Static task
static1
Behavioral task
behavioral1
Sample
70f1779f106557f095a9bdbb1f007619dc50ef430784c1ec64c93d2d4c31cb2b.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
70f1779f106557f095a9bdbb1f007619dc50ef430784c1ec64c93d2d4c31cb2b.exe
Resource
win10v2004-20220812-en
General
-
Target
70f1779f106557f095a9bdbb1f007619dc50ef430784c1ec64c93d2d4c31cb2b
-
Size
51KB
-
MD5
6157c762247c78f87ea0cd049b660ec0
-
SHA1
7a015750c6ce98b7a542c13f5e6924cd35901951
-
SHA256
70f1779f106557f095a9bdbb1f007619dc50ef430784c1ec64c93d2d4c31cb2b
-
SHA512
c7472c6931ad833ecbdefd2d43ce014e2222cf8673e6ca71f9b1d33b76fa65db265e8582f99b8817ef5822ae374114347e6ab5e56e7b3bec2631fdd773331bb4
-
SSDEEP
1536:xJuB0ODDB0roaLaOPfZ95CHeD7qQgqJC0:xJuB0ODDOrtPfZ90HeXqQgc
Malware Config
Signatures
Files
-
70f1779f106557f095a9bdbb1f007619dc50ef430784c1ec64c93d2d4c31cb2b.exe windows x86
ced5d7f746be0878535b1b0d75d731c6
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
Sleep
OpenEventW
SetEvent
GetCurrentProcessId
GetUserDefaultLangID
GetCurrentProcess
GetSystemDirectoryW
GetFileAttributesExW
lstrcmpiW
FormatMessageW
SetCurrentDirectoryW
CreateThread
SetThreadPriority
GetCurrentThread
lstrcmpW
GetLastError
LocalReAlloc
InterlockedCompareExchange
LoadLibraryA
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetSystemTimeAsFileTime
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
WaitForSingleObject
GetStartupInfoA
GetModuleHandleA
DelayLoadFailureHook
ExpandEnvironmentStringsW
SearchPathW
CloseHandle
CreateProcessW
CompareFileTime
LoadLibraryW
GetProcAddress
FreeLibrary
lstrcpyW
lstrcatW
lstrlenW
SetEnvironmentVariableW
GetEnvironmentVariableW
LocalAlloc
LocalFree
GetVersionExW
GetSystemTime
user32
CreateWindowExW
DestroyWindow
RegisterClassExW
DefWindowProcW
LoadRemoteFonts
wsprintfW
GetSystemMetrics
GetKeyboardLayout
SystemParametersInfoW
GetDesktopWindow
CharNextW
ExitWindowsEx
MessageBoxW
LoadStringW
advapi32
RegOpenKeyExA
GetUserNameW
RegQueryValueExW
RegOpenKeyExW
RegQueryInfoKeyW
RegCloseKey
RegCreateKeyExW
OpenProcessToken
DeregisterEventSource
RegisterEventSourceW
ReportEventW
RegQueryValueExA
RegSetValueExW
crypt32
CryptProtectData
winspool.drv
SpoolerInit
ntdll
RtlConvertSidToUnicodeString
NtClose
RtlLengthSid
RtlCopySid
_itow
RtlFreeUnicodeString
DbgPrint
wcslen
wcscpy
wcscat
wcscmp
_wcsicmp
memmove
RtlInitUnicodeString
NtOpenKey
NtQueryInformationToken
msvcrt
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_c_exit
_exit
_XcptFilter
_cexit
exit
_acmdln
Sections
.text Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 332B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 30KB - Virtual size: 31KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
xhoygxu Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE