Static task
static1
Behavioral task
behavioral1
Sample
31f7551f3e8a7655e9078e734c4b7db16ee76d196747bca0fbf9babcea3e7dad.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
31f7551f3e8a7655e9078e734c4b7db16ee76d196747bca0fbf9babcea3e7dad.exe
Resource
win10v2004-20221111-en
General
-
Target
31f7551f3e8a7655e9078e734c4b7db16ee76d196747bca0fbf9babcea3e7dad
-
Size
282KB
-
MD5
015bd613ad9b1133b237c495caebeef8
-
SHA1
9d86aa2c5d8acdc290e1cf3e1860137046bf1e42
-
SHA256
31f7551f3e8a7655e9078e734c4b7db16ee76d196747bca0fbf9babcea3e7dad
-
SHA512
dc97980d47b45f9a9e207e42d428214bea41b773b4af5ae137b36a71ef2031d8ab6951103c26dc4f45d69d8c5f6ebd041fac1dd90eb8178fd015a4506b413b8c
-
SSDEEP
6144:EGCgcsFsD411eH+HZ9BX4T41tAwwOtn3S7bQ/R:EGZFy411eHoB+6NFSAp
Malware Config
Signatures
Files
-
31f7551f3e8a7655e9078e734c4b7db16ee76d196747bca0fbf9babcea3e7dad.exe windows x86
c480143e23cc1e4d27ad78dcda9e2b51
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
SHGetFolderPathW
dnsapi
DnsFree
DnsQuery_W
shlwapi
SHDeleteEmptyKeyW
StrStrIA
PathFileExistsA
PathFileExistsW
PathFindFileNameW
StrCmpW
kernel32
CreateDirectoryW
SetCurrentDirectoryW
SetThreadPriority
lstrlenW
LocalAlloc
SetEndOfFile
WideCharToMultiByte
CloseHandle
GlobalFree
FindResourceExW
CreateThread
GlobalMemoryStatus
CreateFileW
IsDebuggerPresent
lstrcatW
GetShortPathNameW
ResumeThread
LoadResource
CreateFileMappingW
CreateSemaphoreW
OpenMutexW
SleepEx
ReleaseMutex
UnhandledExceptionFilter
RaiseException
GetCurrentThreadId
SetFileAttributesW
FindNextFileW
CreateEventW
SignalObjectAndWait
OutputDebugStringW
lstrlenA
SystemTimeToFileTime
DeleteFileW
MoveFileExW
LocalFree
ReadFile
SetUnhandledExceptionFilter
HeapReAlloc
HeapDestroy
WaitForMultipleObjects
GetSystemTime
WriteFile
MoveFileW
ResetEvent
FindResourceW
FreeLibrary
OpenFileMappingW
TerminateThread
CopyFileW
UnmapViewOfFile
FindFirstFileW
WaitForSingleObject
lstrcpyW
DeleteCriticalSection
GetTempPathW
SizeofResource
HeapFree
GetCurrentDirectoryW
FindClose
GetFileSize
HeapAlloc
GetSystemTimeAsFileTime
WaitForMultipleObjectsEx
OpenEventW
VirtualQuery
ReleaseSemaphore
InitializeCriticalSectionAndSpinCount
QueryPerformanceFrequency
GetModuleHandleW
HeapSize
GetLocalTime
CreateMutexW
OpenProcess
GlobalAlloc
MapViewOfFile
LeaveCriticalSection
LockResource
GetProcessHeap
SetLastError
SetFilePointer
EnterCriticalSection
GetCurrentDirectoryA
VirtualAllocEx
ws2_32
htonl
inet_addr
ole32
CoUninitialize
CoInitializeEx
advapi32
CloseServiceHandle
CryptAcquireContextW
CryptReleaseContext
GetAce
GetUserNameW
InitializeAcl
OpenServiceW
SetSecurityDescriptorDacl
RegQueryInfoKeyW
GetAclInformation
SetNamedSecurityInfoW
GetSecurityDescriptorSacl
GetSidSubAuthority
GetNamedSecurityInfoW
AddAce
RegOpenKeyExW
FreeSid
SetSecurityDescriptorSacl
GetSidSubAuthorityCount
AllocateAndInitializeSid
RegEnumKeyExW
RegQueryValueExW
GetTokenInformation
CryptGenRandom
RegSetValueExW
RegEnumValueW
LookupAccountNameW
OpenProcessToken
ConvertSidToStringSidW
ConvertStringSecurityDescriptorToSecurityDescriptorW
StartServiceW
GetSidIdentifierAuthority
RegDeleteValueW
SetEntriesInAclW
RegOpenKeyW
RegCloseKey
RegDeleteKeyW
GetLengthSid
InitializeSecurityDescriptor
OpenSCManagerW
QueryServiceStatus
AddAccessAllowedAce
RegCreateKeyExW
user32
MsgWaitForMultipleObjectsEx
DispatchMessageW
TranslateMessage
PeekMessageW
GetKeyboardLayout
WaitForInputIdle
GetDCEx
SetWindowLongW
PeekMessageA
InvalidateRgn
DestroyCursor
RemoveMenu
wsprintfW
LoadIconW
CreateAcceleratorTableA
RegisterWindowMessageW
LoadImageA
GetMenu
GetMessageA
GetMenuStringA
EnumWindows
DestroyIcon
GetMenuItemInfoW
dskquota
ProcessGroupPolicy
Sections
.text Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 240KB - Virtual size: 15.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 5KB - Virtual size: 389KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ