Static task
static1
Behavioral task
behavioral1
Sample
d5e693251a33fa880d6a01627de847d14ad14bfa0539d2d0408857e13a2f052f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d5e693251a33fa880d6a01627de847d14ad14bfa0539d2d0408857e13a2f052f.exe
Resource
win10v2004-20220812-en
General
-
Target
d5e693251a33fa880d6a01627de847d14ad14bfa0539d2d0408857e13a2f052f
-
Size
103KB
-
MD5
61653711abdb7e57c789e33271649386
-
SHA1
31cb434c0e95434f34b4d9bd5ed11cb3e0e5ae35
-
SHA256
d5e693251a33fa880d6a01627de847d14ad14bfa0539d2d0408857e13a2f052f
-
SHA512
0ac02098c481019a040550b84497ef7a40615c207f87eda5c02fcc0c46cdbf53e9e757dc469f9128a4f5223199bf7519c75d683dd5fc3b31c59a7fd7dfe8025c
-
SSDEEP
3072:g3/YQ/qsOgaAdvTAJ5B5UHco/4OqRF+0a8cUyzXW1YbTbN9oc74rJ2kUsbC:aYInd2i660o+YZ9xUcp
Malware Config
Signatures
Files
-
d5e693251a33fa880d6a01627de847d14ad14bfa0539d2d0408857e13a2f052f.exe windows x86
47f836a123f19be3fe0a5ce54317b2c4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ExpandEnvironmentStringsW
DecodePointer
GetVersionExA
HeapSize
GetLastError
InterlockedExchange
Sleep
InterlockedCompareExchange
GetStartupInfoA
SetUnhandledExceptionFilter
GetModuleHandleA
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetProcessHeap
HeapFree
VirtualQuery
MapViewOfFile
CreateFileMappingW
GetFileSize
UnmapViewOfFile
TlsAlloc
GetLocalTime
TlsSetValue
HeapReAlloc
HeapAlloc
TlsGetValue
GetTempFileNameW
GetWindowsDirectoryW
GetFileAttributesW
GetTempPathW
SetLastError
LocalFree
FormatMessageW
RaiseException
ExitProcess
TlsFree
GetWindowsDirectoryA
CloseHandle
GetCurrentThread
ReleaseMutex
WaitForSingleObject
SetFilePointer
WriteFile
GetModuleFileNameA
CreateMutexW
CreateFileW
GetModuleFileNameW
DeleteFileW
GetVersion
GetSystemInfo
CreateMutexA
CreateFileMappingA
CreateFileA
DeleteFileA
LoadLibraryA
ExpandEnvironmentStringsA
GetProcAddress
GetModuleHandleW
GetFileSizeEx
FlushFileBuffers
WideCharToMultiByte
MultiByteToWideChar
OutputDebugStringA
IsDebuggerPresent
HeapCreate
HeapDestroy
DeviceIoControl
LocalAlloc
GetEnvironmentVariableW
CompareStringW
GetCommandLineW
IsWow64Process
EncodePointer
msvcrt
??1type_info@@UAE@XZ
malloc
towlower
free
_onexit
_lock
__dllonexit
_unlock
_controlfp
_except_handler4_common
?terminate@@YAXXZ
__set_app_type
__p__fmode
__p__commode
__setusermatherr
_amsg_exit
_initterm
_acmdln
exit
_ismbblead
_XcptFilter
_exit
_cexit
__getmainargs
_wcsnicmp
_wfopen
fgetws
feof
fclose
wcstok
_wtoi
swscanf_s
iswctype
_wcsicmp
memcpy
_purecall
wcsrchr
??2@YAPAXI@Z
__CxxFrameHandler3
memset
??3@YAXPAX@Z
_vsnwprintf
_vsnprintf
advapi32
RegQueryValueExW
RegCreateKeyExW
RegSetValueExW
RegDeleteValueW
RegCloseKey
InitializeSecurityDescriptor
OpenThreadToken
GetTokenInformation
GetLengthSid
InitializeAcl
AddAccessAllowedAce
EqualSid
SetSecurityDescriptorDacl
OpenProcessToken
LookupPrivilegeValueW
AdjustTokenPrivileges
AllocateAndInitializeSid
CheckTokenMembership
FreeSid
RegOpenKeyW
shell32
CommandLineToArgvW
ord165
dbghelp
MiniDumpWriteDump
oleaut32
VariantTimeToSystemTime
SystemTimeToVariantTime
user32
UnregisterClassA
Sections
.text Size: 57KB - Virtual size: 57KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 32KB - Virtual size: 33KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE