Static task
static1
Behavioral task
behavioral1
Sample
80583fe5c098609c99d56eaf6bbcb3822475297f5e6f85f6d0db4d5d98078764.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
80583fe5c098609c99d56eaf6bbcb3822475297f5e6f85f6d0db4d5d98078764.exe
Resource
win10v2004-20220812-en
General
-
Target
80583fe5c098609c99d56eaf6bbcb3822475297f5e6f85f6d0db4d5d98078764
-
Size
803KB
-
MD5
4658d2d694ffc7d35c90923a05231f60
-
SHA1
c43621be65f25a7594872e03b5f67c00c739e597
-
SHA256
80583fe5c098609c99d56eaf6bbcb3822475297f5e6f85f6d0db4d5d98078764
-
SHA512
ccd08b1073fe4629867287bcb7c4dfa2d16a5e85d05e63e345777ced0c58c2b51d056047694e07cfe3ee7304e7ac573e1dc88dab79e639362cb3267c5aa51620
-
SSDEEP
12288:/uq3TaQ22kKVAy3OdLNKVpQqqQdEtAjnB9iv5yUQaLG+MrBRqN7IWRUskT:2qDVBkKP3ONNK/QqqQawB9ibUR4s5
Malware Config
Signatures
Files
-
80583fe5c098609c99d56eaf6bbcb3822475297f5e6f85f6d0db4d5d98078764.exe windows x64
ad11bd4ece5b8c1c6b17256b291c3295
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
advapi32
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
OpenProcessToken
GetTokenInformation
CreateRestrictedToken
CreateProcessAsUserW
EqualSid
CreateWellKnownSid
LsaOpenPolicy
LsaLookupPrivilegeValue
LsaNtStatusToWinError
LsaClose
CopySid
GetKernelObjectSecurity
GetSecurityDescriptorDacl
SetTokenInformation
GetAclInformation
GetLengthSid
InitializeAcl
AddAccessAllowedAce
GetAce
AddAce
RegDeleteKeyW
RegQueryInfoKeyW
RegEnumKeyExW
RegSetValueExW
RegCreateKeyExW
RegDeleteValueW
RegEnumKeyW
RegEnumValueW
GetSidSubAuthority
GetSidSubAuthorityCount
RegisterTraceGuidsW
GetTraceLoggerHandle
GetTraceEnableLevel
TraceEvent
kernel32
CreateEventW
ResetEvent
CloseHandle
SetEvent
GetFileAttributesExW
FileTimeToSystemTime
RaiseException
MultiByteToWideChar
GetLastError
GetVersionExW
ExitProcess
GetCurrentProcess
GetStartupInfoW
GetCommandLineW
GetModuleFileNameW
GetCurrentProcessId
FreeLibrary
SwitchToThread
LoadLibraryW
GetProcAddress
lstrlenW
GetModuleHandleW
lstrcmpiW
SizeofResource
LoadResource
FindResourceW
LoadLibraryExW
DeleteCriticalSection
InitializeCriticalSection
HeapSetInformation
IsDebuggerPresent
OpenEventW
LocalFree
FormatMessageW
ReleaseActCtx
CreateActCtxW
ActivateActCtx
DeactivateActCtx
TerminateProcess
CreateTimerQueueTimer
FindFirstFileW
FindClose
OpenProcess
LocalAlloc
OutputDebugStringW
GetTempPathW
GetTempFileNameW
CreateFileW
WriteFile
GetNativeSystemInfo
GetEnvironmentVariableW
CreateProcessW
WaitForSingleObject
GetExitCodeProcess
GetSystemDefaultUILanguage
SearchPathW
UnmapViewOfFile
CreateFileMappingW
MapViewOfFile
FindResourceExW
GetProcessHeap
FlushFileBuffers
CreateFileA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
GetLocaleInfoW
GetConsoleMode
GetConsoleCP
SetFilePointer
GetLocaleInfoA
GetUserDefaultUILanguage
GetStringTypeW
GetStringTypeA
InitializeCriticalSectionAndSpinCount
LoadLibraryA
LCMapStringW
LCMapStringA
HeapSize
HeapReAlloc
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
UnhandledExceptionFilter
EnterCriticalSection
LeaveCriticalSection
GetSystemTimeAsFileTime
GetTickCount
QueryPerformanceCounter
HeapDestroy
HeapCreate
FlsAlloc
GetCurrentThreadId
SetLastError
FlsFree
FlsSetValue
FlsGetValue
DecodePointer
EncodePointer
GetFileType
SetHandleCount
GetEnvironmentStringsW
WideCharToMultiByte
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetCommandLineA
GetStartupInfoA
HeapAlloc
HeapFree
SetUnhandledExceptionFilter
Sleep
GetStdHandle
GetModuleFileNameA
user32
PostMessageW
MessageBoxA
PeekMessageW
MsgWaitForMultipleObjects
LoadStringW
DispatchMessageW
TranslateMessage
GetMessageW
CharNextW
WaitForInputIdle
MessageBeep
MessageBoxW
PostQuitMessage
ntdll
RtlInitUnicodeString
RtlUnwindEx
RtlLookupFunctionEntry
RtlCaptureContext
RtlVirtualUnwind
ole32
CoRegisterClassObject
CoReleaseMarshalData
CoTaskMemAlloc
CreateBindCtx
CLSIDFromProgID
CoInitialize
CoUninitialize
StringFromGUID2
CoCreateInstance
CoTaskMemFree
CoRevokeClassObject
CoTaskMemRealloc
CoMarshalInterThreadInterfaceInStream
oleaut32
SysAllocStringLen
SysFreeString
VarUI4FromStr
mscoree
LoadLibraryShim
CoEEShutDownCOM
shlwapi
PathFindExtensionW
AssocQueryStringW
wininet
InternetCrackUrlW
InternetCreateUrlW
urlmon
CreateURLMonikerEx
CoInternetParseUrl
RegisterBindStatusCallback
CoInternetCreateSecurityManager
CoInternetCombineUrl
URLDownloadToCacheFileW
GetClassFileOrMime
shell32
CommandLineToArgvW
ShellExecuteExW
SHGetFolderPathW
ShellExecuteW
Sections
.text Size: 93KB - Virtual size: 93KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 43KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 156KB - Virtual size: 155KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.vmp0 Size: 496KB - Virtual size: 1.8MB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE