Static task
static1
Behavioral task
behavioral1
Sample
4d28a8611da16ea1cc64bb59d076f002d737f5e1135a5ffa7e228a07e4247759.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4d28a8611da16ea1cc64bb59d076f002d737f5e1135a5ffa7e228a07e4247759.exe
Resource
win10v2004-20220812-en
General
-
Target
4d28a8611da16ea1cc64bb59d076f002d737f5e1135a5ffa7e228a07e4247759
-
Size
109KB
-
MD5
305205c9003acb9b185cd2da4279cbd0
-
SHA1
d5888fbc9401dbbfac9cba2e559cb17c920e3b8a
-
SHA256
4d28a8611da16ea1cc64bb59d076f002d737f5e1135a5ffa7e228a07e4247759
-
SHA512
f44ac7fa56a37ad5cf9da1d5dff3b78038f903bcd533b7b15a5ac09d9741c8ec655c3f4ea52703a27bbafb15923169aa70e24951a3650b60027daa951e32b35d
-
SSDEEP
3072:1a6HrbWUAcrrLRGajY/aXmRqMryemdNE:1temrrLR/jYSX67iN
Malware Config
Signatures
Files
-
4d28a8611da16ea1cc64bb59d076f002d737f5e1135a5ffa7e228a07e4247759.exe windows x86
2c0d37183080104989dbbdbb54506093
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ExpandEnvironmentStringsW
GetVersionExA
HeapSize
LoadLibraryW
OpenEventW
FreeLibrary
InterlockedExchange
Sleep
InterlockedCompareExchange
GetStartupInfoA
SetUnhandledExceptionFilter
GetModuleHandleA
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetProcessHeap
HeapFree
VirtualQuery
CreateFileMappingW
GetFileSize
UnmapViewOfFile
TlsAlloc
GetLocalTime
TlsSetValue
HeapReAlloc
HeapAlloc
TlsGetValue
GetTempFileNameW
GetWindowsDirectoryW
GetFileAttributesW
GetTempPathW
SetLastError
FormatMessageW
RaiseException
ExitProcess
TlsFree
GetWindowsDirectoryA
CloseHandle
GetCurrentThread
ReleaseMutex
WaitForSingleObject
SetFilePointer
WriteFile
GetModuleFileNameA
CreateMutexW
CreateFileW
GetModuleFileNameW
DeleteFileW
GetVersion
GetSystemInfo
CreateMutexA
CreateFileMappingA
CreateFileA
DeleteFileA
LoadLibraryA
ExpandEnvironmentStringsA
GetProcAddress
GetModuleHandleW
GetFileSizeEx
FlushFileBuffers
WideCharToMultiByte
MultiByteToWideChar
OutputDebugStringA
IsDebuggerPresent
HeapCreate
HeapDestroy
DeviceIoControl
LocalAlloc
GetEnvironmentVariableW
IsWow64Process
EncodePointer
DecodePointer
GetLastError
GetCommandLineW
MapViewOfFile
LocalFree
msvcrt
wcsrchr
??2@YAPAXI@Z
memset
??3@YAXPAX@Z
_vsnwprintf
_vsnprintf
__getmainargs
??1type_info@@UAE@XZ
_onexit
_lock
__dllonexit
_unlock
_controlfp
_except_handler4_common
?terminate@@YAXXZ
__set_app_type
__p__fmode
__p__commode
__setusermatherr
_amsg_exit
_initterm
_acmdln
exit
_ismbblead
_XcptFilter
_exit
_cexit
__CxxFrameHandler3
_wcsicmp
wcschr
malloc
towlower
free
_wcsnicmp
_wfopen
fgetws
feof
fclose
wcstok
_wtoi
swscanf_s
iswctype
memcpy
_purecall
shell32
SHGetFolderPathW
ord165
CommandLineToArgvW
advapi32
RegQueryValueExW
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
InitializeSecurityDescriptor
OpenThreadToken
GetTokenInformation
GetLengthSid
InitializeAcl
AddAccessAllowedAce
EqualSid
SetSecurityDescriptorDacl
OpenProcessToken
AllocateAndInitializeSid
CheckTokenMembership
FreeSid
RegOpenKeyExW
dbghelp
MiniDumpWriteDump
oleaut32
VariantTimeToSystemTime
SystemTimeToVariantTime
ole32
CoInitializeEx
CoUninitialize
user32
UnregisterClassA
GetSystemMetrics
Sections
.text Size: 63KB - Virtual size: 63KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 32KB - Virtual size: 33KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
minmlyz Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE