Static task
static1
Behavioral task
behavioral1
Sample
d2c533551461df24821357b342191079b523ba6454980426b1a626fd84111c5b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d2c533551461df24821357b342191079b523ba6454980426b1a626fd84111c5b.exe
Resource
win10v2004-20220812-en
General
-
Target
d2c533551461df24821357b342191079b523ba6454980426b1a626fd84111c5b
-
Size
205KB
-
MD5
0b048651df059bcdc79213b3813fae50
-
SHA1
08c5e1a80d7a1cafa628706de707a4c9a7187cbb
-
SHA256
d2c533551461df24821357b342191079b523ba6454980426b1a626fd84111c5b
-
SHA512
207abf739290de89f384e7a4059d6b6781d966b6a461ee9678ce0be4e3d4c473bf4f093e01106e72b2ffc5055572f830c3aa388b58200379dc62b04e5f2d6f31
-
SSDEEP
3072:ELc2z97xvh70rslY+LyMetAt6lqr5eSWAXljPK1f3nZjjhB4:ELc2BNvhWMqtA465NP9PK1/ZjjH4
Malware Config
Signatures
Files
-
d2c533551461df24821357b342191079b523ba6454980426b1a626fd84111c5b.exe windows x86
f753b0d158352976c93abaf7423fe93d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WaitForSingleObject
ReleaseMutex
GetModuleFileNameA
DefineDosDeviceA
MoveFileExA
SetFileAttributesA
GlobalMemoryStatusEx
GetDiskFreeSpaceExA
GlobalFree
GetProcessHeap
HeapAlloc
GetLocalTime
MoveFileA
OpenProcess
GetModuleHandleA
WriteProcessMemory
CreateRemoteThread
GetCurrentProcess
CreateProcessA
SetLastError
GetProcAddress
GetLastError
ReadFile
WriteFile
RemoveDirectoryA
GetDriveTypeA
CreateDirectoryA
GetVersionExA
lstrcmpA
WideCharToMultiByte
GetStartupInfoA
CreateMutexA
ExitProcess
SetErrorMode
OpenEventA
CloseHandle
VirtualAllocEx
MultiByteToWideChar
lstrcatA
GetPrivateProfileSectionNamesA
lstrlenA
InterlockedExchange
SetEvent
lstrcpyA
ResetEvent
Sleep
CreateEventA
VirtualAlloc
LoadLibraryA
GetTickCount
user32
GetKeyState
SetCapture
WindowFromPoint
SetCursorPos
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
GetSystemMetrics
GetAsyncKeyState
ReleaseDC
SetRect
GetCursorPos
wsprintfA
SetProcessWindowStation
OpenWindowStationA
GetProcessWindowStation
GetWindowThreadProcessId
IsWindowVisible
CloseDesktop
GetThreadDesktop
IsWindow
CharNextA
GetWindowTextA
GetForegroundWindow
LoadCursorA
SendMessageA
CloseWindow
CreateWindowExA
PostMessageA
OpenDesktopA
gdi32
DeleteDC
CreateDIBSection
SelectObject
BitBlt
CreateCompatibleBitmap
GetDIBits
DeleteObject
advapi32
AdjustTokenPrivileges
OpenServiceA
QueryServiceStatus
ControlService
DeleteService
CloseServiceHandle
RegQueryValueA
RegCloseKey
LsaOpenPolicy
LsaRetrievePrivateData
LsaClose
LookupAccountNameA
IsValidSid
RegSetValueExA
RegCreateKeyA
SetNamedSecurityInfoA
BuildExplicitAccessWithNameA
GetNamedSecurityInfoA
SetEntriesInAclA
RegQueryValueExA
RegOpenKeyA
RegCreateKeyExA
LookupPrivilegeValueA
OpenProcessToken
FreeSid
RegSetKeySecurity
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
AddAccessAllowedAce
InitializeAcl
GetLengthSid
AllocateAndInitializeSid
RegEnumValueA
RegEnumKeyExA
RegDeleteValueA
RegDeleteKeyA
CreateProcessAsUserA
SetTokenInformation
DuplicateTokenEx
LookupAccountSidA
GetTokenInformation
OpenSCManagerA
shell32
SHGetFileInfoA
SHGetSpecialFolderPathA
shlwapi
SHDeleteKeyA
msvcrt
_strnicmp
_beginthreadex
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
??1type_info@@UAE@XZ
calloc
_strupr
strncat
strtok
_errno
atoi
strncmp
strcat
rename
strrchr
_except_handler3
free
??3@YAXPAX@Z
__CxxFrameHandler
_CxxThrowException
memcpy
memmove
ceil
_ftol
strlen
strstr
memset
??2@YAPAXI@Z
strcpy
strchr
malloc
strcmp
ws2_32
inet_ntoa
inet_addr
getsockname
bind
getpeername
accept
listen
sendto
recvfrom
__WSAFDIsSet
send
closesocket
recv
ntohs
gethostbyname
htons
WSAStartup
WSACleanup
WSAIoctl
setsockopt
gethostname
select
connect
socket
msvcp60
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBDABV?$allocator@D@1@@Z
?c_str@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEPBDXZ
wtsapi32
WTSFreeMemory
WTSQueryUserToken
WTSQuerySessionInformationA
userenv
CreateEnvironmentBlock
psapi
EnumProcessModules
Sections
.text Size: 118KB - Virtual size: 117KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 14KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.huage Size: 512B - Virtual size: 512B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.caca Size: 512B - Virtual size: 256B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 52KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ