Static task
static1
Behavioral task
behavioral1
Sample
508fb25c1715c6c7b6f5d42fce5b27ffdd9916293f6011dca7587b82f0195c0a.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
508fb25c1715c6c7b6f5d42fce5b27ffdd9916293f6011dca7587b82f0195c0a.exe
Resource
win10v2004-20220901-en
General
-
Target
508fb25c1715c6c7b6f5d42fce5b27ffdd9916293f6011dca7587b82f0195c0a
-
Size
255KB
-
MD5
4806864f8e37c84e54e10d1c84af7870
-
SHA1
54836c844668151a1627a7c538061731c60de16e
-
SHA256
508fb25c1715c6c7b6f5d42fce5b27ffdd9916293f6011dca7587b82f0195c0a
-
SHA512
32ae9941ba72f51e25726d307a129361ac26c45ef375c2112e579ae6188d243d3d05cd33c729765ea11e27dc67c5021f19af2d3ff9bde1606494ac73de6094c5
-
SSDEEP
6144:ouykdNuKVTUpY3WTF/ddOjnUdSGJRWGwFUW:orkd00PmTSUd9A
Malware Config
Signatures
Files
-
508fb25c1715c6c7b6f5d42fce5b27ffdd9916293f6011dca7587b82f0195c0a.exe windows x86
a3a1dc43a9b15c7105710be531fd2408
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegCloseKey
RegQueryValueExW
RegSetValueExW
QueryServiceConfigW
RegOpenKeyExW
RegCreateKeyExW
RegEnumKeyExW
CloseServiceHandle
OpenServiceW
EnumServicesStatusW
OpenSCManagerW
ChangeServiceConfigW
RegDeleteValueW
RegEnumValueW
RegQueryInfoKeyW
InitiateShutdownW
AdjustTokenPrivileges
LookupPrivilegeValueW
OpenProcessToken
kernel32
CloseHandle
CreateThread
GlobalFree
GlobalUnlock
FreeResource
GlobalLock
GlobalAlloc
SizeofResource
LockResource
LoadResource
FindResourceW
FlushInstructionCache
GetCurrentProcess
GlobalMemoryStatusEx
GetPhysicallyInstalledSystemMemory
CopyFileW
FindClose
LocalFree
FormatMessageW
CreateSemaphoreW
CompareStringW
GetCommandLineW
GetCurrentThreadId
CreateDirectoryW
SetFileAttributesW
OpenProcess
GetCurrentProcessId
RegisterApplicationRestart
HeapSetInformation
lstrcmpiW
MultiByteToWideChar
WideCharToMultiByte
DeleteFileW
FindFirstFileW
GetSystemInfo
FindNextFileW
GetLastError
QueryDosDeviceW
LocalAlloc
UnhandledExceptionFilter
TerminateProcess
GetSystemTimeAsFileTime
GetTickCount
QueryPerformanceCounter
GetModuleHandleA
SetUnhandledExceptionFilter
GetStartupInfoW
InterlockedCompareExchange
Sleep
InterlockedExchange
VirtualAlloc
VirtualFree
LoadLibraryA
HeapAlloc
GetProcessHeap
HeapFree
GetNativeSystemInfo
MoveFileExW
lstrlenW
ExpandEnvironmentStringsW
GetDateFormatW
GetTimeFormatW
GetModuleHandleW
GetProcAddress
LoadLibraryW
FreeLibrary
gdi32
GetTextMetricsW
GetTextExtentPoint32W
SelectObject
user32
LoadCursorW
GetSystemMetrics
IsWindowEnabled
MessageBoxW
ShowWindow
EndDialog
IsDlgButtonChecked
SetFocus
LoadStringW
SetCursor
CheckDlgButton
GetDlgItemTextW
SetDlgItemInt
SetDlgItemTextW
GetDlgItem
CharNextW
LoadIconW
GetWindowLongW
GetKeyState
GetFocus
GetClientRect
SendMessageW
EnableWindow
IsIconic
FindWindowW
GetLastActivePopup
SetForegroundWindow
SetWindowTextW
SetWindowLongW
GetWindowTextW
GetWindowTextLengthW
GetActiveWindow
ReleaseDC
GetDC
CallWindowProcW
mfc42u
ord1569
ord1131
ord296
ord5208
ord617
ord825
ord4677
ord324
ord3592
ord4419
ord4621
ord4075
ord3074
ord3820
ord3826
ord3825
ord2971
ord3076
ord2980
ord3257
ord3131
ord4459
ord3254
ord3142
ord2977
ord5273
ord2116
ord2438
ord5257
ord1720
ord5059
ord3744
ord6372
ord2047
ord2640
ord4435
ord4831
ord3793
ord5276
ord4347
ord6370
ord5157
ord2377
ord5237
ord4401
ord1767
ord4073
ord6048
ord2506
ord4704
ord4992
ord4847
ord4370
ord5261
ord641
ord4229
ord2293
ord1899
ord4253
ord800
ord861
ord823
ord3332
ord1165
ord540
ord538
ord6024
ord942
ord6665
ord858
ord940
ord922
ord4197
ord4155
ord2606
ord551
ord6278
ord3806
ord535
ord6451
ord2756
ord2757
ord768
ord802
ord4829
ord5283
ord4848
ord4371
ord4942
ord4970
ord4736
ord4899
ord5154
ord5156
ord5155
ord542
ord489
ord2385
ord6563
ord5605
ord4050
ord1771
ord5633
ord4312
ord3087
ord5706
ord4272
ord5679
ord925
ord6919
ord6218
ord2810
ord4124
ord1735
ord6921
ord6868
ord2634
ord1775
ord927
ord6655
ord5947
ord3090
ord4219
ord3093
ord2809
ord1900
ord496
ord4425
ord2046
ord4433
ord5284
ord1768
ord6051
ord2520
ord1683
ord771
ord4254
ord1143
ord5845
ord3470
ord4709
ord4667
ord4269
ord561
ord3733
ord4418
ord4616
ord5710
ord5285
ord5303
ord4692
ord4074
ord5298
ord5296
ord3341
ord2388
ord5193
ord1089
ord3917
ord5727
ord2504
ord2546
ord4480
ord6371
ord815
ord2859
ord2717
ord6211
ord1008
ord4279
ord6279
ord2776
ord2613
msvcrt
_unlock
__dllonexit
_lock
_onexit
_except_handler4_common
_controlfp
??1type_info@@UAE@XZ
?terminate@@YAXXZ
__set_app_type
__p__fmode
__p__commode
__setusermatherr
_amsg_exit
_initterm
_wcmdln
exit
_XcptFilter
_exit
_cexit
__wgetmainargs
_callnewh
iswdigit
wcsrchr
_wtoi
memmove
_wtol
calloc
_snwscanf_s
_wcsupr
strncmp
wcsnlen
wcsncpy_s
swprintf_s
_wcsnicmp
_ftol2_sse
_itow_s
_vsnwprintf
memcpy
wcschr
_ultow_s
wcstoul
wcscat_s
wcscpy_s
__CxxFrameHandler3
_wcsicmp
??0exception@@QAE@XZ
memset
_wcslwr
wcsstr
wcstok
malloc
free
_CxxThrowException
_purecall
??0exception@@QAE@ABV0@@Z
??1exception@@UAE@XZ
?what@exception@@UBEPBDXZ
??0exception@@QAE@ABQBD@Z
memcpy_s
memmove_s
_wcsicoll
atl
ord44
ord35
ord16
ord21
ord18
ord57
ord23
ord17
ord20
ord43
shell32
ShellExecuteW
SHEvaluateSystemCommandTemplate
SHGetSpecialFolderPathW
oleaut32
SysAllocString
VariantChangeType
VariantInit
SysFreeString
VariantClear
ole32
CoUninitialize
CoInitialize
CreateStreamOnHGlobal
CoInitializeEx
CoTaskMemFree
CoCreateInstance
version
GetFileVersionInfoW
GetFileVersionInfoSizeW
VerQueryValueW
ntdll
RtlInitUnicodeString
RtlNtStatusToDosError
WinSqmAddToStream
WinSqmIncrementDWORD
RtlCompareMemory
NtOpenSymbolicLinkObject
NtQuerySymbolicLinkObject
RtlGetVersion
NtResetEvent
NtQueryVolumeInformationFile
NtQueryInformationFile
NtDeleteFile
RtlFreeHeap
RtlAllocateHeap
NtClose
NtWaitForSingleObject
NtDeviceIoControlFile
NtCreateEvent
NtOpenFile
NtQuerySystemInformation
RtlStringFromGUID
RtlFreeUnicodeString
RtlGUIDFromString
NtOpenKey
NtEnumerateKey
NtQueryKey
NtQueryAttributesFile
NtUnloadKey
NtLoadKey
NtAdjustPrivilegesToken
NtOpenProcessToken
NtOpenThreadToken
RtlFreeSid
RtlSetOwnerSecurityDescriptor
RtlLengthSecurityDescriptor
RtlSetDaclSecurityDescriptor
RtlCreateSecurityDescriptor
RtlAddAccessAllowedAceEx
RtlCreateAcl
RtlLengthSid
RtlAllocateAndInitializeSid
NtSetSecurityObject
NtCreateKey
NtDeleteValueKey
NtQueryValueKey
NtSetValueKey
NtSaveKey
NtCreateFile
NtDeleteKey
LdrGetProcedureAddress
RtlInitAnsiString
LdrGetDllHandle
NtAllocateUuids
Sections
.text Size: 143KB - Virtual size: 143KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 74KB - Virtual size: 73KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 36KB - Virtual size: 37KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE