Static task
static1
Behavioral task
behavioral1
Sample
15fdc88a136b97ed500ed90ba8ce1a63e22b32eb0d9dfcb4f1c307995ed8c4e4.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
15fdc88a136b97ed500ed90ba8ce1a63e22b32eb0d9dfcb4f1c307995ed8c4e4.exe
Resource
win10v2004-20220812-en
General
-
Target
15fdc88a136b97ed500ed90ba8ce1a63e22b32eb0d9dfcb4f1c307995ed8c4e4
-
Size
73KB
-
MD5
3c984af3fde366635cc2128c17c4d894
-
SHA1
3ad731bba61f6ffca0e3687f72109027c173307f
-
SHA256
15fdc88a136b97ed500ed90ba8ce1a63e22b32eb0d9dfcb4f1c307995ed8c4e4
-
SHA512
0e80d3acf51815b6bf3f479a2ee0a4be6eaadbea8760f50b8afa00f10dad51f106489e68c5e88d343dc37fe95ddd5de8a374d0d2432d869f681aa42f8620d890
-
SSDEEP
1536:SIucj5vFocRzQ6aOSsqIBhYhoY0++Y0Gj3gA46aFfspOeCI23Pc66BzisKldR:SIrXrOkY0++Y0Gj3gekLlI230rB4V
Malware Config
Signatures
Files
-
15fdc88a136b97ed500ed90ba8ce1a63e22b32eb0d9dfcb4f1c307995ed8c4e4.exe windows x86
a2a85eae711b6059f3d733d11cfd2fc7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
version
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
kernel32
GetDateFormatW
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
WritePrivateProfileStringW
GetPrivateProfileStringW
Sleep
SetLastError
LocalFree
GetStartupInfoW
CreateProcessW
GetModuleHandleW
lstrcatW
CreateDirectoryW
GetTimeFormatW
SetFileAttributesW
GetFileAttributesW
ReadFile
GetFileSize
LoadLibraryA
GetTickCount
CreateFileA
lstrcpyW
InitializeCriticalSection
MoveFileW
GetVersionExW
GetCurrentProcess
GetCurrentProcessId
OpenProcess
SetProcessWorkingSetSize
LoadLibraryExW
FindFirstFileW
FindNextFileW
FindClose
DeleteFileW
OpenEventW
FileTimeToSystemTime
DeviceIoControl
CreateFileW
GetVolumeInformationW
lstrlenW
CloseHandle
GetLastError
SetEvent
ResumeThread
SuspendThread
CreateEventW
ResetEvent
WaitForMultipleObjects
WaitForSingleObject
GetLocalTime
SystemTimeToFileTime
GetModuleFileNameW
GetPrivateProfileIntW
lstrcpynW
LoadLibraryW
GetProcAddress
GetSystemTimeAsFileTime
FreeLibrary
ExitProcess
GetModuleHandleA
QueryPerformanceCounter
GetCurrentThreadId
user32
RegisterDeviceNotificationW
UnregisterDeviceNotification
LoadStringW
advapi32
OpenSCManagerW
RegConnectRegistryW
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
OpenServiceW
CloseServiceHandle
QueryServiceStatus
DuplicateTokenEx
GetSecurityInfo
GetSecurityDescriptorDacl
GetUserNameW
BuildExplicitAccessWithNameW
SetEntriesInAclW
SetSecurityInfo
SetTokenInformation
CreateProcessAsUserW
OpenProcessToken
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
StartServiceCtrlDispatcherW
RegisterServiceCtrlHandlerExW
SetServiceStatus
msvcr71
_amsg_exit
wcscat
_controlfp
?terminate@@YAXXZ
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
wcslen
_waccess
_except_handler3
swscanf
wcsrchr
memset
_beginthreadex
??1exception@@UAE@XZ
??0exception@@QAE@XZ
__CxxFrameHandler
??3@YAXPAX@Z
??0exception@@QAE@ABV0@@Z
_CxxThrowException
??2@YAPAXI@Z
memmove
free
malloc
_snwprintf
wcsncpy
memcpy
memcmp
_wcsicmp
wcschr
wcscpy
wcsncat
wcstok
wcscmp
mbstowcs
strlen
swprintf
_wsplitpath
fread
fseek
fclose
fwrite
_wfopen
fflush
fwprintf
fprintf
vswprintf
__p___initenv
wcsstr
_wcsupr
wcsncmp
strcat
strcpy
_errno
calloc
realloc
_read
_lseek
_filelength
_close
_wsopen
strtoul
__security_error_handler
??1type_info@@UAE@XZ
__dllonexit
_onexit
_c_exit
_exit
_XcptFilter
_cexit
exit
__getmainargs
msvcp71
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
Sections
.text Size: 50KB - Virtual size: 50KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE