Static task
static1
Behavioral task
behavioral1
Sample
edd3f2bb9d79082b9df474cf1f256212df9abd29baad90456afaa2b3a9b23c51.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
edd3f2bb9d79082b9df474cf1f256212df9abd29baad90456afaa2b3a9b23c51.exe
Resource
win10v2004-20220812-en
General
-
Target
edd3f2bb9d79082b9df474cf1f256212df9abd29baad90456afaa2b3a9b23c51
-
Size
280KB
-
MD5
624f59540f66dfd8a9d748b30fe3aa50
-
SHA1
246fa0a06c83600ed6bab7c70c6ab269c6738d18
-
SHA256
edd3f2bb9d79082b9df474cf1f256212df9abd29baad90456afaa2b3a9b23c51
-
SHA512
de293147ae9b9030ab41fe7e2fdd35d76731451d315209e57934a7fadaaa030003e1e240054fd2f393a0ece8d0966e17f213b7ccf8e08459764d80ab4df8b05e
-
SSDEEP
3072:fME87tq3Ywm+iW3L2Bp6T7RqdvQHs4H7LOCodLnu9sWVFSymkfak:fs7twLnPRvsGLOCodaXVFO/k
Malware Config
Signatures
Files
-
edd3f2bb9d79082b9df474cf1f256212df9abd29baad90456afaa2b3a9b23c51.exe windows x86
a03fc7b0f8e2a8ca568e7346f7930f1a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegDeleteKeyW
RegCloseKey
RegDeleteValueW
RegEnumValueW
RegSetValueExW
RegCreateKeyExW
RegQueryValueExW
RegOpenKeyExW
RegEnumKeyExW
CloseServiceHandle
ControlService
QueryServiceStatus
ChangeServiceConfigW
QueryServiceConfigW
OpenServiceW
OpenSCManagerW
RegEnumKeyW
RegQueryValueExA
RegOpenKeyExA
RegQueryInfoKeyW
kernel32
GetLastError
WriteFile
SizeofResource
CreateFileW
LoadResource
FindResourceW
GetSystemWindowsDirectoryW
RegisterApplicationRestart
HeapSetInformation
Sleep
GetShortPathNameW
lstrcmpW
FindFirstFileExW
FindNextFileW
SetCurrentDirectoryW
GetCurrentDirectoryW
lstrlenW
RemoveDirectoryW
ExpandEnvironmentStringsW
CloseHandle
CreateFileA
GetFileSize
GetWindowsDirectoryA
GetTempPathA
CreateDirectoryW
GetLocalTime
WritePrivateProfileStringW
GetPrivateProfileStringW
GetProfileStringW
WriteProfileStringW
GetTempPathW
MoveFileW
MoveFileExW
GetModuleFileNameW
CreateDirectoryA
GetSystemDefaultLangID
CopyFileW
GetFileTime
FileTimeToSystemTime
GetTimeZoneInformation
GetWindowsDirectoryW
GetVersionExA
GetVersionExW
GetFileAttributesA
LoadLibraryW
GetProcAddress
FreeLibrary
UnhandledExceptionFilter
SetLastError
DeleteFileW
LCIDToLocaleName
GetUserDefaultLCID
RaiseException
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
QueryPerformanceCounter
GetModuleHandleA
SetUnhandledExceptionFilter
GetStartupInfoA
InterlockedCompareExchange
InterlockedExchange
GetTickCount
FindFirstFileW
FindClose
CreateHardLinkW
SetFileAttributesW
GetSystemDirectoryW
GetFileAttributesW
SetFilePointer
user32
CharNextA
LoadStringW
msvcrt
_lock
__dllonexit
_unlock
_controlfp
_except_handler4_common
?terminate@@YAXXZ
__set_app_type
__p__fmode
__p__commode
__setusermatherr
_initterm
_acmdln
_ismbblead
_XcptFilter
_exit
_cexit
__getmainargs
_onexit
_wtol
mbstowcs
wcsrchr
??_U@YAPAXI@Z
??_V@YAXPAX@Z
memset
wcschr
_wcslwr
wcsstr
_wcsicmp
_wcsnicmp
_vsnwprintf
free
_amsg_exit
_vsnprintf
swscanf
_wtoi
_itow
malloc
memcpy
_wcsupr
iswalnum
iswalpha
exit
ole32
StringFromGUID2
CoCreateGuid
CoUninitialize
CoCreateInstance
CoInitialize
PropVariantClear
oleaut32
SystemTimeToVariantTime
VariantTimeToSystemTime
SysFreeString
SysAllocString
VariantClear
version
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
shell32
SHGetSpecialFolderPathW
SHSetLocalizedName
SHGetPathFromIDListW
SHGetSpecialFolderLocation
SHGetMalloc
ShellExecuteW
SHGetFolderPathW
SHChangeNotify
SHCreateItemFromParsingName
SHGetPathFromIDListA
shlwapi
PathRemoveFileSpecW
PathAppendW
PathIsDirectoryW
PathAddBackslashW
PathUnExpandEnvStringsW
PathAddBackslashA
PathRemoveBlanksW
slc
SLGetWindowsInformationDWORD
wmdrmsdk
WMDRMCreateProvider
Sections
.text Size: 246KB - Virtual size: 246KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE