Static task
static1
Behavioral task
behavioral1
Sample
780ee04d012e22b74801ea969c94084e1a5843d7253891179dd824bea609e2ec.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
780ee04d012e22b74801ea969c94084e1a5843d7253891179dd824bea609e2ec.exe
Resource
win10v2004-20220812-en
General
-
Target
780ee04d012e22b74801ea969c94084e1a5843d7253891179dd824bea609e2ec
-
Size
364KB
-
MD5
52878c64f72aa6dd074a50303cc5bd8b
-
SHA1
8542760dcd47b05c49e615f67972697691d929bf
-
SHA256
780ee04d012e22b74801ea969c94084e1a5843d7253891179dd824bea609e2ec
-
SHA512
ab4cd9d5a66afdd9ce525fd9fdab954502ffe44cb21fe548168030aa093acb7e6b23cec9b311e3d659b11ab6af9d319b4a91f4df8be9d57be0cc4beab921ad28
-
SSDEEP
6144:2KmJ8nXBjkHOx6F4Y7voI0NbdjMSkwb2if1L5kz91xSxCFYd:C2nxaOxGoIWbdjMNwbn9y6sY
Malware Config
Signatures
Files
-
780ee04d012e22b74801ea969c94084e1a5843d7253891179dd824bea609e2ec.exe windows x86
654b46d06b7cec06f4865cec43f5b251
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mssws
GetLengthSid
SetSecurityDescriptorDacl
CopySid
IsValidSid
SetSecurityDescriptorOwner
SetSecurityDescriptorGroup
CharUpperBuffW
RegEnumKeyExW
RegDeleteValueW
RegCreateKeyExW
RegDeleteKeyW
CryptAcquireContextW
RegQueryValueExW
RegEnumValueW
RegOpenKeyExW
GetCommandLineW
FindNextFileW
FindFirstFileW
RemoveDirectoryW
lstrcmpW
GetTokenInformation
LsaStorePrivateData
LsaNtStatusToWinError
LsaRetrievePrivateData
LsaFreeMemory
LsaClose
LsaOpenPolicy
OpenProcessToken
LoadLibraryW
lstrlenW
ImpersonateLoggedOnUser
RevertToSelf
OpenThreadToken
OpenFileMappingW
OpenMutexW
CreateEventW
GetEnvironmentVariableW
SetEnvironmentVariableW
RegSetValueExW
DuplicateToken
CharUpperW
GetComputerNameW
GetModuleHandleW
CoInitializeSecurity
OpenEventW
PeekMessageW
DispatchMessageW
CreateFileW
LogonUserW
DeleteFileW
InterlockedCompareExchange
msvcrt
_controlfp
_onexit
__dllonexit
??1type_info@@UAE@XZ
?terminate@@YAXXZ
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
wcscmp
_wtoi
_itow
_ultow
??2@YAPAXI@Z
_wcsnicmp
wcschr
_wcsicmp
_CxxThrowException
_purecall
free
?_set_se_translator@@YAP6AXIPAU_EXCEPTION_POINTERS@@@ZP6AXI0@Z@Z
??3@YAXPAX@Z
_EH_prolog
__CxxFrameHandler
realloc
malloc
wcscpy
wcsncpy
wcslen
_wtol
iswspace
isalnum
advapi32
CryptGenRandom
CryptDeriveKey
CryptHashData
CryptDestroyHash
CryptCreateHash
RegCloseKey
GetSecurityDescriptorLength
InitializeSecurityDescriptor
CryptDecrypt
CryptEncrypt
CryptDestroyKey
CryptReleaseContext
kernel32
VirtualFree
VirtualAlloc
GetSystemInfo
FindClose
WaitForMultipleObjects
ReleaseMutex
Sleep
UnmapViewOfFile
MapViewOfFile
GetCurrentProcess
GetStartupInfoA
GetModuleHandleA
GetTickCount
GlobalFree
lstrlenA
SetErrorMode
OpenProcess
GetCurrentProcessId
ExitProcess
CreateThread
GetCurrentThread
SetThreadPriority
WriteFile
ExitThread
CompareFileTime
GetSystemTimeAsFileTime
HeapReAlloc
SetEvent
CloseHandle
WaitForSingleObject
GetCurrentThreadId
GetProcAddress
LoadLibraryA
FreeLibrary
GetLastError
WideCharToMultiByte
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
HeapAlloc
GetProcessHeap
HeapFree
GetSystemDefaultLCID
MultiByteToWideChar
IsValidCodePage
SetLastError
InterlockedIncrement
InterlockedDecrement
user32
DefWindowProcA
DestroyWindow
CreateWindowExA
RegisterClassExA
PostQuitMessage
iprop
PropVariantCopy
StgCreatePropSetStg
PropVariantClear
ole32
CoUninitialize
CoTaskMemFree
CoTaskMemAlloc
StgOpenStorage
CoCreateInstance
CLSIDFromString
StringFromCLSID
CLSIDFromProgID
CoTaskMemRealloc
CoInitializeEx
oleaut32
SysFreeString
SysStringLen
GetErrorInfo
Sections
.text Size: 108KB - Virtual size: 106KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
b;Z Size: 244KB - Virtual size: 244KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE