Static task
static1
Behavioral task
behavioral1
Sample
46f4cc446a1457b8c0f43bf1cda84c60efaaf86ef2e3d5c6df8c3260a798fb28.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
46f4cc446a1457b8c0f43bf1cda84c60efaaf86ef2e3d5c6df8c3260a798fb28.exe
Resource
win10v2004-20220812-en
General
-
Target
46f4cc446a1457b8c0f43bf1cda84c60efaaf86ef2e3d5c6df8c3260a798fb28
-
Size
196KB
-
MD5
4b5a5c1e30031a39ab6f7cc2ed50a190
-
SHA1
9133902669506454423d9a4068c60b4cebbee4dc
-
SHA256
46f4cc446a1457b8c0f43bf1cda84c60efaaf86ef2e3d5c6df8c3260a798fb28
-
SHA512
85f53cc67135251259bc4b405d38ca348e2fc2d878677b981b76dd72d05f52abc308efe7f749da5facb72b27a727dcdb9fa644b4cabf3c0c627474a88228488e
-
SSDEEP
3072:aM65zTN7RH9AvfD3fpp0dL5qxpubZyejITv9fXFg1:1mTNJ0fD3Bp0dLiobP+v9fVa
Malware Config
Signatures
Files
-
46f4cc446a1457b8c0f43bf1cda84c60efaaf86ef2e3d5c6df8c3260a798fb28.exe windows x86
559ea2d92c5991a634b8d2ac3b9a7cef
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
PathFileExistsA
PathQuoteSpacesA
PathUnquoteSpacesA
PathAppendA
PathRemoveArgsA
StrRChrA
kernel32
SetEvent
GetTickCount
IsBadReadPtr
ExpandEnvironmentStringsA
GetWindowsDirectoryA
WriteFile
InitializeCriticalSection
OpenProcess
FindResourceExA
WideCharToMultiByte
GetVolumeInformationA
Sleep
SizeofResource
CreateEventA
LeaveCriticalSection
GetFileAttributesA
GetExitCodeProcess
CreateProcessA
TerminateProcess
IsDBCSLeadByte
ReadFile
GetSystemDirectoryA
GetEnvironmentVariableA
MultiByteToWideChar
lstrlenW
RaiseException
GetShortPathNameA
FindFirstFileA
GetLastError
lstrcmpiA
GetProcAddress
EnterCriticalSection
GetTempFileNameA
FindClose
LoadLibraryA
GetProcessId
CreateFileMappingA
GetExitCodeThread
WaitForSingleObject
CreateEventW
GetModuleFileNameA
FindNextFileA
GetModuleHandleA
LoadLibraryExA
VirtualProtect
OpenEventW
DeleteCriticalSection
GetCurrentThreadId
DuplicateHandle
GetVersionExA
CloseHandle
GetTempPathA
GetSystemTime
DeleteFileA
lstrcpyA
WriteConsoleA
SetStdHandle
GetConsoleMode
GetConsoleCP
GetCurrentProcess
InterlockedDecrement
InterlockedIncrement
LoadResource
FreeLibrary
lstrcpynA
MapViewOfFile
lstrlenA
lstrcmpA
GetProcessHeap
FindResourceA
GetFileSize
CreateFileA
GetComputerNameA
ExitProcess
GetConsoleOutputCP
WriteConsoleW
FlushFileBuffers
SetFilePointer
GetLocaleInfoA
RtlUnwind
InitializeCriticalSectionAndSpinCount
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
GetFileType
LockResource
HeapFree
HeapAlloc
VirtualAlloc
GetModuleHandleW
GetSystemInfo
VirtualQuery
GetCommandLineA
GetStartupInfoA
HeapCreate
HeapDestroy
VirtualFree
HeapReAlloc
GetStdHandle
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
LCMapStringA
LCMapStringW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetStringTypeA
GetStringTypeW
HeapSize
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
user32
PostMessageA
GetMessageA
CharNextA
DefWindowProcA
advapi32
StartServiceA
CloseServiceHandle
RegCloseKey
GetUserNameA
QueryServiceConfigA
OpenSCManagerA
QueryServiceStatusEx
RegDeleteValueA
RegQueryInfoKeyA
RegOpenKeyExA
RegCreateKeyExA
RegEnumKeyExA
RegDeleteKeyA
EnumServicesStatusExA
CreateServiceA
RegSetValueExA
GetTokenInformation
OpenProcessToken
OpenServiceA
shell32
ShellExecuteA
SHGetSpecialFolderPathA
ShellExecuteExA
ole32
CoTaskMemAlloc
CoTaskMemFree
CoCreateGuid
CoCreateInstance
CoTaskMemRealloc
StringFromGUID2
CoInitialize
oleaut32
VarUI4FromStr
comctl32
InitCommonControlsEx
Sections
.rdata Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 172KB - Virtual size: 179KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ