Static task
static1
Behavioral task
behavioral1
Sample
72ec2fca0f6f2b76d91d805731ab9299a0bc8b4ca1ab6507f6e55ce4297d6881.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
72ec2fca0f6f2b76d91d805731ab9299a0bc8b4ca1ab6507f6e55ce4297d6881.exe
Resource
win10v2004-20220901-en
General
-
Target
72ec2fca0f6f2b76d91d805731ab9299a0bc8b4ca1ab6507f6e55ce4297d6881
-
Size
272KB
-
MD5
1cde94ab89c22a19b1453783fe8e1be0
-
SHA1
ca8f8d832486fd60565c0cdfef0dddf8b1969d0b
-
SHA256
72ec2fca0f6f2b76d91d805731ab9299a0bc8b4ca1ab6507f6e55ce4297d6881
-
SHA512
04f9b82884e5551de1276a864ba72e71b48d8c30dac90093279a2a67040f8d7b0b7fe937fd6a3e5f96e5cc0f2c1fd8f6ea800d47a2fd336c6892f68eecd3d246
-
SSDEEP
3072:TacycwdLuv3Sdn/LlL0RdKtT6aogC9VxZSPwsfOTMg0v8IKgupUoIuRxEts5hUlQ:TDmwfSRLamoj3aPwstiv/tAG1
Malware Config
Signatures
Files
-
72ec2fca0f6f2b76d91d805731ab9299a0bc8b4ca1ab6507f6e55ce4297d6881.exe windows x86
97e47fde9ca6d744085454e817ec9ab9
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
SystemFunction030
SystemFunction016
RegCreateKeyExA
LsaQuerySecret
RegSetValueExA
RegCloseKey
GetAclInformation
LsaEnumeratePrivileges
LockServiceDatabase
AddAccessDeniedAceEx
SetSecurityDescriptorControl
MSChapSrvChangePassword
ElfOldestRecord
RegOpenKeyExA
LsaICLookupNamesWithCreds
ElfCloseEventLog
RegDeleteValueA
AddUsersToEncryptedFile
winspool.drv
XcvDataW
OpenPrinterA
PlayGdiScriptOnPrinterIC
ClosePrinter
EndDocPrinter
StartPagePrinter
DeletePrinterIC
DocumentPropertiesA
kernel32
GlobalFree
EnterCriticalSection
GetFileSize
HeapReAlloc
Toolhelp32ReadProcessMemory
FreeLibrary
FindClose
DeleteFileA
IsBadCodePtr
GetModuleHandleA
lstrcpyA
FreeEnvironmentStringsA
CreateFileA
FlushFileBuffers
SetEnvironmentVariableA
HeapSize
DosDateTimeToFileTime
GetStdHandle
GetVersion
MulDiv
SetTimeZoneInformation
ReadFile
RaiseException
UnlockFile
LCMapStringW
HeapAlloc
MultiByteToWideChar
VirtualFree
ReleaseActCtx
lstrcatA
LockFile
GlobalAddAtomA
IsBadWritePtr
InterlockedIncrement
WideCharToMultiByte
GetVolumeInformationA
HeapCreate
IsValidLocale
FreeEnvironmentStringsW
SetSystemTime
GlobalGetAtomNameA
SetUnhandledExceptionFilter
FileTimeToSystemTime
GetLastError
LeaveCriticalSection
LocalUnlock
HeapFree
WritePrivateProfileStringA
SetLastError
GlobalAlloc
HeapDestroy
GetEnvironmentStringsW
GlobalLock
GetProcAddress
TerminateProcess
SetFileTime
GetFullPathNameA
GetCurrentDirectoryA
GetOEMCP
Sleep
LoadResource
lstrcmpA
FindNextFileA
LocalReAlloc
GetCurrentProcess
SetConsoleCursorPosition
SetStdHandle
GlobalDeleteAtom
ClearCommError
GetCurrentThread
GlobalUnlock
GetFileTime
GetDriveTypeA
FindResourceA
GetEnvironmentStringsA
LocalFileTimeToFileTime
TlsSetValue
TlsFree
Beep
GlobalFlags
GetACP
lstrlenA
LockResource
CompareStringA
GlobalReAlloc
SetEndOfFile
GetVersionExA
GetStringTypeW
UnhandledExceptionFilter
GetThreadLocale
SetConsoleTextAttribute
SetConsoleCursorInfo
lstrcpynA
GetEnvironmentVariableA
SetCurrentDirectoryA
TlsGetValue
SetConsoleScreenBufferSize
GlobalHandle
FileTimeToLocalFileTime
RtlUnwind
SetFilePointer
FlushInstructionCache
SystemTimeToFileTime
TlsAlloc
LoadLibraryA
SetFileAttributesA
MapUserPhysicalPages
CloseHandle
SetHandleCount
GetStringTypeA
GetWindowsDirectoryA
GetSystemDirectoryA
lstrcmpiA
CompareStringW
GlobalFindAtomA
GetModuleFileNameA
SetErrorMode
DuplicateHandle
ExitProcess
IsDebuggerPresent
GetFileAttributesA
InitializeSListHead
InterlockedDecrement
InitializeCriticalSection
WriteFile
GetCPInfo
FatalExit
LocalFree
GetCurrentThreadId
GetTimeZoneInformation
GetStartupInfoA
SystemTimeToTzSpecificLocalTime
GetCommandLineA
VirtualAlloc
IsBadReadPtr
LocalAlloc
GetProcessVersion
FindFirstFileA
GetFileType
DeleteCriticalSection
LCMapStringA
user32
CharUpperA
GetMenuItemID
SetPropA
GetClassLongA
CheckMenuItem
PostQuitMessage
IsWindow
LoadStringA
DestroyMenu
RemovePropA
ModifyMenuA
GetNextDlgTabItem
GetWindowTextLengthA
PostMessageA
DdeEnableCallback
SetCursor
SetMenuItemBitmaps
GetWindowPlacement
SetWindowPos
SystemParametersInfoA
GetSysColor
ValidateRect
SetActiveWindow
GetDlgItem
UnhookWindowsHookEx
DestroyWindow
SetWindowsHookExA
CreateDialogIndirectParamA
IsDialogMessageA
ClientToScreen
GetSystemMetrics
BeginPaint
GetMessageTime
LoadCursorA
RegisterClassA
CallNextHookEx
GetWindow
GetWindowTextA
wsprintfA
GetPropA
GetMenu
ReleaseDC
GetClassNameA
LoadBitmapA
SetWindowTextA
TranslateMessage
GetMenuCheckMarkDimensions
GetKeyState
EnableWindow
MessageBoxA
PeekMessageA
SendMessageA
GetDC
IsWindowEnabled
GetTopWindow
ExitWindowsEx
SetForegroundWindow
TabbedTextOutA
DrawTextA
EndDialog
GetMenuState
DrawIcon
GetForegroundWindow
GetActiveWindow
GetFocus
GrayStringA
GetClassInfoA
GetCursorPos
GetWindowRect
DefWindowProcA
GetMenuItemCount
GetSubMenu
ShowWindow
MapWindowPoints
RegisterWindowMessageA
EndPaint
GetParent
GetMessagePos
IsIconic
UpdateWindow
PtInRect
LoadIconA
GetMessageA
GetSysColorBrush
GetLastActivePopup
GetCapture
SetWindowLongA
DispatchMessageA
UnregisterClassA
IsWindowVisible
GetClientRect
CreateWindowExA
CallWindowProcA
CopyRect
GetDlgCtrlID
EnableMenuItem
GetWindowLongA
SendDlgItemMessageA
WinHelpA
winmm
mixerOpen
midiInReset
mid32Message
mmioAdvance
mmTaskSignal
waveOutGetPitch
comdlg32
dwOKSubclass
WantArrows
GetFileTitleA
gdi32
GdiPlayDCScript
EnumEnhMetaFile
GetDeviceCaps
RestoreDC
ScaleViewportExtEx
DeleteObject
SelectObject
OffsetViewportOrgEx
CreateBitmap
ExtTextOutA
RoundRect
SaveDC
CreateDIBitmap
SetViewportOrgEx
GetStockObject
GetRelAbs
GetObjectA
SetTextColor
SetMapMode
SelectClipRgn
ScaleWindowExtEx
GetClipBox
PtVisible
GetDCPenColor
CreateEllipticRgn
Escape
SetViewportExtEx
SetBkColor
DeleteDC
TextOutA
RectVisible
gdiPlaySpoolStream
SetWindowExtEx
PtInRegion
Sections
.text Size: 187KB - Virtual size: 186KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 35KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 31KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ