Static task
static1
Behavioral task
behavioral1
Sample
8573d3c6d4a56e9304b9dd1b9a31c3f18ae64afaec55119660dbaf8dffc78066.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
8573d3c6d4a56e9304b9dd1b9a31c3f18ae64afaec55119660dbaf8dffc78066.exe
Resource
win10v2004-20221111-en
General
-
Target
8573d3c6d4a56e9304b9dd1b9a31c3f18ae64afaec55119660dbaf8dffc78066
-
Size
230KB
-
MD5
365e846ea8c76334480fb3d0425bf300
-
SHA1
92e57559e6c68883b36583e003daae4aa848fafa
-
SHA256
8573d3c6d4a56e9304b9dd1b9a31c3f18ae64afaec55119660dbaf8dffc78066
-
SHA512
16eb881d18b6758c663d02c62b21f2eb7c55f2b8bb53c2b7c057f44d64aa156ec73c08ec61eaf3785f28f591c78374deebc45f9f8aaf2cd36089c77283dac914
-
SSDEEP
6144:03qoPwm0scuJVumsscdjT6W48xp1FsqmDFfe6K49z:0350RuJgmQpT6W484qmDFG34t
Malware Config
Signatures
Files
-
8573d3c6d4a56e9304b9dd1b9a31c3f18ae64afaec55119660dbaf8dffc78066.exe windows x86
2fb5c8d61922dd437c088d4799d715d2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
_vsnwprintf
memmove
advapi32
RegEnumKeyW
RegQueryInfoKeyW
RegDeleteKeyW
RegQueryValueExW
RegEnumValueW
RegOpenKeyExW
RegQueryValueW
RegCloseKey
RegEnumKeyExW
RegOpenKeyW
RegSetValueExW
RegCreateKeyW
RegSetValueW
kernel32
GlobalAlloc
ReadFile
SetFilePointer
LocalFree
FreeResource
LockResource
LoadResource
FindResourceW
FreeLibrary
EnumResourceNamesW
LoadLibraryExW
SetErrorMode
GetSystemTimeAsFileTime
GetPrivateProfileStringW
GlobalSize
GlobalReAlloc
GlobalUnlock
MultiByteToWideChar
CloseHandle
WriteFile
CreateFileW
DeleteFileW
GetTempFileNameW
GetEnvironmentVariableW
lstrlenA
RemoveDirectoryW
SetFileAttributesW
GetLastError
GlobalLock
MulDiv
WritePrivateProfileStringW
GetModuleFileNameW
WinExec
LoadLibraryW
GetThreadLocale
ExitProcess
GetStartupInfoW
GetCommandLineW
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
lstrcmpW
GetPrivateProfileSectionW
LocalAlloc
GlobalFree
lstrcmpiW
lstrlenW
SearchPathW
GetWindowsDirectoryW
FindClose
FindFirstFileW
SetLastError
GetProcAddress
GetModuleHandleW
lstrcpynW
ExpandEnvironmentStringsW
MoveFileW
gdi32
GetTextExtentPointW
GetTextExtentExPointW
GetDeviceCaps
user32
SetForegroundWindow
LoadStringW
LookupIconIdFromDirectory
CopyRect
LoadCursorW
SetCursor
SystemParametersInfoW
GetLastActivePopup
MessageBoxW
GetDlgItem
GetDC
GetClientRect
ReleaseDC
GetSystemMetrics
EnableMenuItem
PeekMessageW
DispatchMessageW
SendDlgItemMessageW
DestroyWindow
CreateDialogParamW
SetDlgItemTextW
GetSystemMenu
CharNextW
comctl32
ord17
ord358
ord235
ord324
ord236
ord73
ord323
ord326
ord321
ord320
ord365
ord332
ord328
ord334
version
GetFileVersionInfoW
GetFileVersionInfoSizeW
VerQueryValueW
shell32
ord195
FindExecutableW
ord32
ord31
SHChangeNotify
ord34
ord57
ord39
ord175
ord49
ord165
ord119
ord155
SHGetSpecialFolderLocation
ord37
ord33
ord196
SHGetPathFromIDListW
ord96
ord25
ord157
ord29
ShellExecuteExW
ord128
ord63
ord23
ord58
ord52
ord56
ord51
ord94
ord45
ord36
ord35
ord164
ord79
SHAddToRecentDocs
Sections
.text Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 632B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vmp0 Size: 192KB - Virtual size: 1.3MB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE