Static task
static1
Behavioral task
behavioral1
Sample
dc89c8170ca4d4b24920830eac9f2d59884ceb8f2edeff60e0dd131ac96105d7.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
dc89c8170ca4d4b24920830eac9f2d59884ceb8f2edeff60e0dd131ac96105d7.exe
Resource
win10v2004-20221111-en
General
-
Target
dc89c8170ca4d4b24920830eac9f2d59884ceb8f2edeff60e0dd131ac96105d7
-
Size
255KB
-
MD5
889adf14b7a57ea5c28d99bf59b11ee3
-
SHA1
6494c56608783660dd5baf3d4932284f274bd76e
-
SHA256
dc89c8170ca4d4b24920830eac9f2d59884ceb8f2edeff60e0dd131ac96105d7
-
SHA512
f097d6b5d9a5f7811c088ae5e7aa181c2fb02ea186da57d7215d9fa296236eb1c8ab7ee8858e209f124f195c61a9131958e00809a17e323456b69624b859b062
-
SSDEEP
6144:n+JhAlQFFiZ2q4TLTOZGEFTJjWdftk+R:n+JhZc2R/TcbjW7h
Malware Config
Signatures
Files
-
dc89c8170ca4d4b24920830eac9f2d59884ceb8f2edeff60e0dd131ac96105d7.exe windows x86
78469751e762dbf4d377c1be7b601842
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetLastInputInfo
SystemParametersInfoW
ntdll
NtPowerInformation
kernel32
LocalAlloc
HeapFree
LockResource
ProcessIdToSessionId
CloseHandle
lstrlenW
GetFileSize
GetSystemTimeAsFileTime
CreateFileW
FindResourceW
GetSystemPowerStatus
LocalFileTimeToFileTime
DeleteCriticalSection
LoadResource
GetProcessHeap
SystemTimeToFileTime
FindClose
ReadFile
WaitForMultipleObjects
HeapSize
GetSystemInfo
DeviceIoControl
FindFirstFileW
GetCurrentThreadId
IsDebuggerPresent
WaitForSingleObject
UnhandledExceptionFilter
RaiseException
FindNextFileW
FindResourceExW
HeapDestroy
FreeLibrary
OutputDebugStringW
EnterCriticalSection
SetUnhandledExceptionFilter
SetThreadExecutionState
LeaveCriticalSection
FileTimeToSystemTime
LocalFree
GetLocalTime
HeapReAlloc
HeapAlloc
OpenProcess
SizeofResource
LoadLibraryExW
GetStartupInfoA
VirtualAlloc
iassvcs
IASUninitialize
IASSetMaxNumberOfThreads
DllRegisterServer
IASRequestThread
psbase
SPGetSubtypeInfo
Sections
.KYJeWIE Size: 512B - Virtual size: 9KB
IMAGE_SCN_MEM_READ
.RNhFGXg Size: 1024B - Virtual size: 25KB
IMAGE_SCN_MEM_READ
.text Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.KGoSZFy Size: 1024B - Virtual size: 920B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.cATCB Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.HVPaQ Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.xcgtxCh Size: 1024B - Virtual size: 642B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ErYc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 8KB - Virtual size: 108KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ICaagqK Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata Size: 207KB - Virtual size: 206KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.SHjaf Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.CWMmo Size: 512B - Virtual size: 359B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.RblP Size: 1024B - Virtual size: 976B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE