Static task
static1
Behavioral task
behavioral1
Sample
b753d5631b82c49f0d09154e12273e274fa0dbaa7f293662221b2646162b15e3.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b753d5631b82c49f0d09154e12273e274fa0dbaa7f293662221b2646162b15e3.exe
Resource
win10v2004-20221111-en
General
-
Target
b753d5631b82c49f0d09154e12273e274fa0dbaa7f293662221b2646162b15e3
-
Size
303KB
-
MD5
3ae8141e69910fe47c0b33204eaa963c
-
SHA1
041b4fd5fe116f7f50fad45fd082a4cef529a22e
-
SHA256
b753d5631b82c49f0d09154e12273e274fa0dbaa7f293662221b2646162b15e3
-
SHA512
6ed1f2b0777883e9eeac6c276a92d82814cbfdac47db64a3ea309345ee7d4d173c6953a0a98d07c498f2f4f0beabd61e4b235cbbdadddfd167f3528bd7df85ff
-
SSDEEP
6144:XH/3GP1ZYed9Urn3fO4UyJv8++okP58lb0pGaC9rvgl86azemX1w4eJ:/GDYR3+y1ouapGP9v1lNlw
Malware Config
Signatures
Files
-
b753d5631b82c49f0d09154e12273e274fa0dbaa7f293662221b2646162b15e3.exe windows x86
360255f384ee28e5cd9be8ced1c1e167
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualQueryEx
ReleaseMutex
SuspendThread
RaiseException
QueryDosDeviceW
VirtualProtect
PeekNamedPipe
GetLocaleInfoW
VirtualQuery
CreateMutexA
GetCommandLineW
ReadFileScatter
GetModuleHandleA
GetCurrentProcess
SizeofResource
SetEnvironmentVariableA
GetUserDefaultLCID
_lopen
SetFileTime
GetOverlappedResult
ConnectNamedPipe
FindNextChangeNotification
SystemTimeToFileTime
FatalAppExitA
SearchPathW
SetEndOfFile
CreateFileW
RemoveDirectoryW
ExpandEnvironmentStringsW
ReadConsoleInputW
GetOEMCP
OpenSemaphoreW
GetThreadPriority
LCMapStringA
GetTapeStatus
SetCommMask
FlushConsoleInputBuffer
GlobalAddAtomW
WritePrivateProfileStringA
ScrollConsoleScreenBufferA
SetConsoleWindowInfo
SetProcessWorkingSetSize
LoadResource
lstrcmpiW
CreateMutexW
GetStringTypeExW
VirtualLock
GetDriveTypeA
GetModuleFileNameW
GlobalDeleteAtom
SetEvent
GetACP
GetDateFormatA
ReleaseSemaphore
AreFileApisANSI
lstrcpyA
ExitThread
SetThreadPriorityBoost
SetNamedPipeHandleState
SetTimeZoneInformation
DebugBreak
TryEnterCriticalSection
GetConsoleCursorInfo
ReadConsoleOutputA
GetProfileStringA
IsProcessorFeaturePresent
SetFileAttributesA
ReadFile
DosDateTimeToFileTime
LocalSize
GetUserDefaultLangID
WritePrivateProfileSectionA
IsValidLocale
FreeLibraryAndExitThread
GetConsoleMode
lstrcmpA
CancelIo
ReadConsoleA
GetAtomNameA
EnumDateFormatsW
EnumCalendarInfoA
DuplicateHandle
GetTickCount
lstrlenA
LeaveCriticalSection
VirtualAlloc
GetStartupInfoA
user32
WaitForInputIdle
gdi32
EnumFontsA
SetDIBitsToDevice
UnrealizeObject
SelectObject
CreateEnhMetaFileW
GetWindowOrgEx
GetCharWidthW
SetLayout
SetWindowExtEx
EnumObjects
ExtTextOutW
GetEnhMetaFileBits
GetEnhMetaFileHeader
PolyBezierTo
Arc
CreatePolyPolygonRgn
EnumFontFamiliesExW
advapi32
CryptExportKey
EnumDependentServicesA
QueryServiceConfigW
RegOpenKeyExA
BuildSecurityDescriptorW
CryptSetProvParam
IsValidAcl
CryptDeriveKey
AddAccessAllowedAce
IsTextUnicode
AccessCheck
RegCloseKey
ObjectCloseAuditAlarmA
QueryServiceStatus
GetSecurityDescriptorControl
CloseServiceHandle
RegCreateKeyExA
ImpersonateSelf
GetTokenInformation
ClearEventLogW
OpenEventLogW
CryptSignHashW
ObjectCloseAuditAlarmW
RegReplaceKeyW
ReportEventA
AddAccessDeniedAce
GetSecurityInfo
shell32
SHFileOperationA
ExtractIconA
DragQueryPoint
SHLoadInProc
ole32
OleCreate
CoCreateInstanceEx
CoFreeUnusedLibraries
oleaut32
SafeArrayCreate
LoadTypeLi
SafeArrayGetLBound
SysStringLen
comctl32
ImageList_GetIcon
shlwapi
PathRemoveFileSpecW
SHCopyKeyA
PathRemoveFileSpecA
msvcrt
_initterm
__getmainargs
_acmdln
exit
_controlfp
_XcptFilter
_exit
_adjust_fdiv
__p__commode
__setusermatherr
_except_handler3
__set_app_type
__p__fmode
Sections
iqaycim Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
ysoym Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
csomoc Size: 259KB - Virtual size: 259KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
uioywaa Size: 35KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ