSectionW
GetCurrentProcessId
AreFileApisANSI
SwitchToFiber
PeekConsoleInputA
ChangeTimerQueueTimer
RemoveDirectoryA
GetTimeFormatW
FindResourceW
GetCurrentThreadId
CreateFileMappingA
LocalUnlock
EnumCalendarInfoW
IsDebuggerPresent
GetOEMCP
ReadFileEx
ReplaceFileA
GlobalMemoryStatusEx
WriteTapemark
VirtualQueryEx
LocalSize
BindIoCompletionCallback
SetDefaultCommConfigW
winspool.drv
ClosePrinter
GetFormW
EndPagePrinter
EnumFormsA
GetPrinterW
GetPrinterDriverDirectoryW
DeletePrinterDataW
GetPrintProcessorDirectoryA
GetPrinterDataW
EnumMonitorsW
GetPrinterDataExW
WritePrinter
OpenPrinterW
DocumentPropertiesW
advapi32
OpenTraceW
GetTraceEnableLevel
RegEnumKeyW
AddAccessAllowedAce
ControlTraceW
BuildSecurityDescriptorW
CryptHashData
GetSidIdentifierAuthority
InitializeSecurityDescriptor
RegisterServiceCtrlHandlerW
EnumDependentServicesW
AllocateLocallyUniqueId
AreAllAccessesGranted
RegEnumKeyExW
SetEntriesInAclA
ConvertStringSecurityDescriptorToSecurityDescriptorW
LsaICLookupNames
comctl32
_TrackMouseEvent
ImageList_Add
ImageList_ReplaceIcon
InitCommonControls
InitCommonControlsEx
ImageList_GetImageCount
ImageList_GetBkColor
CreateStatusWindowW
ImageList_Read
ImageList_SetDragCursorImage
ImageList_SetBkColor
ImageList_SetIconSize
ImageList_DragLeave
msvcrt
?set_terminate@@YAP6AXXZP6AXXZ@Z
exit
_mbsupr
abort
isupper
_setmode
_strdate
_ismbblead
_stat
frexp
ungetwc
_localtime64
_cabs
fclose
_lseek
_strdup
atoi
wcstoul
_snprintf
strcspn
_close
wprintf
??1bad_cast@@UAE@XZ
_isctype
_ultow
_mktemp
_mbsdec
??8type_info@@QBEHABV0@@Z
fflush
_memicmp
_open
memcpy
_winmajor
__lconv_init
_strcmpi
fseek
strcat
feof
crypt32
CryptUninstallDefaultContext
mscms
InternalGetPS2ColorRenderingDictionary
DeleteColorTransform
InternalGetPS2CSAFromLCS
InternalGetPS2ColorSpaceArray
OpenColorProfileA
TranslateBitmapBits
IsColorProfileValid
InstallColorProfileW
GetColorDirectoryA
GetColorProfileHeader
EnumColorProfilesA
OpenColorProfileW
CreateColorTransformW
InternalGetPS2PreviewCRD
Sections
BSS Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
BSS Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
TEXT Size: 11KB - Virtual size: 348KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.idata Size: 593KB - Virtual size: 930KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 40KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 258B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ