Static task
static1
Behavioral task
behavioral1
Sample
b0d64a285d5629266843048d9fc4e2a24fd6885a05f83e436250c091e7f2eb6b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b0d64a285d5629266843048d9fc4e2a24fd6885a05f83e436250c091e7f2eb6b.exe
Resource
win10v2004-20220901-en
General
-
Target
b0d64a285d5629266843048d9fc4e2a24fd6885a05f83e436250c091e7f2eb6b
-
Size
541KB
-
MD5
6ecb069e6166ea97f0b1ca204b5c01b0
-
SHA1
c26374fa448c59a659b87d8151e4bc8e49d6836f
-
SHA256
b0d64a285d5629266843048d9fc4e2a24fd6885a05f83e436250c091e7f2eb6b
-
SHA512
0a746a583682428bc27e101b872bb1bf84ea9f93547747b49fa271e1928d2e37179d6ebdc388939df11ef331ec70a66e37206450b41c2015f376c4b6600be959
-
SSDEEP
12288:XzVdx9JJKlUuA83Q/u6icDHiGqyJ6YcbYaIeqrP:DbxtxubQ/u6zifyJiYX
Malware Config
Signatures
Files
-
b0d64a285d5629266843048d9fc4e2a24fd6885a05f83e436250c091e7f2eb6b.exe windows x64
9907940f06a65ecd89d0e74470b74572
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
advapi32
RegCloseKey
RegEnumKeyExW
RegDeleteValueW
RegCreateKeyExW
RegDeleteKeyExW
RegOpenKeyExW
RegQueryValueExW
RegSetValueExW
kernel32
GetPrivateProfileStringW
FormatMessageW
ReadFile
CreateActCtxW
ReleaseActCtx
ActivateActCtx
DeactivateActCtx
GetFileSizeEx
GetModuleFileNameW
SetFilePointerEx
OpenProcess
ReadProcessMemory
HeapSetInformation
GetProcAddress
GetModuleHandleW
lstrlenA
Sleep
GetStartupInfoW
SetUnhandledExceptionFilter
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
WideCharToMultiByte
GetLastError
FreeLibrary
LoadLibraryW
LocalFree
GlobalAlloc
CreateFileW
MultiByteToWideChar
lstrlenW
GlobalFree
CloseHandle
GlobalReAlloc
CompareStringW
msvcrt
__argc
__getmainargs
__C_specific_handler
_XcptFilter
_exit
_ismbblead
_cexit
exit
_acmdln
_initterm
_amsg_exit
__setusermatherr
_commode
_fmode
__set_app_type
?terminate@@YAXXZ
__argv
memcpy
ntdll
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
ord2
RtlFreeHeap
NtQueryInformationProcess
RtlAllocateHeap
_vsnwprintf
atol
ord1
memset
rtutils
TracePrintfExA
TraceRegisterExA
TraceDeregisterExA
user32
LoadStringW
CharPrevW
CharNextW
MessageBoxW
Sections
.text Size: 35KB - Virtual size: 34KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 1024B - Virtual size: 984B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 150B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.vmp0 Size: 500KB - Virtual size: 1.8MB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE