Static task
static1
Behavioral task
behavioral1
Sample
9433150e8592763a5f1d80805652ff0891ee4ba8a1927bd8a0cc2bd496a73769.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9433150e8592763a5f1d80805652ff0891ee4ba8a1927bd8a0cc2bd496a73769.exe
Resource
win10v2004-20220812-en
General
-
Target
9433150e8592763a5f1d80805652ff0891ee4ba8a1927bd8a0cc2bd496a73769
-
Size
416KB
-
MD5
54791e7bf13599a8c81afe46a4571d39
-
SHA1
fddd86f0ac255903bd75e39035cbf531d8815af5
-
SHA256
9433150e8592763a5f1d80805652ff0891ee4ba8a1927bd8a0cc2bd496a73769
-
SHA512
037012c19500563df872df30b9a24f687475d3965dc2981730181fb58a32294e6cc397b0bfd20c0e27d3d77298b64398464720022f472977732356f9a9ca455f
-
SSDEEP
12288:cyydLNFuKGWarxBbw8Zxuc8yhuDH+gyl:cyWl5asIh
Malware Config
Signatures
Files
-
9433150e8592763a5f1d80805652ff0891ee4ba8a1927bd8a0cc2bd496a73769.exe windows x86
382550fa65319bc2438484aa99cbac51
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SuspendThread
GetLongPathNameA
VirtualLock
SetEndOfFile
FindNextChangeNotification
ExitProcess
SetNamedPipeHandleState
VirtualAllocEx
GetNumberFormatW
AllocConsole
LCMapStringA
CompareStringA
OutputDebugStringA
FileTimeToLocalFileTime
ReadDirectoryChangesW
DebugBreak
LocalFileTimeToFileTime
GetCurrentProcessId
LocalAlloc
FatalAppExitA
IsProcessorFeaturePresent
GlobalUnlock
GetDateFormatA
SetConsoleCursorPosition
FindResourceExA
RaiseException
SetupComm
FillConsoleOutputCharacterA
SystemTimeToFileTime
SetHandleCount
MoveFileW
CloseHandle
WriteConsoleOutputCharacterA
GetThreadPriority
GetConsoleCursorInfo
FreeLibraryAndExitThread
GetCommandLineA
VirtualProtect
SizeofResource
OpenFile
GlobalFlags
DosDateTimeToFileTime
_hread
FindResourceExW
EnumTimeFormatsW
GetVersionExA
VirtualAlloc
FormatMessageA
user32
GetSysColorBrush
DestroyWindow
InsertMenuA
IsCharAlphaNumericA
SetProcessWindowStation
InvalidateRgn
GetMenuItemInfoW
EnumWindows
RemoveMenu
RegisterDeviceNotificationA
PostMessageA
SubtractRect
SwapMouseButton
GetWindowDC
GetMenuCheckMarkDimensions
LoadImageA
GetDlgItemTextA
GetMonitorInfoA
CreateCaret
EndDialog
CreateWindowStationW
SystemParametersInfoA
SetClipboardViewer
GetProcessDefaultLayout
GrayStringA
GetAncestor
GetClassInfoA
SetWindowsHookExW
DestroyIcon
EnableMenuItem
GetParent
SetClassLongW
CreateDialogParamA
SendDlgItemMessageA
DrawMenuBar
IsZoomed
DefFrameProcA
LoadAcceleratorsA
gdi32
SetPaletteEntries
GetGlyphOutlineA
StartPage
PatBlt
PtInRegion
CopyMetaFileW
GetTextAlign
Chord
AddFontResourceW
StartDocA
GetTextExtentExPointA
advapi32
StartServiceCtrlDispatcherW
BuildSecurityDescriptorW
AccessCheckAndAuditAlarmA
OpenServiceA
RegDeleteKeyW
GetSecurityDescriptorGroup
InitiateSystemShutdownW
SetServiceStatus
StartServiceA
RegReplaceKeyW
RegEnumKeyExA
CryptHashData
RegisterEventSourceA
LookupAccountNameA
AdjustTokenPrivileges
RegQueryValueA
RegRestoreKeyW
SetThreadToken
DeleteAce
InitializeSecurityDescriptor
UnlockServiceDatabase
RegOpenKeyA
GetExplicitEntriesFromAclW
RegOpenKeyExA
GetAclInformation
RegConnectRegistryW
BuildTrusteeWithNameW
AbortSystemShutdownW
EnumServicesStatusA
EqualSid
LookupAccountSidA
GetFileSecurityA
LookupAccountNameW
SetTokenInformation
CloseEventLog
CryptGetHashParam
IsValidSid
ImpersonateLoggedOnUser
CryptDestroyHash
shell32
SHFileOperationA
SHChangeNotify
ole32
OleCreate
CoGetClassObject
CoFileTimeNow
CoRegisterClassObject
CreateStreamOnHGlobal
ReadFmtUserTypeStg
GetRunningObjectTable
oleaut32
SafeArrayCreate
SysStringLen
SafeArrayGetLBound
SafeArrayUnaccessData
comctl32
ImageList_Replace
shlwapi
PathIsRootA
PathRelativePathToW
StrTrimA
PathRemoveBlanksW
PathUnquoteSpacesW
StrDupW
PathFindExtensionW
Sections
yikiygg Size: 336KB - Virtual size: 332KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
mwwuyes Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
iyouaq Size: 32KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
yaiywa Size: 36KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ