Behavioral task
behavioral1
Sample
d6c462ef47597e61a6ab876fe3c41ef60c50ea7bc6ce0caf8bb4824048da7a38.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
d6c462ef47597e61a6ab876fe3c41ef60c50ea7bc6ce0caf8bb4824048da7a38.exe
Resource
win10v2004-20220812-en
General
-
Target
d6c462ef47597e61a6ab876fe3c41ef60c50ea7bc6ce0caf8bb4824048da7a38
-
Size
204KB
-
MD5
326583a4cc10366f95483d0402033128
-
SHA1
2a432045373dda25d88c8a789019289268da71d1
-
SHA256
d6c462ef47597e61a6ab876fe3c41ef60c50ea7bc6ce0caf8bb4824048da7a38
-
SHA512
ea133c9fc000d3af1efd98eb8d7e364d40f91ac0f5a2ff11974c862b81929fa8877173dce279076d4ca3969b71a0de68cef38606a2c347fe7b85364054817298
-
SSDEEP
3072:YZiHYaR958cezUMybZmsLC03xw+N028IuUG6lh+VAwdofEtLYwSL7/a:YwHYaR95PYLm8v0B1OJIuUGfduGYva
Malware Config
Signatures
Files
-
d6c462ef47597e61a6ab876fe3c41ef60c50ea7bc6ce0caf8bb4824048da7a38.exe windows x86
2a970e808d4db33b04a60a6da411cfaf
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
RaiseException
InterlockedExchange
CreateEventA
GetModuleHandleA
GetLocalTime
lstrcatA
MoveFileA
Sleep
CreateProcessA
SetFilePointer
ReadFile
GetLastError
RemoveDirectoryA
LocalAlloc
LocalFree
GetDriveTypeA
GetProcAddress
CreateDirectoryA
GetVersionExA
lstrcmpA
WideCharToMultiByte
MultiByteToWideChar
FreeLibrary
GetPrivateProfileSectionNamesA
SetErrorMode
ReleaseMutex
OutputDebugStringA
GlobalUnlock
GlobalFree
WriteFile
GetProcessHeap
SetEvent
lstrcpyA
VirtualAlloc
VirtualFree
CloseHandle
LoadLibraryA
GetStartupInfoA
user32
GetSystemMetrics
LoadCursorA
ReleaseDC
SetRect
OpenClipboard
GetWindowThreadProcessId
IsWindowVisible
GetThreadDesktop
PostMessageA
CreateWindowExA
CloseWindow
SendMessageA
SetClipboardData
CloseClipboard
SetCursorPos
WindowFromPoint
SetCapture
GetCursorPos
GetKeyState
GetAsyncKeyState
GetForegroundWindow
GetWindowTextA
CharNextA
IsWindow
gdi32
CreateDIBSection
SelectObject
BitBlt
CreateCompatibleBitmap
GetDIBits
DeleteObject
DeleteDC
advapi32
InitializeAcl
RegCloseKey
LsaOpenPolicy
LsaRetrievePrivateData
LsaClose
LookupAccountNameA
IsValidSid
RegSetValueExA
RegCreateKeyExA
FreeSid
RegSetKeySecurity
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
AddAccessAllowedAce
GetLengthSid
AllocateAndInitializeSid
RegEnumKeyExA
RegQueryValueExA
RegOpenKeyA
RegOpenKeyExA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
LookupAccountSidA
GetTokenInformation
RegQueryValueA
shell32
SHGetSpecialFolderPathA
SHGetFileInfoA
msvcrt
_strnicmp
atoi
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
??1type_info@@UAE@XZ
memset
??2@YAPAXI@Z
??3@YAXPAX@Z
memcpy
__CxxFrameHandler
_CxxThrowException
memmove
ceil
_ftol
strlen
strstr
memcmp
strcpy
strchr
malloc
strcmp
free
_except_handler3
strrchr
rename
strcat
_strupr
strncmp
strncpy
_errno
wcscpy
strtok
strncat
rand
_beginthreadex
calloc
msvcp60
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBDABV?$allocator@D@1@@Z
?c_str@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEPBDXZ
netapi32
NetUserAdd
NetLocalGroupAddMembers
msvfw32
ICSendMessage
ICSeqCompressFrameEnd
Sections
.text Size: 132KB - Virtual size: 128KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 40KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ