Static task
static1
Behavioral task
behavioral1
Sample
c288cdf4f0074aacb2476a8a08cf54b79eb21c753c8ce7eab295abda0ddeb5a7.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c288cdf4f0074aacb2476a8a08cf54b79eb21c753c8ce7eab295abda0ddeb5a7.exe
Resource
win10v2004-20220812-en
General
-
Target
c288cdf4f0074aacb2476a8a08cf54b79eb21c753c8ce7eab295abda0ddeb5a7
-
Size
298KB
-
MD5
49d3b564dd8a1966171cc8bfc2e500f8
-
SHA1
38a8d92ae7541244d04c5964072d70e40c6ed7b2
-
SHA256
c288cdf4f0074aacb2476a8a08cf54b79eb21c753c8ce7eab295abda0ddeb5a7
-
SHA512
f5ed96e16c94d590a4dc826cccdcbe2a894802c042e6cf787e118b5c9c14ec594a9230a262952f0104b91e88c614e1739dc73c41e820bd8b5d1cbcea229a126d
-
SSDEEP
6144:gq+FM0GJ7/ebuwUqXRwWY2O/DHH0b2R3FmFv+fr1zD0S:oFM0GJqbuZqXHY2ODHtRoFv+JMS
Malware Config
Signatures
Files
-
c288cdf4f0074aacb2476a8a08cf54b79eb21c753c8ce7eab295abda0ddeb5a7.exe windows x86
781e3ce84cccd3fda44f4fd279fac377
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
OpenProcessToken
GetTokenInformation
CreateProcessAsUserW
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
LookupPrivilegeValueW
InitializeAcl
AllocateAndInitializeSid
AddAccessAllowedAce
FreeSid
GetLengthSid
AdjustTokenPrivileges
InitiateSystemShutdownExW
kernel32
GetNativeSystemInfo
CreateProcessW
HeapAlloc
GetCurrentProcess
HeapFree
WaitForSingleObject
SetEvent
GetProcessHeap
Sleep
GetVersionExW
GetExitCodeProcess
GetModuleFileNameW
GetLastError
CreateEventW
CloseHandle
GetWindowsDirectoryW
UnregisterWait
FreeLibrary
LoadLibraryW
RegisterWaitForSingleObject
OpenEventW
GetUserDefaultUILanguage
HeapReAlloc
SetFilePointer
HeapSetInformation
WideCharToMultiByte
CreateFileW
lstrlenW
GetTempPathW
GetSystemTime
GetProcAddress
GetModuleHandleW
GetVersion
FlushFileBuffers
WriteConsoleW
SetStdHandle
GetStringTypeW
LCMapStringW
IsProcessorFeaturePresent
HeapSize
MultiByteToWideChar
GetConsoleMode
GetConsoleCP
RtlUnwind
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
EnterCriticalSection
LeaveCriticalSection
IsDebuggerPresent
UnhandledExceptionFilter
TerminateProcess
CompareStringW
WriteFile
GetCommandLineW
GetStartupInfoW
SetUnhandledExceptionFilter
ExitProcess
DecodePointer
GetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
HeapCreate
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
user32
DialogBoxParamW
DispatchMessageW
SetWindowTextW
SendMessageW
SetDlgItemTextW
IsWindow
CreateDialogParamW
DestroyWindow
GetMessageW
PostQuitMessage
LoadImageW
PostMessageW
KillTimer
SetTimer
TranslateMessage
IsDialogMessageW
GetDlgItem
EndDialog
LoadStringW
ShowWindow
wtsapi32
WTSEnumerateSessionsW
WTSFreeMemory
WTSQueryUserToken
userenv
DestroyEnvironmentBlock
CreateEnvironmentBlock
comctl32
InitCommonControlsEx
Sections
.text Size: 49KB - Virtual size: 49KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 48KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.vmp0 Size: 192KB - Virtual size: 1.3MB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE