Static task
static1
Behavioral task
behavioral1
Sample
f08758c6ba9c15032e653bf3c11c9af92eea6ad6aea7c83c1875be51df3e0344.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
f08758c6ba9c15032e653bf3c11c9af92eea6ad6aea7c83c1875be51df3e0344.exe
Resource
win10v2004-20220812-en
General
-
Target
f08758c6ba9c15032e653bf3c11c9af92eea6ad6aea7c83c1875be51df3e0344
-
Size
572KB
-
MD5
656474b4bcb41638d128f619d3e2a340
-
SHA1
bb548672c6ebc149395cb2c8e986c4b653eccd9d
-
SHA256
f08758c6ba9c15032e653bf3c11c9af92eea6ad6aea7c83c1875be51df3e0344
-
SHA512
b043a65f0c606fce2490b9ba8989e92049cf15060a9668c058b015cacb9286f232fa44f9599f4dbc49abeceac993a8626b6f4d7dec67fe3828441233aea4eaa7
-
SSDEEP
12288:jKeHMhdMfyPqnHXyHhfqDe93qajRvNVQHNA:jKoryPqn3A3xqaPVINA
Malware Config
Signatures
Files
-
f08758c6ba9c15032e653bf3c11c9af92eea6ad6aea7c83c1875be51df3e0344.exe windows x64
29fc6a4e180e7e4c1136d026df92a968
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
advapi32
RegQueryValueExW
RegOpenKeyW
RegConnectRegistryW
RegCloseKey
RegCreateKeyExW
RegQueryInfoKeyW
RegEnumValueW
RegOpenKeyExW
RegEnumKeyExW
RegSetValueExW
OpenProcessToken
RegRestoreKeyW
RegSaveKeyW
LookupPrivilegeValueW
RegSaveKeyExW
AdjustTokenPrivileges
RegLoadKeyW
RegUnLoadKeyW
RegGetValueW
RegDeleteKeyExW
RegDeleteValueW
RegEnumKeyW
RegSetValueExA
RegSetValueW
RegFlushKey
kernel32
GetTempFileNameW
GetTempPathW
GetLastError
SetLastError
DeleteFileW
LocalFree
GetCurrentProcess
CopyFileW
CloseHandle
CreateFileW
GetFileSize
SearchPathW
SetFilePointer
OutputDebugStringW
WriteFile
WideCharToMultiByte
LocalReAlloc
ReadFile
lstrcmpW
MultiByteToWideChar
lstrlenW
LocalAlloc
GetFileType
HeapSize
GetThreadLocale
GetStdHandle
GetConsoleOutputCP
CompareStringW
WriteConsoleW
HeapValidate
FormatMessageW
GetConsoleMode
SetThreadUILanguage
GetProcessHeap
HeapFree
HeapAlloc
HeapReAlloc
ExitProcess
UnhandledExceptionFilter
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
GetModuleHandleW
SetUnhandledExceptionFilter
Sleep
msvcrt
wcstol
fprintf
_fileno
_memicmp
_get_osfhandle
?terminate@@YAXXZ
__set_app_type
_commode
__setusermatherr
_amsg_exit
_initterm
exit
_cexit
_exit
_XcptFilter
__C_specific_handler
__wgetmainargs
_vsnwprintf
_resetstkoflw
fgetwc
fflush
__iob_func
_fmode
wcstoul
_errno
memset
ntdll
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
NtSetInformationKey
NtQueryKey
user32
IsCharAlphaNumericW
CharNextW
LoadStringW
CharUpperW
ws2_32
WSACleanup
shlwapi
StrChrIW
StrStrIW
StrDupW
StrChrW
StrToIntW
Sections
.text Size: 66KB - Virtual size: 66KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 258KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 336B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.vmp0 Size: 500KB - Virtual size: 1.8MB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE