Static task
static1
Behavioral task
behavioral1
Sample
67f1854a661f9183467f8e131a81f1e8850e76c959a9f9e82f88cb46b30d022b.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
67f1854a661f9183467f8e131a81f1e8850e76c959a9f9e82f88cb46b30d022b.exe
Resource
win10v2004-20220812-en
General
-
Target
67f1854a661f9183467f8e131a81f1e8850e76c959a9f9e82f88cb46b30d022b
-
Size
223KB
-
MD5
6ab3914d914497e501f9b580b9b4651a
-
SHA1
493ed47755c527251860925e3077e207d6e1d775
-
SHA256
67f1854a661f9183467f8e131a81f1e8850e76c959a9f9e82f88cb46b30d022b
-
SHA512
523922cbf7ecb5a7af55bc5d2eb7617af3299f70c7e31d0d692e68ad6f86900177cf7e2e32e1b2564f63b2d0b06bffe8913bcbd20fd2f93dc5e48e25b79e2b5f
-
SSDEEP
6144:qw8bgKZh/N1tJsGXfVjPF5bbu/3zbp4CnvCF6NA:qw80KZh/N1tJVpzbu/3zHvG6C
Malware Config
Signatures
Files
-
67f1854a661f9183467f8e131a81f1e8850e76c959a9f9e82f88cb46b30d022b.exe windows x86
0d458aacb602cf874f804b3959e44b2e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
ord17
kernel32
GetFileAttributesA
GetFileAttributesW
SetFileAttributesA
SetFileAttributesW
GetFullPathNameA
DeleteFileA
DeleteFileW
CreateDirectoryA
CreateDirectoryW
FindClose
FindNextFileA
FindFirstFileA
FindNextFileW
FindFirstFileW
GetTickCount
WideCharToMultiByte
MultiByteToWideChar
GetVersionExA
GlobalAlloc
lstrlenA
GetModuleFileNameA
FindResourceA
GetModuleHandleA
HeapAlloc
GetProcessHeap
HeapFree
HeapReAlloc
CompareStringA
ExitProcess
GetLocaleInfoA
GetNumberFormatA
WriteFile
GetProcAddress
DosDateTimeToFileTime
GetDateFormatA
GetTimeFormatA
FileTimeToSystemTime
FileTimeToLocalFileTime
ExpandEnvironmentStringsA
WaitForSingleObject
SetCurrentDirectoryA
Sleep
GetTempPathA
MoveFileExA
GetModuleFileNameW
SetEnvironmentVariableA
GetCommandLineA
LocalFileTimeToFileTime
SystemTimeToFileTime
GetSystemTime
IsDBCSLeadByte
GetCPInfo
FreeLibrary
LoadLibraryA
GetCurrentDirectoryA
SetLastError
GetLastError
CloseHandle
GetCurrentProcess
SetFileTime
MoveFileA
SetFilePointer
GetStdHandle
ReadFile
CreateFileW
CreateFileA
GetFileType
SetEndOfFile
lstrcmpiA
user32
GetSystemMetrics
GetWindowTextA
SetWindowPos
LoadStringA
CharToOemBuffA
wvsprintfA
FindWindowExA
GetClassNameA
SendMessageA
wsprintfA
SetDlgItemTextA
EndDialog
DestroyIcon
SendDlgItemMessageA
GetDlgItemTextA
DialogBoxParamA
IsWindowVisible
WaitForInputIdle
GetSysColor
PostMessageA
SetMenu
SetFocus
LoadBitmapA
LoadIconA
CharToOemA
OemToCharA
GetWindow
CharUpperA
GetWindowRect
GetParent
MapWindowPoints
CreateWindowExA
UpdateWindow
SetWindowTextA
LoadCursorA
RegisterClassExA
SetWindowLongA
GetWindowLongA
DefWindowProcA
PeekMessageA
GetMessageA
TranslateMessage
DispatchMessageA
DestroyWindow
GetClientRect
CopyRect
IsWindow
MessageBoxA
ShowWindow
GetDlgItem
OemToCharBuffA
EnableWindow
gdi32
DeleteObject
comdlg32
CommDlgExtendedError
GetSaveFileNameA
GetOpenFileNameA
advapi32
OpenProcessToken
RegOpenKeyExA
RegQueryValueExA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
SetFileSecurityW
AdjustTokenPrivileges
LookupPrivilegeValueA
SetFileSecurityA
shell32
SHBrowseForFolderA
SHGetMalloc
SHGetSpecialFolderLocation
SHGetFileInfoA
SHFileOperationA
ShellExecuteExA
SHChangeNotify
SHGetPathFromIDListA
ole32
CLSIDFromString
OleUninitialize
CreateStreamOnHGlobal
OleInitialize
CoCreateInstance
Sections
.text Size: 65KB - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ