Static task
static1
Behavioral task
behavioral1
Sample
svchost.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
svchost.exe
Resource
win10v2004-20220414-en
General
-
Target
4ab3999b9aa14d0eae351803736103b76a33734805b8c8193a72d06fc6986dcd
-
Size
50KB
-
MD5
21381fa3faa8f149a1b4414f39a10cbe
-
SHA1
9107a39deeb14bfa91859c98d932d4004c5b6fcb
-
SHA256
4ab3999b9aa14d0eae351803736103b76a33734805b8c8193a72d06fc6986dcd
-
SHA512
59dc43980e31c88497cd07d8eedbc6e2982b4488b5e454a22378addbb8b33673ee878d7d613e2bafe469c6b201c67841613a0f470a0cddbb38ac20f73e84c27d
-
SSDEEP
1536:D8IuUf0xGNY+zPQJMRRVspExLI4S7j4V7Nh5t:gzUsgNYgQ6RRVv87jkP5t
Malware Config
Signatures
Files
-
4ab3999b9aa14d0eae351803736103b76a33734805b8c8193a72d06fc6986dcd.zip
Password: infected
-
svchost.exe.exe windows x86
31553623c43827d554ad9e1b7dfa6a5a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
EnterCriticalSection
LeaveCriticalSection
GetCurrentThread
FindNextFileW
GetDiskFreeSpaceExW
GetVolumeInformationW
GetLogicalDrives
GetDriveTypeW
DeleteCriticalSection
LoadLibraryW
RtlUnwind
InitializeCriticalSection
GetSystemTime
GetTempFileNameW
CreateProcessW
GetModuleHandleA
GetProcAddress
GetCurrentProcess
FindFirstFileW
GetVolumeNameForVolumeMountPointA
GetWindowsDirectoryA
GetLocaleInfoA
FindClose
MultiByteToWideChar
WideCharToMultiByte
WaitForSingleObject
CreateThread
CopyFileW
GetTempPathW
Sleep
GetUserDefaultUILanguage
GetUserDefaultLangID
GetSystemDefaultLangID
SetUnhandledExceptionFilter
SetErrorMode
MulDiv
GetVersionExA
ExitProcess
GetModuleFileNameW
GetLastError
FlushFileBuffers
SetFileTime
GetSystemTimeAsFileTime
SetFilePointer
ReadFile
SetFileAttributesW
GetFileAttributesExW
DeleteFileW
MoveFileExW
WriteFile
GetFileSizeEx
CreateFileW
CloseHandle
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetFileType
InitializeCriticalSectionAndSpinCount
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetModuleFileNameA
GetStringTypeW
LCMapStringW
HeapCreate
GetCurrentThreadId
SetLastError
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
IsValidCodePage
GetOEMCP
GetACP
InterlockedDecrement
InterlockedIncrement
GetCPInfo
HeapAlloc
HeapFree
GetCommandLineA
HeapSetInformation
GetStartupInfoW
RaiseException
GetStdHandle
UnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
HeapSize
HeapReAlloc
IsProcessorFeaturePresent
GetModuleHandleW
user32
DrawTextW
SystemParametersInfoW
ReleaseDC
FrameRect
FillRect
GetSystemMetrics
GetDC
gdi32
CreateSolidBrush
GetDIBits
GetObjectA
SetBkMode
SetTextColor
CreateCompatibleBitmap
SelectObject
CreateFontA
DeleteObject
GetDeviceCaps
CreateCompatibleDC
DeleteDC
advapi32
CryptCreateHash
AccessCheck
MapGenericMask
DuplicateToken
OpenThreadToken
GetFileSecurityW
CryptHashData
SetTokenInformation
OpenProcessToken
CryptDestroyHash
CryptGetHashParam
RegSetValueExW
RegQueryValueExA
RegDeleteValueA
RegSetValueExA
RegCreateKeyExA
RegCloseKey
RegOpenKeyExA
CryptAcquireContextA
CryptGenRandom
CryptReleaseContext
CryptEncrypt
CryptSetKeyParam
CryptImportKey
CryptDestroyKey
shell32
SHGetFolderPathW
ShellExecuteW
wininet
InternetOpenA
InternetCloseHandle
InternetSetOptionA
HttpOpenRequestA
InternetQueryOptionA
HttpSendRequestExA
InternetWriteFile
HttpEndRequestA
HttpSendRequestA
HttpQueryInfoA
InternetCrackUrlA
InternetReadFile
InternetConnectA
mpr
WNetEnumResourceW
WNetCloseEnum
WNetAddConnection2W
WNetOpenEnumW
netapi32
DsRoleGetPrimaryDomainInformation
DsRoleFreeMemory
Sections
.text Size: 63KB - Virtual size: 62KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 25KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ