Static task
static1
Behavioral task
behavioral1
Sample
d0c86225067acb8f640b409be808ae8eda0bf267b6fea6dcbfc9cbc644fe6157.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
d0c86225067acb8f640b409be808ae8eda0bf267b6fea6dcbfc9cbc644fe6157.exe
Resource
win10v2004-20220901-en
General
-
Target
d0c86225067acb8f640b409be808ae8eda0bf267b6fea6dcbfc9cbc644fe6157
-
Size
408KB
-
MD5
75bd4600afecfd9e62f6d93fce1f6081
-
SHA1
5164a89831fddd39c9b86f701b2bf55259e645eb
-
SHA256
d0c86225067acb8f640b409be808ae8eda0bf267b6fea6dcbfc9cbc644fe6157
-
SHA512
c00fc0081347f5d2a0a2ab15eaf109be0c044c906b39d1df92f169e8a7cd1fd871650d99c534a325ac61aa426b09209eb4f17889a74516bd271a77c04f222015
-
SSDEEP
6144:te96lutPmm1X0eRHUl8f2TAzHSDZbThdlqQqmEjIhOMtKYdNPYl:E/Ul8jzHWf7lqTjvMt+
Malware Config
Signatures
Files
-
d0c86225067acb8f640b409be808ae8eda0bf267b6fea6dcbfc9cbc644fe6157.exe windows x86
040a6629e8ca301f217f3896ef45dad0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
imm32
ImmDisableIME
kernel32
Process32NextW
GetModuleFileNameW
Sleep
GetLastError
SetLastError
CreateEventW
OpenEventW
MapViewOfFile
UnmapViewOfFile
OpenFileMappingW
CreateFileW
CreateFileMappingW
CopyFileW
SetFileAttributesW
CreateProcessW
MoveFileExW
CreateDirectoryW
GetCurrentThreadId
MultiByteToWideChar
WideCharToMultiByte
GlobalAlloc
CreateThread
FormatMessageW
GlobalFree
WaitForMultipleObjects
InterlockedIncrement
InterlockedCompareExchange
ReadFile
FlushFileBuffers
GetFileSize
SetFilePointer
WriteFile
WaitForSingleObject
ReleaseMutex
CreateMutexW
OpenMutexW
LCMapStringW
GetTickCount
InterlockedDecrement
InterlockedExchange
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapFree
GetVersionExA
HeapAlloc
GetProcessHeap
GetStartupInfoW
FileTimeToSystemTime
FileTimeToLocalFileTime
GetDriveTypeW
HeapReAlloc
RtlUnwind
RaiseException
GetSystemInfo
GetTimeZoneInformation
LCMapStringA
GetCPInfo
GetStringTypeA
GetStringTypeW
GetModuleHandleA
GetProcAddress
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
ExitProcess
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
SetHandleCount
GetFileType
GetStartupInfoA
QueryPerformanceCounter
GetFullPathNameW
GetCurrentDirectoryA
GetACP
GetOEMCP
IsValidCodePage
HeapSize
GetConsoleCP
GetConsoleMode
GetLocaleInfoA
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
LoadLibraryA
GetLocaleInfoW
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetDriveTypeA
CreateFileA
CompareStringA
CompareStringW
SetEnvironmentVariableA
GetCurrentProcessId
GetVersionExW
GetModuleHandleW
CloseHandle
GetCommandLineW
Process32FirstW
CreateToolhelp32Snapshot
LocalFree
FindNextFileW
GetCurrentDirectoryW
DeleteFileW
FindClose
FindFirstFileW
RemoveDirectoryW
GetSystemTimeAsFileTime
user32
MessageBoxW
advapi32
GetSecurityInfo
RegQueryValueExW
RegCreateKeyExW
RegSetValueExW
RegCloseKey
BuildExplicitAccessWithNameW
GetSecurityDescriptorSacl
SetEntriesInAclW
SetSecurityInfo
ConvertStringSecurityDescriptorToSecurityDescriptorW
GetNamedSecurityInfoW
SetNamedSecurityInfoW
shell32
SHGetSpecialFolderPathW
SHFileOperationW
Sections
.text Size: 292KB - Virtual size: 292KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 72KB - Virtual size: 70KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE