Static task
static1
Behavioral task
behavioral1
Sample
98b27f79b53e4a0e1c82bf24905d659938b6f121c8abcefa26ffbecca5e6b8fe.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
98b27f79b53e4a0e1c82bf24905d659938b6f121c8abcefa26ffbecca5e6b8fe.exe
Resource
win10v2004-20221111-en
General
-
Target
98b27f79b53e4a0e1c82bf24905d659938b6f121c8abcefa26ffbecca5e6b8fe
-
Size
211KB
-
MD5
161af2b86fe3732895d7fd1e44effe60
-
SHA1
d5cdd9c7738e2f4c39e0d44998d3a8983215a9ce
-
SHA256
98b27f79b53e4a0e1c82bf24905d659938b6f121c8abcefa26ffbecca5e6b8fe
-
SHA512
f776215249b698d09d73295ce335fbca08c51c52766786918c53adcc20d194ca8a9c350a2fab0a515c386c3239f5671f6332e508319e93117d718c3be1e7dc78
-
SSDEEP
3072:jD/w4VxECEvkrxZWfyMKHkLjV6sBgvIC+SLIlg6HcYz65os/KpvaleKFA9y36TYH:4USCEvqxQyMKIjVLwI8tFgyl5FF36j
Malware Config
Signatures
Files
-
98b27f79b53e4a0e1c82bf24905d659938b6f121c8abcefa26ffbecca5e6b8fe.exe windows x86
28a00e5ce577cbbe325a21c8785ad023
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
SetWindowTextA
ShowWindow
ReleaseDC
GetDC
DispatchMessageA
TranslateMessage
IsDialogMessageA
GetMessageA
SetForegroundWindow
CreateDialogIndirectParamA
PostThreadMessageA
CharUpperA
CharNextA
EndDialog
MessageBoxA
MoveWindow
KillTimer
DestroyWindow
GetWindowTextA
SetTimer
SetWindowRgn
GetDesktopWindow
DialogBoxIndirectParamA
SetActiveWindow
MsgWaitForMultipleObjects
ScreenToClient
GetDlgItem
SendMessageA
SetDlgItemTextA
LoadIconA
GetWindowRect
SystemParametersInfoA
SetWindowPos
PeekMessageA
LoadStringA
CharLowerBuffA
ole32
CoUninitialize
CoGetInterfaceAndReleaseStream
CoInitialize
CoReleaseMarshalData
CoMarshalInterThreadInterfaceInStream
CoTaskMemAlloc
GetRunningObjectTable
StringFromGUID2
CoTaskMemFree
StringFromCLSID
CoRegisterClassObject
CoRevokeClassObject
CoCreateInstance
CoCreateGuid
advapi32
GetTokenInformation
AllocateAndInitializeSid
OpenThreadToken
EqualSid
FreeSid
RegCloseKey
RegOpenKeyExA
RegSetValueExA
OpenProcessToken
RegDeleteKeyA
RegEnumKeyExA
RegQueryValueExA
RegOpenKeyA
RegQueryValueA
RegCreateKeyExA
lz32
LZCopy
LZOpenFileA
LZClose
msvcr71
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__dllonexit
_amsg_exit
_acmdln
exit
_cexit
_ismbblead
_XcptFilter
_exit
_c_exit
_onexit
_controlfp
__getmainargs
_itoa
kernel32
ReadFile
FreeLibrary
RemoveDirectoryA
FindClose
FindNextFileA
DeleteFileA
lstrcmpA
FindFirstFileA
GetTempPathA
LeaveCriticalSection
EnterCriticalSection
CreateThread
GetWindowsDirectoryA
GetTickCount
GetFileAttributesA
GetTempFileNameA
CreateMutexA
Sleep
ReleaseMutex
InitializeCriticalSection
DeleteCriticalSection
lstrlenA
SetEvent
LockResource
SetFilePointer
GetDriveTypeA
OpenEventA
CreateProcessA
CopyFileA
GetCurrentThreadId
HeapAlloc
GetSystemInfo
HeapCreate
GetFileSize
lstrcpynA
lstrcatA
WriteFile
CloseHandle
CreateEventA
QueryPerformanceFrequency
InterlockedDecrement
InterlockedIncrement
CreateFileA
GetModuleFileNameA
CreateDirectoryA
SetErrorMode
GetModuleHandleA
FindResourceA
LoadResource
WaitForSingleObject
GetShortPathNameA
GetProcAddress
LoadLibraryA
HeapDestroy
GetSystemDefaultLangID
MoveFileA
FindResourceExA
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
SizeofResource
GetVersion
GetStartupInfoA
ExitProcess
GetCommandLineA
DebugBreak
HeapReAlloc
HeapFree
VirtualQuery
VirtualProtect
SearchPathA
ResetEvent
QueryPerformanceCounter
SystemTimeToFileTime
GetCurrentProcess
IsBadReadPtr
GetCurrentThread
MultiByteToWideChar
GetPrivateProfileStringA
GetPrivateProfileIntA
lstrcmpiA
SetLastError
GetLastError
WideCharToMultiByte
CompareStringA
GetVersionExA
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalFree
lstrcpyA
WritePrivateProfileStringA
Sections
.text Size: 175KB - Virtual size: 174KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 23KB - Virtual size: 413KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 808B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ