Static task
static1
Behavioral task
behavioral1
Sample
01dc601350ad2d478ff8d01fdf4bd92fda914c06853e334f54432a32d43d2e45.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
01dc601350ad2d478ff8d01fdf4bd92fda914c06853e334f54432a32d43d2e45.exe
Resource
win10v2004-20220901-en
General
-
Target
01dc601350ad2d478ff8d01fdf4bd92fda914c06853e334f54432a32d43d2e45
-
Size
1.0MB
-
MD5
6a39d7a3c52c1bb741a7facf1fe9d250
-
SHA1
834762d4bcdb800f0e2fcb558da263bc515a377e
-
SHA256
01dc601350ad2d478ff8d01fdf4bd92fda914c06853e334f54432a32d43d2e45
-
SHA512
fc680852fd4256dc0cfb8b0c35c7af74b1ae89b16e141d1e213276286a1b38bfb829b8e5e827cf5018dc7749887ce8150ec708b1e0ef72507644fb13479d23e2
-
SSDEEP
12288:oQ4+jEjuRigBO/nf4b08xeLc2yrUdNvq3UrFV2xGX:oQHj7OZLcv2VR
Malware Config
Signatures
Files
-
01dc601350ad2d478ff8d01fdf4bd92fda914c06853e334f54432a32d43d2e45.exe windows x86
fca0271ddfb8a5c8e809a210ee93f563
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
version
GetFileVersionInfoSizeW
VerQueryValueW
GetFileVersionInfoW
kernel32
HeapSize
LocalFree
DeleteFileW
CloseHandle
FindNextFileW
DeviceIoControl
LocalAlloc
FindClose
GetProcAddress
GetLastError
CreateFileW
GetVersionExW
Sleep
WriteFile
GetModuleHandleW
WaitForSingleObject
GetCurrentProcess
CreateProcessW
FindFirstFileW
SetStdHandle
ReadConsoleInputW
SetConsoleMode
GetConsoleMode
EnterCriticalSection
LeaveCriticalSection
PeekConsoleInputA
GetNumberOfConsoleInputEvents
GetCommandLineW
HeapSetInformation
RaiseException
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
WriteConsoleW
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
HeapAlloc
HeapFree
IsProcessorFeaturePresent
WideCharToMultiByte
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoW
ExitProcess
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
LCMapStringW
MultiByteToWideChar
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapCreate
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
RtlUnwind
SetFilePointer
GetConsoleCP
HeapReAlloc
LoadLibraryW
FlushFileBuffers
GetStringTypeW
shell32
SHGetFolderPathW
advapi32
RegSetValueExW
RegCloseKey
InitiateSystemShutdownW
AdjustTokenPrivileges
ControlService
RegOpenKeyExW
FreeSid
SetEntriesInAclW
QueryServiceStatusEx
AllocateAndInitializeSid
RegDeleteValueW
GetNamedSecurityInfoW
StartServiceW
LookupPrivilegeValueW
SetNamedSecurityInfoW
SetSecurityDescriptorDacl
LookupAccountNameW
InitializeSecurityDescriptor
RegQueryValueExW
RegCreateKeyExW
OpenServiceW
OpenSCManagerW
CreateServiceW
CloseServiceHandle
OpenProcessToken
Sections
.text Size: 59KB - Virtual size: 58KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 636KB - Virtual size: 635KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 80KB - Virtual size: 88KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 256KB - Virtual size: 416KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ