Static task
static1
Behavioral task
behavioral1
Sample
1bec72eb4b9f6926521b20819cc28897d3669c288925c6711ac6f543484f335a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1bec72eb4b9f6926521b20819cc28897d3669c288925c6711ac6f543484f335a.exe
Resource
win10v2004-20220901-en
General
-
Target
1bec72eb4b9f6926521b20819cc28897d3669c288925c6711ac6f543484f335a
-
Size
608KB
-
MD5
6fb8d37332ec47a7a03f019006b5b0d6
-
SHA1
ea633a1e4be221f0cfa137a493f3c34aa4c25a97
-
SHA256
1bec72eb4b9f6926521b20819cc28897d3669c288925c6711ac6f543484f335a
-
SHA512
0fb8a7566270b8ad88419a15c25880cb7ebf840071cb4cc62ab97a6f52ad70f5042b703b6f28f77e3c7c470f665298765db73443f4c9f26181793317aaaa77df
-
SSDEEP
6144:5dIljJ2M4qdiG6wKt6wVXHgQ3Zcfhfi4Che+/xmbas2E++P0PzJCwF4PimfhRPv8:byV6wKtVXHl0h64Clxmbas2JG7hGd
Malware Config
Signatures
Files
-
1bec72eb4b9f6926521b20819cc28897d3669c288925c6711ac6f543484f335a.exe windows x86
73d5b99581b661c396f26b1627af4eca
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntdll
_wcsicmp
_wcsupr
_allmul
_alldiv
NtDelayExecution
_stricmp
atoi
NtTerminateProcess
RtlUnhandledExceptionFilter
RtlUnwind
NtQueryVirtualMemory
DbgBreakPoint
RtlAllocateHeap
RtlUnicodeStringToAnsiString
RtlNormalizeProcessParams
wcslen
isprint
swprintf
RtlOemToUnicodeN
RtlMultiByteToUnicodeN
RtlUnicodeToOemN
RtlUnicodeToMultiByteN
sprintf
memmove
_wcslwr
wcscmp
_chkstk
RtlFreeUnicodeString
RtlDosPathNameToNtPathName_U
NtClose
NtShutdownSystem
NtAdjustPrivilegesToken
NtOpenProcessToken
NtQuerySystemTime
NtQuerySystemInformation
NtQuerySymbolicLinkObject
NtOpenSymbolicLinkObject
RtlInitUnicodeString
NtSetInformationFile
NtQueryInformationFile
NtOpenFile
NtWriteFile
NtCreateFile
NtFsControlFile
RtlValidRelativeSecurityDescriptor
RtlExpandEnvironmentStrings_U
NtSetThreadExecutionState
NtReadFile
NtDeviceIoControlFile
NtQueryVolumeInformationFile
NtDisplayString
NtWaitForMultipleObjects
NtCreateEvent
_aulldiv
RtlFreeHeap
RtlSizeHeap
RtlFormatMessage
RtlAnsiStringToUnicodeString
RtlInitAnsiString
RtlFindMessage
wcscpy
wcsncmp
RtlQueryRegistryValues
RtlWriteRegistryValue
RtlSubAuthoritySid
RtlInitializeSid
RtlLengthRequiredSid
RtlAddAce
RtlCopySid
RtlLengthSid
RtlQueryInformationAcl
RtlCreateAcl
RtlAddAccessAllowedAce
RtlLengthSecurityDescriptor
RtlValidSecurityDescriptor
RtlNewSecurityObject
RtlSetDaclSecurityDescriptor
RtlSetGroupSecurityDescriptor
RtlCreateSecurityDescriptor
RtlTimeToTimeFields
RtlSystemTimeToLocalTime
NtSetVolumeInformationFile
RtlPrefixUnicodeString
NtQueryValueKey
NtOpenKey
_allrem
RtlDecompressBuffer
RtlUpcaseUnicodeString
RtlRaiseStatus
NtTerminateThread
NtSetEvent
NtWaitForSingleObject
NtQueryInformationThread
RtlCreateUserThread
RtlComputeCrc32
DbgPrint
RtlDeleteElementGenericTable
RtlFindSetBits
RtlClearBits
RtlInitializeBitMap
RtlLookupElementGenericTable
RtlNumberOfSetBits
RtlEnumerateGenericTableWithoutSplaying
RtlSetBits
RtlInsertElementGenericTable
RtlInitializeGenericTable
NtQueryPerformanceCounter
Sections
.text Size: 358KB - Virtual size: 358KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 200KB - Virtual size: 200KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.tdata Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE