Static task
static1
Behavioral task
behavioral1
Sample
8e89a63e6fdca1796d1f18e63f69f60a8acf9647a39239487ae0ed1d46052581.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8e89a63e6fdca1796d1f18e63f69f60a8acf9647a39239487ae0ed1d46052581.exe
Resource
win10v2004-20220901-en
General
-
Target
8e89a63e6fdca1796d1f18e63f69f60a8acf9647a39239487ae0ed1d46052581
-
Size
310KB
-
MD5
2894b77a50aa4c6a08b35324dfba36aa
-
SHA1
f535562f72be343b9ceead8cb5e39217b6a554db
-
SHA256
8e89a63e6fdca1796d1f18e63f69f60a8acf9647a39239487ae0ed1d46052581
-
SHA512
af359a92379fdf078ef0418a271dd245008794da1f20ca05827171f9e9b9bbf216f22e49f43121b271aca23099cfa128cd2eddad856ca322810943f2aea30d8f
-
SSDEEP
6144:5Um2TuCtUlT372dlG7zEA/A6wSNGtaQLzgftTdmiTbR1HQHhMG/7ZaZ4tuRh5:Ziti37HvEJHHvstdmq1QBM8taZ4AP5
Malware Config
Signatures
Files
-
8e89a63e6fdca1796d1f18e63f69f60a8acf9647a39239487ae0ed1d46052581.exe windows x86
310f9d6a3150575046aa1ce6e895d6bc
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ole32
CoUninitialize
CoMarshalInterThreadInterfaceInStream
CoImpersonateClient
CoGetInterfaceAndReleaseStream
CLSIDFromProgID
CoInitializeEx
CoRevertToSelf
OleRun
CLSIDFromString
CoCreateInstance
user32
wsprintfW
UnregisterClassA
shell32
SHGetFolderPathW
oleaut32
SysAllocStringLen
VariantChangeType
SafeArrayGetElement
SafeArrayGetDim
SafeArrayAccessData
SysAllocString
SafeArrayCreateVectorEx
SysFreeString
SafeArrayRedim
LoadTypeLi
VariantClear
VariantCopyInd
SafeArrayCopy
SafeArrayUnlock
SafeArrayGetVartype
SysStringByteLen
VariantTimeToSystemTime
LoadRegTypeLi
VariantCopy
GetRecordInfoFromGuids
SafeArrayGetLBound
SafeArrayUnaccessData
VarBstrCmp
SysStringLen
SafeArrayCreate
SafeArrayDestroy
SafeArrayGetUBound
SafeArrayLock
VariantInit
SystemTimeToVariantTime
SysAllocStringByteLen
userenv
UnloadUserProfile
GetProfileType
DeleteProfileA
WaitForMachinePolicyForegroundProcessing
ForceSyncFgPolicy
RsopLoggingEnabled
FreeGPOListA
advapi32
InitializeSid
EqualSid
InitializeAcl
CopySid
RegQueryValueExW
SetSecurityDescriptorDacl
GetSecurityDescriptorDacl
GetSidSubAuthority
LookupPrivilegeValueW
DuplicateTokenEx
GetAclInformation
SetThreadToken
RegCreateKeyExW
GetSecurityDescriptorLength
OpenThreadToken
MakeSelfRelativeSD
RegCloseKey
AdjustTokenPrivileges
MakeAbsoluteSD
AddAce
ConvertStringSidToSidW
GetSecurityDescriptorSacl
GetTokenInformation
GetLengthSid
RegNotifyChangeKeyValue
IsValidSid
GetSecurityDescriptorGroup
InitializeSecurityDescriptor
GetSidLengthRequired
RevertToSelf
OpenProcessToken
GetSecurityDescriptorControl
LookupAccountSidW
GetSecurityDescriptorOwner
SetSecurityDescriptorOwner
shlwapi
PathAppendW
kernel32
GetCurrentThreadId
SetThreadPriority
FileTimeToDosDateTime
DeleteFileW
GetModuleHandleW
ReadFile
GetSystemTimeAsFileTime
LocalFree
GlobalMemoryStatusEx
EnterCriticalSection
WaitForSingleObject
UnmapViewOfFile
LeaveCriticalSection
HeapSize
FindResourceW
GetThreadLocale
CreateEventW
SizeofResource
LockResource
HeapReAlloc
RaiseException
WriteFile
GetDriveTypeW
GetSystemTime
GetACP
LoadResource
GetProcessHeap
UnhandledExceptionFilter
FindClose
HeapFree
SetThreadLocale
SetFilePointer
SetLastError
DeviceIoControl
DeleteCriticalSection
QueryDosDeviceW
MapViewOfFile
GetSystemInfo
HeapAlloc
lstrlenW
GetFileSize
SetEndOfFile
ResetEvent
GetLongPathNameW
IsDebuggerPresent
HeapDestroy
CreateFileMappingW
CreateFileW
FindFirstFileW
ResumeThread
SetUnhandledExceptionFilter
FileTimeToSystemTime
SignalObjectAndWait
FindResourceExW
WaitForMultipleObjects
CreateThread
ExpandEnvironmentStringsW
CloseHandle
FreeLibrary
FormatMessageW
IsValidCodePage
VirtualAllocEx
iashlpr
DllUnregisterServer
Sections
.text Size: 25KB - Virtual size: 25KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 268KB - Virtual size: 271KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ