Static task
static1
Behavioral task
behavioral1
Sample
2893cfd4c24e7ddf3608948d30a0d1191ca1ab1e6e94c030c9624bcb35527d6a.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
2893cfd4c24e7ddf3608948d30a0d1191ca1ab1e6e94c030c9624bcb35527d6a.exe
Resource
win10v2004-20220812-en
General
-
Target
2893cfd4c24e7ddf3608948d30a0d1191ca1ab1e6e94c030c9624bcb35527d6a
-
Size
830KB
-
MD5
bdd4f9e3ec954f0a09fd12d4da53cfd4
-
SHA1
16edc068a94666b77142740bc9ffd6ee6102a20b
-
SHA256
2893cfd4c24e7ddf3608948d30a0d1191ca1ab1e6e94c030c9624bcb35527d6a
-
SHA512
459b63b7961743ae6f220e91e5d2957bc5bdf17e479d1e9c4f882b3d20e3e0fce2edf1a8fe21c8cbeead5c17e24b116d3fbcb5b1e01076b44933f12ec01e0a34
-
SSDEEP
24576:AMQd+gaC6x3iJ3LKXDjj6T9LxolKRU+15/:AmpilLumT94Kz
Malware Config
Signatures
Files
-
2893cfd4c24e7ddf3608948d30a0d1191ca1ab1e6e94c030c9624bcb35527d6a.exe windows x86
8a330861f5c8d9baddbd97f58a292a62
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadLibraryW
GetGeoInfoW
CreateNamedPipeA
MoveFileExA
GetNamedPipeHandleStateA
ReadConsoleInputW
GetModuleFileNameA
FlushViewOfFile
LCMapStringA
LocalHandle
RtlZeroMemory
GetCurrentThread
GlobalAlloc
PeekConsoleInputA
SetTapePosition
GlobalUnlock
CallNamedPipeW
QueryPerformanceCounter
GetCommProperties
GetConsoleTitleW
GetStringTypeExW
GetCurrentConsoleFont
GetConsoleInputWaitHandle
GlobalUnfix
GetModuleHandleW
FindFirstFileExW
GetLocaleInfoW
GetThreadLocale
CreateMutexA
d3d8thk
OsThunkDdGetMoCompGuids
OsThunkDdSetColorKey
OsThunkDdGetMoCompFormats
OsThunkDdGetMoCompBuffInfo
OsThunkDdGetScanLine
OsThunkDdBlt
OsThunkDdLockD3D
OsThunkDdUnlock
OsThunkDdDestroyD3DBuffer
OsThunkDdRenderMoComp
OsThunkDdLock
OsThunkDdGetDxHandle
OsThunkDdCreateDirectDrawObject
OsThunkDdCreateSurfaceObject
OsThunkDdDestroyMoComp
OsThunkDdUnattachSurface
OsThunkDdGetInternalMoCompInfo
OsThunkDdCreateMoComp
OsThunkDdBeginMoCompFrame
OsThunkDdReleaseDC
OsThunkDdDestroySurface
OsThunkDdAlphaBlt
OsThunkDdUnlockD3D
OsThunkDdDeleteSurfaceObject
OsThunkDdCanCreateD3DBuffer
OsThunkDdQueryDirectDrawObject
OsThunkDdGetDriverState
mpr
WNetGetResourceParentW
MultinetGetErrorTextA
WNetUseConnectionW
WNetPropertyDialogW
WNetGetConnection2W
WNetDisconnectDialog
WNetSetConnectionW
WNetGetHomeDirectoryW
WNetOpenEnumA
MultinetGetConnectionPerformanceW
WNetGetConnection3A
WNetSetLastErrorA
WNetFormatNetworkNameA
msdart
?GetStatistics@CLKRLinearHashTable@@QBE?AVCLKRHashTableStats@@XZ
?ReadOrWriteLock@CFakeLock@@QAE_NXZ
?IsReadLocked@CReaderWriterLock2@@QBE_NXZ
??1CReaderWriterLock2@@QAE@XZ
??4CReaderWriterLock2@@QAEAAV0@ABV0@@Z
?Pop@CLockedSingleList@@QAEQAVCSingleListEntry@@XZ
?IsReadUnlocked@CCritSec@@QBE_NXZ
?_FindRecord@CLKRLinearHashTable@@ABE?AW4LK_RETCODE@@PBXK@Z
?SetDefaultSpinCount@CReaderWriterLock2@@SGXG@Z
?WriteUnlock@CReaderWriterLock2@@QAEXXZ
MpHeapCreate
?_TryWriteLock@CReaderWriterLock2@@AAE_NJ@Z
??1CCritSec@@QAE@XZ
?IsReadUnlocked@CFakeLock@@QBE_NXZ
?sm_dblDfltSpinAdjFctr@CCritSec@@1NA
?IsWin98orLater@CMdVersionInfo@@SAHXZ
?IsWriteUnlocked@CReaderWriterLock3@@QBE_NXZ
msvcirt
?getdouble@istream@@AAEHPADH@Z
??0ios@@IAE@ABV0@@Z
?adjustfield@ios@@2JB
?sgetn@streambuf@@QAEHPADH@Z
?unbuffered@streambuf@@IAEXH@Z
??0istrstream@@QAE@ABV0@@Z
??6ostream@@QAEAAV0@N@Z
?pbump@streambuf@@IAEXH@Z
?lockbuf@ios@@QAAXXZ
?width@ios@@QAEHH@Z
??_Gexception@@UAEPAXI@Z
??_Elogic_error@@UAEPAXI@Z
?write@ostream@@QAEAAV1@PBDH@Z
??_Dostream@@QAEXXZ
?sh_read@filebuf@@2HB
??_7ofstream@@6B@
??_7logic_error@@6B@
psapi
EnumPageFilesW
EnumPageFilesA
GetModuleInformation
GetModuleFileNameExW
EnumProcesses
GetProcessImageFileNameW
GetProcessMemoryInfo
EnumDeviceDrivers
Sections
.text Size: 385KB - Virtual size: 385KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 146KB - Virtual size: 145KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 189KB - Virtual size: 1.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 108KB - Virtual size: 107KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 872B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ