Static task
static1
Behavioral task
behavioral1
Sample
92f9dbba47b015d2cc6abfbce71c6261e485d80c5fec270ab8ba734620e45424.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
92f9dbba47b015d2cc6abfbce71c6261e485d80c5fec270ab8ba734620e45424.exe
Resource
win10v2004-20221111-en
General
-
Target
92f9dbba47b015d2cc6abfbce71c6261e485d80c5fec270ab8ba734620e45424
-
Size
63KB
-
MD5
75d5bde71b3571678de6d1df12b29e8a
-
SHA1
4a181a0f8353e73da623cda6299bd9f15b04863c
-
SHA256
92f9dbba47b015d2cc6abfbce71c6261e485d80c5fec270ab8ba734620e45424
-
SHA512
af12098758d350ce955fbb444a5f78ff7e68bd9c4756f951a932a904de90516e1eb48730bdcdf5e81919fa5c77a018f60899006f9f00d809ab135eea4534dea6
-
SSDEEP
1536:FhuT54bd3g7/5mH1x8yLXOBUTqmanQ3cZGaFPw:FhY54bd3gNSTCGqVQ3ctFo
Malware Config
Signatures
Files
-
92f9dbba47b015d2cc6abfbce71c6261e485d80c5fec270ab8ba734620e45424.exe windows x86
0f562c9862ad1c2693b3faae17b50a82
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
_adjust_fdiv
_initterm
_splitpath
wcsncmp
wcsncpy
_rotl
_ftol
strtoul
atoi
wcsstr
atol
memmove
wcslen
wcscmp
wcscpy
_except_handler3
_local_unwind2
malloc
free
_rotr
_strnicmp
qsort
_abnormal_termination
_purecall
kernel32
GetProcAddress
LoadLibraryA
GetUserDefaultLCID
FreeLibrary
MultiByteToWideChar
WideCharToMultiByte
GetACP
SetLastError
LCMapStringA
GetLocaleInfoA
GetStringTypeW
GetCPInfo
LCMapStringW
EnumSystemCodePagesA
EnumSystemLocalesA
GetCurrentProcessId
EnterCriticalSection
LeaveCriticalSection
SetEvent
GetLastError
InitializeCriticalSection
GetVersion
CloseHandle
WaitForSingleObjectEx
ResetEvent
VirtualFree
HeapFree
HeapDestroy
VirtualAlloc
HeapAlloc
GetSystemInfo
HeapCreate
WaitForSingleObject
DeleteCriticalSection
IsValidLocale
GetProfileIntA
GlobalMemoryStatus
lstrcmpiA
lstrcpyA
DeleteFileA
UnmapViewOfFile
SetEndOfFile
SetFilePointer
GetLogicalDrives
GetDiskFreeSpaceA
lstrlenA
ReadFileEx
WriteFileEx
ReadFile
WriteFile
MapViewOfFile
CreateFileMappingA
lstrcmpA
CreateFileA
GetFullPathNameA
CopyFileA
MoveFileA
MoveFileExA
lstrcatA
GetTempFileNameA
FindClose
FindFirstFileA
GetCurrentDirectoryA
GetDriveTypeA
CreateDirectoryA
GetFileAttributesA
GetWindowsDirectoryA
SetErrorMode
RaiseException
GetTickCount
CreateEventA
user32
ScreenToClient
SetWindowPos
GetWindowRect
GetDlgItem
EndPaint
BeginPaint
SetWindowLongA
GetWindowLongA
CreateDialogParamA
GetDesktopWindow
GetFocus
LoadBitmapA
MessageBoxA
wsprintfA
CharLowerBuffW
CharLowerBuffA
LoadStringA
SetWindowTextA
EndDialog
MoveWindow
DialogBoxParamA
InvalidateRect
GetParent
SendMessageA
GetSystemMetrics
EndDeferWindowPos
DeferWindowPos
BeginDeferWindowPos
GetClientRect
GetSysColor
GetWindowTextA
GetWindowTextW
RegisterClassA
DefDlgProcA
GetClassInfoA
EnableWindow
ShowWindow
CallWindowProcA
GetDC
GetMessageTime
GetMessagePos
UpdateWindow
GetWindow
CheckDlgButton
SetTimer
SetCursor
KillTimer
LoadCursorA
SetParent
WinHelpA
RemovePropA
GetPropA
SetPropA
SendDlgItemMessageA
IsDlgButtonChecked
EnableScrollBar
SetScrollPos
SetScrollRange
GetActiveWindow
FrameRect
ScrollDC
GetWindowDC
SetCapture
GetCapture
ReleaseCapture
IsIconic
DefWindowProcA
GetKeyState
IsWindow
CharNextA
PeekMessageA
TranslateMessage
DispatchMessageA
DestroyWindow
SetFocus
IsDialogMessageA
ReleaseDC
gdi32
GetObjectA
PatBlt
GetTextColor
GetBkColor
CreateFontIndirectA
BitBlt
CreatePatternBrush
SetBrushOrgEx
SetTextColor
SetBkColor
GetFontLanguageInfo
GetTextAlign
SetTextAlign
GetCharacterPlacementA
ExtTextOutA
IntersectClipRect
GetDeviceCaps
CreateFontA
GetTextMetricsA
CreateSolidBrush
DeleteDC
SelectObject
StretchBlt
CreateCompatibleDC
DeleteObject
advapi32
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
RegCreateKeyExA
RegCloseKey
shell32
SHGetSpecialFolderPathA
Sections
.text Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.0e3c Size: 512B - Virtual size: 208B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.1oqp Size: 512B - Virtual size: 200B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.15as Size: 512B - Virtual size: 200B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.a9as Size: 512B - Virtual size: 200B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.klkl Size: 512B - Virtual size: 200B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.psi Size: 512B - Virtual size: 200B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.teta Size: 512B - Virtual size: 200B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.ks1 Size: 512B - Virtual size: 200B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.1231 Size: 512B - Virtual size: 200B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.1237 Size: 512B - Virtual size: 200B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.zetaa Size: 346KB - Virtual size: 346KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.zeta0 Size: 512B - Virtual size: 212B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tetaX Size: 512B - Virtual size: 202B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 222B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ