Static task
static1
Behavioral task
behavioral1
Sample
96ab9d9a17c6edae198fc4351fd07e42b0e59454fcbcc0eb2b9558908daf6461.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
96ab9d9a17c6edae198fc4351fd07e42b0e59454fcbcc0eb2b9558908daf6461.exe
Resource
win10v2004-20221111-en
General
-
Target
96ab9d9a17c6edae198fc4351fd07e42b0e59454fcbcc0eb2b9558908daf6461
-
Size
1.7MB
-
MD5
f5958f170c9c1d0cf57f3651011c0406
-
SHA1
4f7845e7f4708bb561102b98ceb6e84eb341d0bf
-
SHA256
96ab9d9a17c6edae198fc4351fd07e42b0e59454fcbcc0eb2b9558908daf6461
-
SHA512
0a48f7865b2e9a11bf375ed7b3c00e83eddce73ed4c799656468b9dffca39992c4496e67146ea7987768e9a3e92f269c865a7d6f8d934696055f975765949b05
-
SSDEEP
49152:QocXvlZP1Ve3CohDOeGsinJk42yeQ+msWsk:yZdVe3phDOrn6W
Malware Config
Signatures
Files
-
96ab9d9a17c6edae198fc4351fd07e42b0e59454fcbcc0eb2b9558908daf6461.exe windows x86
de6ea75dd304419478864b3fe8beb907
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ExpandEnvironmentStringsW
CreateProcessW
VirtualAllocEx
WriteProcessMemory
GetModuleHandleW
QueueUserAPC
ResumeThread
TerminateProcess
OpenProcess
WaitForSingleObject
GetModuleFileNameW
GetCurrentProcess
CloseHandle
LoadLibraryW
GetProcAddress
FreeLibrary
GetLastError
lstrcmpiW
SetEnvironmentVariableA
CompareStringW
IsValidLocale
LocalAlloc
LocalFree
InterlockedExchange
LoadLibraryA
RaiseException
GetExitCodeProcess
CreateFileW
DuplicateHandle
GetFileInformationByHandle
GetDateFormatW
InterlockedCompareExchange
VerifyVersionInfoW
VerSetConditionMask
MoveFileExW
GetFileAttributesExW
GetFileAttributesW
GetShortPathNameW
SizeofResource
LockResource
LoadResource
FindResourceW
GetCurrentThreadId
ReadFile
SetFilePointer
SetFileTime
WriteFile
RemoveDirectoryW
LoadLibraryExW
GetFileTime
GetSystemTimeAsFileTime
WTSGetActiveConsoleSessionId
CreateMutexW
GetTickCount
FormatMessageA
SetLastError
GetModuleHandleA
OutputDebugStringA
ReleaseMutex
DeleteFileW
GetCurrentProcessId
GetCommandLineW
GetTempFileNameW
GetFileSize
FindFirstFileW
MapViewOfFile
UnmapViewOfFile
CreateDirectoryW
CopyFileW
FileTimeToSystemTime
GetTempPathW
GetCurrentDirectoryW
GetLongPathNameW
FindClose
CreateFileMappingW
FindNextFileW
FileTimeToLocalFileTime
GetNativeSystemInfo
GetVersionExW
InterlockedExchangeAdd
IsDebuggerPresent
SetUnhandledExceptionFilter
AssignProcessToJobObject
GetStdHandle
Process32FirstW
Process32NextW
HeapSetInformation
CreateToolhelp32Snapshot
GetUserDefaultLangID
QueryPerformanceCounter
SetEndOfFile
SetFilePointerEx
FlushFileBuffers
GetEnvironmentVariableW
SetEnvironmentVariableW
RtlCaptureStackBackTrace
GetLocaleInfoW
GetUserDefaultUILanguage
Sleep
CreateThread
InitializeCriticalSectionAndSpinCount
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
GetSystemDirectoryW
GetWindowsDirectoryW
TlsGetValue
TlsSetValue
TlsAlloc
TlsFree
InterlockedIncrement
SetEvent
ResetEvent
WaitForMultipleObjects
ReleaseSemaphore
VirtualQuery
RtlCaptureContext
InterlockedDecrement
CreateSemaphoreW
InitializeCriticalSection
WaitNamedPipeW
TransactNamedPipe
SetNamedPipeHandleState
GetThreadLocale
GetACP
CreateFileA
GetTimeZoneInformation
WideCharToMultiByte
MultiByteToWideChar
EncodePointer
DecodePointer
UnhandledExceptionFilter
HeapFree
GetStartupInfoW
GetConsoleCP
GetConsoleMode
ExitProcess
SetStdHandle
GetFileType
HeapReAlloc
HeapAlloc
GetProcessHeap
PeekNamedPipe
LCMapStringW
GetCPInfo
RtlUnwind
IsProcessorFeaturePresent
HeapCreate
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetOEMCP
IsValidCodePage
HeapSize
WriteConsoleW
GetStringTypeW
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
user32
CharUpperW
SetWindowsHookExW
SetWindowLongW
LoadIconW
SendMessageW
GetWindowLongW
SetForegroundWindow
MoveWindow
GetMonitorInfoW
MonitorFromWindow
CreateWindowExW
DestroyWindow
UnhookWindowsHookEx
CallNextHookEx
GetUserObjectInformationW
GetProcessWindowStation
MessageBoxW
SendMessageTimeoutW
FindWindowExW
GetWindowThreadProcessId
IsWindow
FindWindowW
advapi32
GetUserNameW
RegQueryValueExW
SetFileSecurityW
ConvertStringSecurityDescriptorToSecurityDescriptorW
ConvertSecurityDescriptorToStringSecurityDescriptorW
GetFileSecurityW
RegEnumKeyExW
RegEnumValueW
RegQueryInfoKeyW
RegOpenKeyExW
RegCloseKey
GetSidSubAuthority
GetSidSubAuthorityCount
GetTokenInformation
CreateProcessAsUserW
ConvertSidToStringSidW
RegCreateKeyExW
RegDeleteValueW
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
LookupAccountSidW
GetSecurityDescriptorSacl
AdjustTokenPrivileges
LookupPrivilegeValueW
OpenProcessToken
RegSetValueExW
SetSecurityInfo
RegEnumValueA
RegisterTraceGuidsW
GetTraceEnableLevel
UnregisterTraceGuids
TraceEvent
GetTraceLoggerHandle
GetTraceEnableFlags
ole32
CoTaskMemFree
CoUninitialize
StringFromGUID2
PropVariantClear
CoInitializeEx
CoCreateInstance
CoSetProxyBlanket
CLSIDFromString
urlmon
CreateURLMonikerEx
wtsapi32
WTSQueryUserToken
userenv
DestroyEnvironmentBlock
CreateEnvironmentBlock
version
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
ws2_32
ntohl
winmm
timeGetTime
shlwapi
SHCopyKeyW
SHDeleteEmptyKeyW
SHStrDupW
SHDeleteKeyW
UrlCanonicalizeW
oleaut32
SysFreeString
SysAllocString
VariantInit
VariantClear
Sections
.text Size: 750KB - Virtual size: 749KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 307KB - Virtual size: 307KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 2B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 425KB - Virtual size: 424KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 42KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.vmp0 Size: 164KB - Virtual size: 428KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE