Static task
static1
Behavioral task
behavioral1
Sample
86bc60911cabf851d32f555a3043b21645b9d338d01ffc21d24b049e58b33576.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
86bc60911cabf851d32f555a3043b21645b9d338d01ffc21d24b049e58b33576.exe
Resource
win10v2004-20220812-en
General
-
Target
86bc60911cabf851d32f555a3043b21645b9d338d01ffc21d24b049e58b33576
-
Size
156KB
-
MD5
d101fc23842be6368456ad3bf8af3738
-
SHA1
8a38feea3d92f6968e567c530a5c2c0f647ead8d
-
SHA256
86bc60911cabf851d32f555a3043b21645b9d338d01ffc21d24b049e58b33576
-
SHA512
cd805247f2e414380207b61ab16b9c2c6343b6240365e8f265ac9613b5a9dc21c7c0da2ce4b8429bf07b4a624c76fa0a5f892f6470b0bf905f225b38450360d8
-
SSDEEP
3072:UmQUzGkk7kzTZ06HByxuANcqNV9Q0LXbITtLVW0tzBPpO9yfYVzq+Jma4:UmQUPkyTDUNXQQXStLVjBP2RVs
Malware Config
Signatures
Files
-
86bc60911cabf851d32f555a3043b21645b9d338d01ffc21d24b049e58b33576.exe windows x86
5bf36ba7e343040b3c358829ea5eca11
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WideCharToMultiByte
HeapAlloc
GetStringTypeA
VirtualAlloc
HeapReAlloc
IsBadWritePtr
SetStdHandle
FlushFileBuffers
CreateFileA
LoadLibraryA
SetEndOfFile
GetModuleFileNameA
RtlUnwind
VirtualFree
HeapCreate
HeapDestroy
GetStringTypeW
CompareStringA
CompareStringW
GetACP
GetOEMCP
SetEnvironmentVariableA
LCMapStringA
lstrcmpW
WriteConsoleW
GetProcAddress
LoadLibraryW
GetCurrentThreadId
Sleep
EnterCriticalSection
InitializeCriticalSection
GetCurrentProcess
DeviceIoControl
GetSystemTimeAsFileTime
GetCPInfo
SetSystemPowerState
ReadFile
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
GetCommandLineA
GetCommandLineW
GetEnvironmentStrings
GetEnvironmentStringsW
FreeEnvironmentStringsW
MultiByteToWideChar
FreeEnvironmentStringsA
GetModuleFileNameW
UnhandledExceptionFilter
GetTimeZoneInformation
GetSystemTime
GetLocalTime
GetModuleHandleA
GetStartupInfoW
GetVersion
ExitProcess
HeapFree
GetLastError
CloseHandle
WriteFile
TerminateProcess
SetFilePointer
LCMapStringW
user32
AppendMenuW
GetFocus
GetCursorPos
GetMessageW
CallWindowProcW
GetClassInfoExW
GetWindowTextLengthW
GetKeyNameTextW
RegisterClassExW
SetFocus
FindWindowW
GetWindowTextW
ShowWindow
EnumChildWindows
GetAsyncKeyState
GetDC
GetMessagePos
UpdateWindow
GetClassNameW
gdi32
CreateFontIndirectW
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
ScaleWindowExtEx
Rectangle
RestoreDC
SaveDC
ExtTextOutW
StartDocW
EndPage
winspool.drv
DocumentPropertiesW
OpenPrinterW
ClosePrinter
advapi32
RegQueryValueExW
RegCloseKey
RegOpenKeyExW
AllocateAndInitializeSid
FreeSid
OpenProcessToken
StartServiceCtrlDispatcherW
InitializeSecurityDescriptor
RegEnumKeyW
RegSetValueExW
RegisterServiceCtrlHandlerW
SetEntriesInAclW
SetSecurityDescriptorDacl
SetServiceStatus
AdjustTokenPrivileges
CloseServiceHandle
ControlService
CreateServiceW
DeleteService
GetTokenInformation
LookupPrivilegeValueW
ole32
CoUninitialize
CoCreateInstance
CoTaskMemFree
CoTaskMemAlloc
CoInitialize
ws2_32
accept
bind
closesocket
connect
socket
gethostbyaddr
Sections
.text Size: 40KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 48KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 60KB - Virtual size: 466KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ