Static task
static1
Behavioral task
behavioral1
Sample
f8c2e9fea05ffe2ad20bce1dba75c38615319b528f9c0e6bbf4baa2cdf2ba048.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
f8c2e9fea05ffe2ad20bce1dba75c38615319b528f9c0e6bbf4baa2cdf2ba048.exe
Resource
win10v2004-20220812-en
General
-
Target
f8c2e9fea05ffe2ad20bce1dba75c38615319b528f9c0e6bbf4baa2cdf2ba048
-
Size
212KB
-
MD5
32b5a002b19feb625b73d6d305f8da10
-
SHA1
3501a94acf21dc8c5603fb17a51e0982a57ec9cc
-
SHA256
f8c2e9fea05ffe2ad20bce1dba75c38615319b528f9c0e6bbf4baa2cdf2ba048
-
SHA512
95aaa2d0b083e88e35fed96088da6331c1bb1becec5c06f23d753e0a3b3ec3166495e417fe546f25c7d78502de8813d7ab0d6a180738bd7e22095961c19b3cb8
-
SSDEEP
6144:IrEsOEyX907Oj8Vm7PTo/eyo6yMIjT7Tth2fVEuBzdL:IrEsOEyKSjZTo/eyoNMIjT7Bh2fV
Malware Config
Signatures
Files
-
f8c2e9fea05ffe2ad20bce1dba75c38615319b528f9c0e6bbf4baa2cdf2ba048.exe windows x86
58e185299ecca757fe68ba83a6495fde
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
__wgetmainargs
_exit
_XcptFilter
exit
_initterm
_amsg_exit
__setusermatherr
memcpy
_controlfp
_except_handler4_common
?terminate@@YAXXZ
__set_app_type
__p__fmode
__p__commode
_cexit
api-ms-win-core-processthreads-l1-1-0
TerminateProcess
GetCurrentProcess
OpenProcessToken
GetCurrentProcessId
GetCurrentThreadId
kernel32
LocalAlloc
CloseHandle
DelayLoadFailureHook
GetProcAddress
GetLastError
FreeLibrary
InterlockedCompareExchange
LoadLibraryExA
InterlockedExchange
Sleep
SetUnhandledExceptionFilter
GetModuleHandleA
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
UnhandledExceptionFilter
DeactivateActCtx
LoadLibraryExW
ActivateActCtx
LeaveCriticalSection
lstrcmpW
EnterCriticalSection
RegCloseKey
RegOpenKeyExW
HeapSetInformation
lstrcmpiW
lstrlenW
LCMapStringW
RegQueryValueExW
ReleaseActCtx
CreateActCtxW
ExpandEnvironmentStringsW
GetCommandLineW
ExitProcess
SetProcessAffinityUpdateMode
RegDisablePredefinedCacheEx
InitializeCriticalSection
GetProcessHeap
SetErrorMode
RegisterWaitForSingleObjectEx
LocalFree
HeapFree
WideCharToMultiByte
HeapAlloc
ntdll
RtlAllocateHeap
RtlLengthRequiredSid
RtlSubAuthoritySid
RtlInitializeSid
RtlCopySid
RtlSubAuthorityCountSid
RtlInitializeCriticalSection
RtlSetProcessIsCritical
RtlImageNtHeader
RtlUnhandledExceptionFilter
EtwEventWrite
EtwEventEnabled
EtwEventRegister
RtlFreeHeap
api-ms-win-security-base-l1-1-0
SetSecurityDescriptorDacl
AddAccessAllowedAce
SetSecurityDescriptorOwner
SetSecurityDescriptorGroup
GetTokenInformation
InitializeSecurityDescriptor
GetLengthSid
InitializeAcl
api-ms-win-service-core-l1-1-0
StartServiceCtrlDispatcherW
SetServiceStatus
api-ms-win-service-winsvc-l1-1-0
RegisterServiceCtrlHandlerW
rpcrt4
RpcMgmtSetServerStackSize
I_RpcMapWin32Status
RpcServerUnregisterIf
RpcMgmtWaitServerListen
RpcMgmtStopServerListening
RpcServerUnregisterIfEx
RpcServerRegisterIf
RpcServerUseProtseqEpW
RpcServerListen
Sections
.text Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 972B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.vmp0 Size: 192KB - Virtual size: 1.3MB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE