Static task
static1
Behavioral task
behavioral1
Sample
555d4bb612e0059f5dfa226d999bacf94ad8deb56449105d4540d46b16c2bc2b.exe
Resource
win7-20220812-en
General
-
Target
555d4bb612e0059f5dfa226d999bacf94ad8deb56449105d4540d46b16c2bc2b
-
Size
361KB
-
MD5
0746386ba2c6041a7c2252d523b399d6
-
SHA1
83a3081851ce40eea922e2f54552998cff3f4b62
-
SHA256
555d4bb612e0059f5dfa226d999bacf94ad8deb56449105d4540d46b16c2bc2b
-
SHA512
05202120d11fb3c2aa0feca2a5d39e82f2d5adea35f270dcd0b63b11226589d7a468c2cfb73892f786ac87b5f481afcb598f7dcddc4ac32243eb5a7a38a4722d
-
SSDEEP
6144:o9IlLJavldjy2mUz8b448dXhuBvi7nqdhLZRJ/AIfkVNh:bLJ6ldG0g8dRAEqdhLZR+ISv
Malware Config
Signatures
Files
-
555d4bb612e0059f5dfa226d999bacf94ad8deb56449105d4540d46b16c2bc2b.exe windows x86
61cd6bc76c16978f64a0940f3cb08891
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
UnmapViewOfFile
MapViewOfFile
CreateMutexA
CreateEventA
SetLastError
InterlockedExchange
LocalAlloc
GetACP
GetCurrentThreadId
OpenProcess
GetCurrentProcess
MoveFileExW
ReadFile
WriteFile
SetFilePointer
FindClose
lstrcpyA
lstrlenA
GetSystemTimeAsFileTime
QueryPerformanceCounter
GetFileSize
SetEndOfFile
CreatePipe
GetCurrentProcessId
GlobalFree
GlobalAlloc
DisconnectNamedPipe
SetNamedPipeHandleState
CancelIo
ConnectNamedPipe
DuplicateHandle
LoadLibraryA
InterlockedIncrement
InterlockedDecrement
InterlockedCompareExchange
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
RtlUnwind
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapFree
GetCommandLineA
GetVersionExA
HeapAlloc
GetProcessHeap
GetStartupInfoA
ExitProcess
ExitThread
CreateThread
LCMapStringA
GetStringTypeA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
HeapSize
GetOEMCP
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
SetHandleCount
GetFileType
GetTickCount
GetLocaleInfoA
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
GetConsoleCP
GetConsoleMode
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
CreateFileA
FlushFileBuffers
GetSystemDirectoryA
GetWindowsDirectoryA
GetModuleFileNameA
GetModuleHandleA
CompareStringA
GetFileTime
FileTimeToSystemTime
SystemTimeToFileTime
CompareFileTime
WaitForMultipleObjects
FindNextChangeNotification
FindCloseChangeNotification
WaitForSingleObject
ReleaseMutex
Sleep
GetLastError
GetLocalTime
SetEvent
CloseHandle
LocalFree
RaiseException
FreeLibrary
advapi32
LookupAccountSidW
SetKernelObjectSecurity
RegDeleteValueA
RegSetValueExA
RegCreateKeyExA
AllocateAndInitializeSid
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
FreeSid
RegOpenKeyExA
RegQueryValueExA
EqualSid
GetAce
AddAce
CopySid
SetServiceStatus
ChangeServiceConfig2W
CloseServiceHandle
OpenServiceW
OpenSCManagerW
QueryServiceStatus
ControlService
RegCloseKey
RegNotifyChangeKeyValue
RegisterServiceCtrlHandlerW
StartServiceCtrlDispatcherW
InitializeAcl
GetAclInformation
GetSecurityDescriptorDacl
GetLengthSid
GetKernelObjectSecurity
ws2_32
WSAStartup
WSACleanup
ole32
CoUninitialize
CoCreateInstance
CoInitialize
StringFromGUID2
oleaut32
VariantClear
SysAllocString
SysFreeString
user32
MessageBoxA
Sections
.text Size: 200KB - Virtual size: 197KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 44KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 8KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.grdata Size: 76KB - Virtual size: 76KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE