Static task
static1
Behavioral task
behavioral1
Sample
ecd41b64b8bd9c3c51f0a2c510fff1b9cb8c2c6f60fb733a8f448b4d9b9b8026.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ecd41b64b8bd9c3c51f0a2c510fff1b9cb8c2c6f60fb733a8f448b4d9b9b8026.exe
Resource
win10v2004-20221111-en
General
-
Target
ecd41b64b8bd9c3c51f0a2c510fff1b9cb8c2c6f60fb733a8f448b4d9b9b8026
-
Size
332KB
-
MD5
fedc618c8681f7245fc429c79c59ec6a
-
SHA1
bf86399ca4051b6e10cffac43d85a6c37c437f2c
-
SHA256
ecd41b64b8bd9c3c51f0a2c510fff1b9cb8c2c6f60fb733a8f448b4d9b9b8026
-
SHA512
0da01867cc5bb96488b88b389761e9b0c2ae7425b6ef5797fb2b31be4c03794181eab30fb6030f8394c9e31324636b038042ea5f9cdf4d2018e3e5e796052baa
-
SSDEEP
6144:BxyAv374e8zs57NAF9glCGG684GtIU9nEu0vNZT:qATsI57NA8kN6COUhhi
Malware Config
Signatures
Files
-
ecd41b64b8bd9c3c51f0a2c510fff1b9cb8c2c6f60fb733a8f448b4d9b9b8026.exe windows x86
ca71c19f759ed23f0af0890db640a60c
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleW
GetPrivateProfileIntW
GetPrivateProfileSectionW
GetPrivateProfileStringA
GetPrivateProfileStringW
GetProcAddress
GetProcessHeap
GetSystemDefaultUILanguage
GetSystemDirectoryW
GetSystemInfo
GetSystemTimeAsFileTime
GetTickCount
GetUserDefaultUILanguage
GetVersion
GetVersionExA
GetVersionExW
GetWindowsDirectoryW
GlobalFree
HeapAlloc
HeapFree
InitializeCriticalSectionAndSpinCount
InterlockedCompareExchange
InterlockedDecrement
InterlockedExchange
IsDBCSLeadByte
LeaveCriticalSection
LoadLibraryA
LoadLibraryExW
LoadLibraryW
LoadResource
LocalFree
GetModuleFileNameW
MapViewOfFile
MoveFileExW
MoveFileW
MultiByteToWideChar
OpenEventW
OutputDebugStringA
OutputDebugStringW
QueryPerformanceCounter
ReadFile
RemoveDirectoryW
ResumeThread
RtlUnwind
SearchPathW
SetFileAttributesW
SetFilePointer
SetLastError
SetUnhandledExceptionFilter
SizeofResource
Sleep
TerminateProcess
UnhandledExceptionFilter
UnmapViewOfFile
WaitForSingleObject
WideCharToMultiByte
WriteFile
WritePrivateProfileStringW
lstrcmpW
lstrcmpiA
lstrlenA
lstrlenW
GetLocaleInfoW
GetLocalTime
GetLastError
GetFileSize
GetFileAttributesW
GetFileAttributesExW
GetExitCodeThread
GetCurrentThreadId
GetCurrentProcessId
GetCurrentProcess
GetComputerNameW
FreeLibrary
FlushFileBuffers
FindResourceW
FindResourceExW
FindNextFileW
FindFirstFileW
FindClose
FileTimeToSystemTime
ExpandEnvironmentStringsW
EnumUILanguagesW
EnterCriticalSection
DisableThreadLibraryCalls
DeleteFileW
DeleteCriticalSection
CreateThread
CreateFileW
CreateFileMappingW
CreateDirectoryW
CopyFileW
CompareStringW
CompareStringA
LockResource
CloseHandle
user32
MsgWaitForMultipleObjects
PeekMessageW
PostMessageW
SendDlgItemMessageW
SendMessageTimeoutW
SetCursor
SetTimer
TranslateMessage
LoadStringW
LoadCursorW
KillTimer
GetWindow
GetTopWindow
GetSystemMetrics
GetMessageW
GetClassNameA
EndDialog
DispatchMessageW
DialogBoxParamW
DestroyIcon
CharNextW
CharLowerW
LoadImageW
advapi32
RegOpenKeyExW
EnumServicesStatusExW
DuplicateTokenEx
CreateProcessAsUserW
CopySid
ConvertStringSidToSidW
CloseServiceHandle
AllocateAndInitializeSid
AdjustTokenPrivileges
RegQueryInfoKeyW
RegQueryValueExA
RegQueryValueExW
RegSaveKeyW
RegSetValueExW
RevertToSelf
SetFileSecurityW
SetSecurityDescriptorOwner
GetLengthSid
GetTokenInformation
ImpersonateLoggedOnUser
InitializeSecurityDescriptor
LookupPrivilegeNameW
LookupPrivilegeValueW
OpenProcessToken
OpenSCManagerW
RegCloseKey
RegCreateKeyExW
RegDeleteValueW
RegEnumKeyExW
RegEnumKeyW
RegEnumValueW
RegOpenKeyExA
FreeSid
shlwapi
StrTrimW
StrToIntW
StrToIntExW
StrStrW
ChrCmpIA
PathAddBackslashW
PathAddExtensionW
PathAppendW
PathCombineW
PathFileExistsW
PathFindExtensionW
PathFindFileNameW
PathFindNextComponentW
PathGetCharTypeW
PathGetDriveNumberW
PathIsDirectoryW
PathIsFileSpecW
PathIsPrefixW
PathIsRootW
PathIsUNCServerW
PathIsURLW
PathRemoveBackslashW
PathRemoveBlanksW
PathRemoveExtensionW
PathRemoveFileSpecW
PathRenameExtensionW
PathSkipRootW
PathUnquoteSpacesW
SHDeleteEmptyKeyW
SHDeleteKeyW
SHDeleteValueW
SHGetValueW
StrStrIW
SHSetValueW
StrChrIW
StrChrW
StrCmpIW
StrCmpNIW
StrCmpNW
StrCmpW
StrDupW
StrRChrW
StrRetToStrW
StrSpnW
SHQueryValueExW
ole32
StringFromGUID2
CreateBindCtx
CoUninitialize
CoTaskMemRealloc
CoTaskMemFree
CoTaskMemAlloc
CoInitializeEx
CoCreateInstance
CoCreateGuid
oleaut32
SysStringByteLen
VariantInit
VariantCopy
VariantClear
VariantChangeType
SysStringLen
SafeArrayAccessData
SafeArrayCreate
SafeArrayDestroy
SafeArrayPutElement
SafeArrayUnaccessData
SysAllocString
SysAllocStringByteLen
SysFreeString
shell32
SHGetDesktopFolder
ShellExecuteExW
SHChangeNotify
setupapi
SetupCloseInfFile
SetupFindFirstLineW
SetupFindNextLine
SetupGetBinaryField
SetupGetIntField
SetupGetLineTextW
SetupGetStringFieldW
SetupOpenInfFileW
Sections
.text Size: 60KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 116KB - Virtual size: 116KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 112KB - Virtual size: 1.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ