Static task
static1
Behavioral task
behavioral1
Sample
67aadc506703594b26888f2206ddeb4ed07639261a732ea3ccc87baf9676d65c.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
67aadc506703594b26888f2206ddeb4ed07639261a732ea3ccc87baf9676d65c.exe
Resource
win10v2004-20220721-en
General
-
Target
67aadc506703594b26888f2206ddeb4ed07639261a732ea3ccc87baf9676d65c
-
Size
6.6MB
-
MD5
988e0faeb1ca36acf1e585121234bd61
-
SHA1
d500b94bae38731715de1e982d5caf06adcfe06b
-
SHA256
67aadc506703594b26888f2206ddeb4ed07639261a732ea3ccc87baf9676d65c
-
SHA512
ba088cc7e1305d0fa14a4ed28eac07706ff8d1c1fc5f38fffac5a81e07a9708873b7a0f4efe51bf78bd39984b6f62efd9bbd600ad68c9ecfd51263d2b4d8bd19
-
SSDEEP
196608:PBnVh7fcmShK2YkvJM5dFnMhMzwjC2AjpRk:PBnTcmShK2JNKwj4
Malware Config
Signatures
Files
-
67aadc506703594b26888f2206ddeb4ed07639261a732ea3ccc87baf9676d65c.exe windows x86
5887931388b0dec48978408b4c3bc5f8
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetDriveTypeA
GlobalAlloc
VirtualFreeEx
LoadLibraryW
_hread
GetSystemPowerStatus
LeaveCriticalSection
GetFileAttributesA
GetNamedPipeInfo
FindNextVolumeW
GetBinaryTypeA
ReadFile
CreateFileW
CreateActCtxA
ExitThread
lstrlenW
SetConsoleTitleA
FlushInstructionCache
GlobalUnfix
FormatMessageA
ReadConsoleOutputCharacterA
GetProcAddress
PeekConsoleInputW
GetLocalTime
GetAtomNameA
SetThreadPriorityBoost
LocalAlloc
AddVectoredExceptionHandler
GetCommMask
SetCommMask
SetLocaleInfoW
CompareStringA
OutputDebugStringA
GetCPInfoExA
DeleteFileW
lstrcpyW
GetStringTypeW
WriteConsoleW
GetModuleHandleW
OutputDebugStringW
SleepEx
GetNamedPipeHandleStateA
SetConsoleActiveScreenBuffer
SetMailslotInfo
VerSetConditionMask
SetConsoleTextAttribute
LoadResource
MoveFileExA
SetComputerNameExA
GetLocaleInfoA
lstrlenA
GetProfileIntA
GetNativeSystemInfo
EncodePointer
DecodePointer
GetCommandLineW
RaiseException
RtlUnwind
IsProcessorFeaturePresent
IsDebuggerPresent
EnterCriticalSection
GetLastError
ExitProcess
GetModuleHandleExW
AreFileApisANSI
MultiByteToWideChar
WideCharToMultiByte
HeapSize
GetConsoleMode
ReadConsoleW
HeapFree
CloseHandle
HeapAlloc
SetLastError
GetCurrentThreadId
GetProcessHeap
GetStdHandle
GetFileType
DeleteCriticalSection
GetStartupInfoW
GetModuleFileNameW
WriteFile
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetEnvironmentStringsW
FreeEnvironmentStringsW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
Sleep
GetCurrentProcess
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetConsoleCP
SetFilePointerEx
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
LoadLibraryExW
HeapReAlloc
SetStdHandle
LCMapStringW
FlushFileBuffers
SetEndOfFile
user32
GetMessageExtraInfo
advapi32
BackupEventLogW
SetFileSecurityA
AddAce
FreeSid
RegReplaceKeyA
ObjectCloseAuditAlarmA
SetSecurityDescriptorOwner
CreatePrivateObjectSecurity
GetSecurityDescriptorControl
RegQueryMultipleValuesW
StartServiceCtrlDispatcherW
OpenProcessToken
OpenServiceA
AddAccessDeniedAceEx
Sections
.text Size: 75KB - Virtual size: 75KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 27KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6.5MB - Virtual size: 123.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 576B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ