Static task
static1
Behavioral task
behavioral1
Sample
4af208a04846b55adc61589b459993b069d4a9ce0c4548cb9c5ca20b76d491d9.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4af208a04846b55adc61589b459993b069d4a9ce0c4548cb9c5ca20b76d491d9.exe
Resource
win10v2004-20220812-en
General
-
Target
4af208a04846b55adc61589b459993b069d4a9ce0c4548cb9c5ca20b76d491d9
-
Size
261KB
-
MD5
426086a4502e5a4f97897798d34128a0
-
SHA1
7f2f2d6f50574a1c850c5241b3dd944e619583b7
-
SHA256
4af208a04846b55adc61589b459993b069d4a9ce0c4548cb9c5ca20b76d491d9
-
SHA512
f26648bb0031254c5babf16e50e1aa69941e30377f926babe98c9ebae79f7c8b2e8864f8980736a1df9b662336618d78be42ad459dc12b656a3de32bde28afea
-
SSDEEP
6144:nNGe7g9M/5KNXwy3Odjp19k5KNXfBFNX:n37gmBKVwy3OdLaKV5j
Malware Config
Signatures
Files
-
4af208a04846b55adc61589b459993b069d4a9ce0c4548cb9c5ca20b76d491d9.exe windows x86
ce31fdfadd787750ba2ab0d470fc5129
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegOpenKeyExW
RegCloseKey
RegQueryValueExW
OpenProcessToken
GetTokenInformation
CreateRestrictedToken
CreateProcessAsUserW
EqualSid
CreateWellKnownSid
LsaOpenPolicy
LsaLookupPrivilegeValue
LsaNtStatusToWinError
LsaClose
CopySid
GetKernelObjectSecurity
GetSecurityDescriptorDacl
SetTokenInformation
GetAclInformation
GetLengthSid
InitializeAcl
AddAccessAllowedAce
GetAce
AddAce
RegQueryInfoKeyW
RegEnumKeyExW
RegSetValueExW
RegCreateKeyExW
RegDeleteValueW
RegisterTraceGuidsW
GetTraceLoggerHandle
GetTraceEnableLevel
TraceEvent
RegEnumKeyW
RegEnumValueW
GetSidSubAuthority
GetSidSubAuthorityCount
kernel32
FreeLibrary
FindFirstFileW
FindClose
GetLastError
GetTempPathW
GetTempFileNameW
CreateFileW
WriteFile
GetVersionExW
GetNativeSystemInfo
CloseHandle
GetEnvironmentVariableW
CreateProcessW
WaitForSingleObject
GetExitCodeProcess
CreateEventW
ResetEvent
SetEvent
GetFileAttributesExW
FileTimeToSystemTime
RaiseException
MultiByteToWideChar
ExitProcess
GetCurrentProcess
GetStartupInfoW
GetCommandLineW
GetModuleFileNameW
GetCurrentProcessId
GetProcAddress
LoadLibraryExW
GetModuleHandleW
lstrcmpiW
SizeofResource
LoadResource
FindResourceExW
DeleteCriticalSection
InitializeCriticalSection
HeapSetInformation
IsDebuggerPresent
OpenEventW
LoadLibraryW
SwitchToThread
LocalFree
FormatMessageW
ReleaseActCtx
CreateActCtxW
ActivateActCtx
DeactivateActCtx
OutputDebugStringW
TerminateProcess
CreateTimerQueueTimer
OpenProcess
LocalAlloc
GetProcessHeap
HeapSize
HeapFree
HeapReAlloc
HeapAlloc
HeapDestroy
Sleep
GetStartupInfoA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetModuleHandleA
QueryPerformanceCounter
GetCurrentThreadId
GetSystemTimeAsFileTime
GetTickCount
OutputDebugStringA
SearchPathW
MapViewOfFile
UnmapViewOfFile
GetSystemDefaultUILanguage
GetLocaleInfoW
SetLastError
CreateFileMappingW
GetUserDefaultUILanguage
user32
DispatchMessageW
MsgWaitForMultipleObjects
LoadStringW
PostMessageW
TranslateMessage
GetMessageW
UnregisterClassA
CharNextW
WaitForInputIdle
MessageBeep
MessageBoxW
PostQuitMessage
PeekMessageW
msvcrt
_callnewh
iswdigit
wcsncmp
memset
memmove_s
_controlfp
?terminate@@YAXXZ
_except_handler4_common
tolower
bsearch
isdigit
_wcsnicmp
wcscat_s
wcscpy_s
memcpy_s
malloc
wcsncpy_s
_wcsicmp
free
realloc
_errno
_onexit
__dllonexit
_unlock
_vsnwprintf
_lock
_acmdln
_initterm
__setusermatherr
_ismbblead
__p__fmode
_cexit
_exit
exit
__set_app_type
__getmainargs
_amsg_exit
__p__commode
_XcptFilter
memcpy
ntdll
RtlInitUnicodeString
ole32
CoRevokeClassObject
CoRegisterClassObject
CoMarshalInterThreadInterfaceInStream
CoReleaseMarshalData
CreateBindCtx
StringFromGUID2
CoUninitialize
CoInitialize
CoTaskMemAlloc
CoTaskMemRealloc
CoTaskMemFree
CoCreateInstance
CLSIDFromProgID
oleaut32
SysAllocStringLen
VarUI4FromStr
SysFreeString
mscoree
CoEEShutDownCOM
LoadLibraryShim
shlwapi
PathFindExtensionW
AssocQueryStringW
wininet
InternetCrackUrlW
InternetCreateUrlW
urlmon
CreateURLMonikerEx
CoInternetParseUrl
RegisterBindStatusCallback
CoInternetCreateSecurityManager
CoInternetCombineUrl
URLDownloadToCacheFileW
GetClassFileOrMime
shell32
ShellExecuteW
SHGetFolderPathW
CommandLineToArgvW
ShellExecuteExW
Sections
.text Size: 65KB - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 155KB - Virtual size: 154KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 34KB - Virtual size: 35KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE