Static task
static1
Behavioral task
behavioral1
Sample
df858845323da7d4ff2d53c050664f03eec4d6a0ce55d13f3dfba99ed4dd0ed1.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
df858845323da7d4ff2d53c050664f03eec4d6a0ce55d13f3dfba99ed4dd0ed1.exe
Resource
win10v2004-20220812-en
General
-
Target
df858845323da7d4ff2d53c050664f03eec4d6a0ce55d13f3dfba99ed4dd0ed1
-
Size
89KB
-
MD5
44118557e240f59b1b7610b0db077cf0
-
SHA1
df20b789e0961df2ba74b88550db0f6dd649b80b
-
SHA256
df858845323da7d4ff2d53c050664f03eec4d6a0ce55d13f3dfba99ed4dd0ed1
-
SHA512
6e361e79527b7ee05c1c17c1898ee2f0f1ec2c53b1a1608822c73e4cca3b1323345f83d99e4c2b570e0697e21f054fd496d5b1398d35dc04ad99ad1d000c37c1
-
SSDEEP
1536:pP1U7dszsPpjA5NsxewhiJ5PJwh5GWYaM7PEqwqXWT3sMltrxUdXbnPhh:kJcsPpjA7shg5Wh5G77PEqwqXWTsMfrK
Malware Config
Signatures
Files
-
df858845323da7d4ff2d53c050664f03eec4d6a0ce55d13f3dfba99ed4dd0ed1.exe windows x86
01c0bf8052a9e6acd77eee3947d76647
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapDestroy
HeapCreate
DeviceIoControl
GetCommandLineW
GetEnvironmentVariableW
CompareStringW
ExpandEnvironmentStringsW
IsWow64Process
EncodePointer
DecodePointer
HeapSize
GetLastError
Sleep
InterlockedExchange
InterlockedCompareExchange
GetStartupInfoA
SetUnhandledExceptionFilter
GetModuleHandleA
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
GetTickCount
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
ExitProcess
GetTempFileNameW
HeapReAlloc
GetFileSize
TlsGetValue
MapViewOfFile
UnmapViewOfFile
VirtualQuery
HeapAlloc
HeapFree
GetProcessHeap
GetWindowsDirectoryA
InitializeCriticalSection
TlsSetValue
FormatMessageW
LeaveCriticalSection
GetFileAttributesW
GetTempPathW
RaiseException
SetLastError
EnterCriticalSection
GetLocalTime
CreateFileMappingW
DeleteCriticalSection
TlsAlloc
GetWindowsDirectoryW
LocalFree
TlsFree
CloseHandle
CreateFileA
CreateMutexW
SetFilePointer
WaitForSingleObject
GetModuleHandleW
GetCurrentThread
ExpandEnvironmentStringsA
WriteFile
GetModuleFileNameW
CreateFileW
GetProcAddress
LoadLibraryA
CreateFileMappingA
GetSystemInfo
GetModuleFileNameA
CreateMutexA
ReleaseMutex
GetVersion
DeleteFileW
DebugBreak
DeleteFileA
GetFileSizeEx
WideCharToMultiByte
MultiByteToWideChar
FlushFileBuffers
IsDebuggerPresent
OutputDebugStringA
msvcrt
_vsnwprintf
_vsnprintf
??3@YAXPAX@Z
??2@YAPAXI@Z
_purecall
_wcsicmp
_wcsnicmp
iswctype
feof
_wtoi
_wfopen
fgetws
__p__fmode
wcstok_s
wcsrchr
towlower
free
malloc
??1type_info@@UAE@XZ
_ismbblead
__setusermatherr
_initterm
fclose
_cexit
_acmdln
?terminate@@YAXXZ
_controlfp
_except_handler4_common
_lock
_unlock
__dllonexit
_onexit
swscanf_s
_exit
exit
__set_app_type
__getmainargs
_amsg_exit
__p__commode
_XcptFilter
memset
__CxxFrameHandler3
memcpy
advapi32
RegQueryValueExW
RegSetValueExW
RegCloseKey
RegDeleteValueW
RegCreateKeyExW
GetLengthSid
AddAccessAllowedAce
InitializeAcl
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
EqualSid
GetTokenInformation
OpenThreadToken
AdjustTokenPrivileges
LookupPrivilegeValueW
OpenProcessToken
CheckTokenMembership
FreeSid
AllocateAndInitializeSid
RegOpenKeyW
shell32
CommandLineToArgvW
ord165
dbghelp
MiniDumpWriteDump
oleaut32
VariantTimeToSystemTime
SystemTimeToVariantTime
user32
UnregisterClassA
Sections
.text Size: 49KB - Virtual size: 49KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 10KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 21KB - Virtual size: 24KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE