Static task
static1
Behavioral task
behavioral1
Sample
88d06dbe5ea793946e1bb7b74156bd86d03ad7078821d33a2397bc59761b9616.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
88d06dbe5ea793946e1bb7b74156bd86d03ad7078821d33a2397bc59761b9616.exe
Resource
win10v2004-20221111-en
General
-
Target
88d06dbe5ea793946e1bb7b74156bd86d03ad7078821d33a2397bc59761b9616
-
Size
164KB
-
MD5
bcae93660a11807dc2db48bb03083f23
-
SHA1
9136bb5838b0d1066a2599722b76b69c29ea7946
-
SHA256
88d06dbe5ea793946e1bb7b74156bd86d03ad7078821d33a2397bc59761b9616
-
SHA512
2bfc9000eecdc7ab9bedf3e1c0dedc993cb1c26f8c4a9963995d9a5f6398874c3c01d95cb648380f567e3da8053dcb9bf76ec1d1ab99920cab706ec44df380f7
-
SSDEEP
3072:5LC9K0IUFki/Gz4bJOllJfmznjlsY04xnQWxH:5LC9K0zP/Gz8JiIxYW
Malware Config
Signatures
Files
-
88d06dbe5ea793946e1bb7b74156bd86d03ad7078821d33a2397bc59761b9616.exe windows x86
515ee79062dd7d1f047f97a5ff4c6141
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
setupapi
SetupDiGetClassDevsA
SetupDiEnumDeviceInterfaces
SetupDiGetDeviceInterfaceDetailA
SetupDiDestroyDeviceInfoList
powrprof
DeletePwrScheme
WritePwrScheme
WriteProcessorPwrScheme
EnumPwrSchemes
GetActivePwrScheme
SetActivePwrScheme
wtsapi32
WTSRegisterSessionNotification
WTSUnRegisterSessionNotification
kernel32
WaitForSingleObject
CloseHandle
SetEvent
GetLastError
CreateMutexA
SetThreadPriority
SetPriorityClass
GetCurrentProcess
CreateThread
CreateEventA
DeviceIoControl
SetProcessAffinityMask
GetProcessAffinityMask
LocalFree
CreateFileA
LocalAlloc
CreateProcessA
GetVersionExA
GetSystemInfo
FreeLibrary
GetProcAddress
LoadLibraryA
lstrcpynA
GetStdHandle
AllocConsole
DisconnectNamedPipe
FlushFileBuffers
WriteFile
ReadFile
ConnectNamedPipe
ResetEvent
CreateNamedPipeA
ReleaseMutex
IsBadCodePtr
SetUnhandledExceptionFilter
GetLocaleInfoA
SetEnvironmentVariableA
CompareStringW
CompareStringA
HeapSize
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
SetFilePointer
VirtualProtect
MultiByteToWideChar
VirtualAlloc
VirtualQuery
InterlockedExchange
RtlUnwind
VirtualFree
HeapCreate
HeapDestroy
GetEnvironmentStringsW
WideCharToMultiByte
HeapAlloc
WaitForMultipleObjects
HeapReAlloc
HeapFree
GetFileAttributesA
TerminateProcess
SetHandleCount
CreatePipe
GetACP
GetOEMCP
GetCPInfo
UnhandledExceptionFilter
GetCurrentThreadId
FreeEnvironmentStringsW
GetEnvironmentStrings
ExitProcess
DuplicateHandle
SetStdHandle
GetFileType
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetModuleFileNameA
FreeEnvironmentStringsA
user32
GetProcessWindowStation
GetThreadDesktop
SetUserObjectSecurity
EndDialog
DialogBoxParamA
DestroyWindow
DefWindowProcA
BeginPaint
EndPaint
PostQuitMessage
GetCursorPos
CreatePopupMenu
InsertMenuA
SetForegroundWindow
TrackPopupMenu
DestroyMenu
CreateWindowExA
GetSystemMetrics
LoadImageA
DestroyIcon
ShowWindow
LoadIconA
LoadCursorA
RegisterClassExA
SendMessageA
LoadStringA
LoadAcceleratorsA
GetMessageA
TranslateAcceleratorA
TranslateMessage
DispatchMessageA
advapi32
InitializeSid
GetSidSubAuthority
InitializeAcl
AddAccessAllowedAce
ReportEventA
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
DeregisterEventSource
RegDeleteKeyA
RegCreateKeyExA
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
RegNotifyChangeKeyValue
RegCloseKey
GetSidLengthRequired
shell32
Shell_NotifyIconA
Sections
.text Size: 44KB - Virtual size: 41KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
vcvlrik Size: 8KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 80KB - Virtual size: 77KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE