Static task
static1
Behavioral task
behavioral1
Sample
61489f6f2f5aba1927d0ab0fad277e2f6706ff4a94a9526e56e6102df009b33d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
61489f6f2f5aba1927d0ab0fad277e2f6706ff4a94a9526e56e6102df009b33d.exe
Resource
win10v2004-20221111-en
General
-
Target
61489f6f2f5aba1927d0ab0fad277e2f6706ff4a94a9526e56e6102df009b33d
-
Size
138KB
-
MD5
6d7c482543672d96cb4ca6a048f12b00
-
SHA1
88c9f2846d45d428fd49a2a694c8214a56a24468
-
SHA256
61489f6f2f5aba1927d0ab0fad277e2f6706ff4a94a9526e56e6102df009b33d
-
SHA512
417b181d474e31df16a4f329209b4fe3991410f47a3da354a92437eb0c766a467c81b933c32c3447df0d6cc76463a27b389ec670200e51d60d66551fe8e66e6f
-
SSDEEP
3072:uApAZqZ3hlTrDj/qOXhO27U0WDfC+iT6qeS/mNf5KeNpzRsSwrlb:uApzhRrP/qchO27Uji7e995bN0rlb
Malware Config
Signatures
Files
-
61489f6f2f5aba1927d0ab0fad277e2f6706ff4a94a9526e56e6102df009b33d.exe windows x86
2854fcbe57607f76b0bbbd856d26b70c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WriteFile
OpenProcess
Thread32First
WideCharToMultiByte
ReadProcessMemory
HeapDestroy
HeapCreate
Thread32Next
ReadFile
GetTimeZoneInformation
MultiByteToWideChar
FlushFileBuffers
GetTempPathW
GetFileSizeEx
OpenMutexW
VirtualProtectEx
VirtualAllocEx
FindClose
LoadLibraryA
RemoveDirectoryW
WaitForMultipleObjects
FindNextFileW
VirtualProtect
CreateToolhelp32Snapshot
FreeLibrary
ReleaseMutex
VirtualQueryEx
GetVolumeNameForVolumeMountPointW
DeleteFileW
GetFileInformationByHandle
WriteProcessMemory
GetCurrentThreadId
GetCommandLineW
SetErrorMode
GetComputerNameW
OpenEventW
DuplicateHandle
GetCurrentProcessId
GetPrivateProfileStringW
GetPrivateProfileIntW
CreateRemoteThread
Process32FirstW
Process32NextW
MapViewOfFile
UnmapViewOfFile
CreateFileMappingW
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
TerminateProcess
ExitProcess
CreateThread
SetFileTime
IsBadReadPtr
GetProcessHeap
VirtualFree
GetModuleHandleW
HeapFree
SetFilePointerEx
SystemTimeToFileTime
HeapAlloc
GetSystemTime
GetLocalTime
CreateProcessW
SetEndOfFile
FindFirstFileW
CreateMutexW
HeapReAlloc
GetTempFileNameW
FileTimeToDosDateTime
GetEnvironmentVariableW
SetFileAttributesW
WTSGetActiveConsoleSessionId
GetProcAddress
lstrcmpiA
CreateFileW
LoadLibraryW
FileTimeToLocalFileTime
CreateDirectoryW
CreateEventW
ResetEvent
SetLastError
GetLastError
SetEvent
ExpandEnvironmentStringsW
GetUserDefaultUILanguage
lstrcmpiW
GetModuleFileNameW
GetFileAttributesW
MoveFileExW
SetThreadPriority
Sleep
GetCurrentThread
WaitForSingleObject
LocalFree
GetVersionExW
GetNativeSystemInfo
CloseHandle
GetFileAttributesExW
GetProcessId
VirtualAlloc
VirtualFreeEx
SetThreadContext
GetThreadContext
EnterCriticalSection
GlobalUnlock
LeaveCriticalSection
InitializeCriticalSection
GetTickCount
GetFileTime
GlobalLock
user32
DrawIcon
GetIconInfo
CharLowerW
MapVirtualKeyW
CharLowerBuffA
CreateDesktopW
SetProcessWindowStation
GetThreadDesktop
CloseWindowStation
CreateWindowStationW
GetProcessWindowStation
OpenDesktopW
CloseDesktop
SetThreadDesktop
GetUserObjectInformationW
OpenWindowStationW
GetMessageA
RegisterClassA
GetMessageW
SetCapture
PostMessageW
GetParent
GetWindowInfo
GetClassLongW
GetCapture
GetWindowDC
GetAncestor
PeekMessageA
SetWindowPos
GetCursorPos
IsWindow
FillRect
DrawEdge
RegisterClassExA
IntersectRect
EqualRect
PrintWindow
RegisterWindowMessageW
GetMenuItemID
SetKeyboardState
GetSubMenu
MenuItemFromPoint
GetMenu
GetMenuItemRect
TrackPopupMenuEx
SystemParametersInfoW
GetClassNameW
GetMenuState
GetMenuItemCount
PostThreadMessageW
HiliteMenuItem
EndMenu
GetShellWindow
EndPaint
DefDlgProcW
DefFrameProcA
DefWindowProcW
OpenInputDesktop
GetUpdateRgn
GetWindowRect
BeginPaint
DefFrameProcW
RegisterClassExW
GetDCEx
ToUnicode
GetClipboardData
DefWindowProcA
DefMDIChildProcW
SwitchDesktop
DefDlgProcA
ReleaseCapture
SendMessageW
MapWindowPoints
GetMessagePos
GetWindowThreadProcessId
IsRectEmpty
GetSystemMetrics
GetTopWindow
LoadImageW
MsgWaitForMultipleObjects
WindowFromPoint
GetDC
GetWindowLongW
CharLowerA
PeekMessageW
ReleaseDC
DefMDIChildProcA
RegisterClassW
CallWindowProcA
CallWindowProcW
SetCursorPos
GetKeyboardState
TranslateMessage
ExitWindowsEx
CharToOemW
DispatchMessageW
GetWindow
SendMessageTimeoutW
SetWindowLongW
CharUpperW
GetUpdateRect
advapi32
ConvertSidToStringSidW
InitiateSystemShutdownExW
EqualSid
CryptGetHashParam
OpenProcessToken
GetSidSubAuthority
CryptAcquireContextW
OpenThreadToken
GetSidSubAuthorityCount
GetTokenInformation
RegCreateKeyExW
CryptReleaseContext
RegQueryValueExW
CreateProcessAsUserW
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
SetNamedSecurityInfoW
LookupPrivilegeValueW
CryptCreateHash
ConvertStringSecurityDescriptorToSecurityDescriptorW
RegOpenKeyExW
GetSecurityDescriptorSacl
SetSecurityDescriptorSacl
CryptDestroyHash
AdjustTokenPrivileges
RegCloseKey
RegSetValueExW
CryptHashData
IsWellKnownSid
GetLengthSid
RegEnumKeyExW
shlwapi
PathIsURLW
PathRemoveFileSpecW
StrStrIW
StrStrIA
wvnsprintfA
StrCmpNIA
PathMatchSpecW
PathRemoveBackslashW
PathUnquoteSpacesW
PathAddExtensionW
PathCombineW
SHDeleteKeyW
PathSkipRootW
SHDeleteValueW
PathAddBackslashW
PathFindFileNameW
PathIsDirectoryW
wvnsprintfW
UrlUnescapeA
StrCmpNIW
PathRenameExtensionW
PathQuoteSpacesW
shell32
SHGetFolderPathW
ShellExecuteW
CommandLineToArgvW
secur32
GetUserNameExW
ole32
StringFromGUID2
CLSIDFromString
CoUninitialize
CoCreateInstance
CoInitializeEx
gdi32
RestoreDC
SaveDC
DeleteDC
GdiFlush
SetViewportOrgEx
CreateCompatibleDC
SelectObject
CreateDIBSection
GetDeviceCaps
GetDIBits
DeleteObject
SetRectRgn
CreateCompatibleBitmap
ws2_32
listen
WSASetLastError
freeaddrinfo
socket
bind
recv
setsockopt
WSAEventSelect
recvfrom
sendto
WSAIoctl
connect
WSAAddressToStringW
WSAStartup
getaddrinfo
select
WSAGetLastError
getsockname
accept
getpeername
WSASend
closesocket
send
shutdown
crypt32
CertDuplicateCertificateContext
CertEnumCertificatesInStore
PFXImportCertStore
CertCloseStore
CertOpenSystemStoreW
CertDeleteCertificateFromStore
CryptUnprotectData
PFXExportCertStoreEx
wininet
InternetQueryOptionA
InternetSetOptionA
InternetQueryOptionW
InternetOpenA
HttpOpenRequestA
InternetCrackUrlA
InternetConnectA
HttpSendRequestA
HttpAddRequestHeadersA
HttpAddRequestHeadersW
InternetSetStatusCallbackW
GetUrlCacheEntryInfoW
HttpSendRequestW
InternetReadFile
InternetReadFileExA
InternetQueryDataAvailable
HttpSendRequestExW
HttpQueryInfoA
HttpSendRequestExA
InternetCloseHandle
oleaut32
VariantInit
SysAllocString
VariantClear
SysFreeString
netapi32
NetApiBufferFree
NetUserEnum
NetUserGetInfo
Sections
.text Size: 129KB - Virtual size: 129KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ