Static task
static1
Behavioral task
behavioral1
Sample
73ebac3b03bf612a2d83f25059da64a2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
73ebac3b03bf612a2d83f25059da64a2.exe
Resource
win10v2004-20220812-en
General
-
Target
73ebac3b03bf612a2d83f25059da64a2.exe
-
Size
324KB
-
MD5
73ebac3b03bf612a2d83f25059da64a2
-
SHA1
46b53c7b48674db71e488468aaae57ac61016977
-
SHA256
c2f2290bed9e7dbca6176730962980c4edfd17d5164001f55fe04ff90c266baf
-
SHA512
703c83698955f0aad45d1f7d8343feb398b62dd26e9111b1cc45dd3aa1d3ecd8db77e436f50ebde96bd026e8565b7720b212eaf611e36dcdac70a2c81a292949
-
SSDEEP
6144:LYB0Y7m1PvBuDxtyGrrDRg0UpkwYGgmFKpyCCiezOtr:LYB0HPJuDq8Rgbkw3FFYz
Malware Config
Signatures
Files
-
73ebac3b03bf612a2d83f25059da64a2.exe.exe windows x64
f6933565b1564944ba45a131a2399394
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
advapi32
RegQueryValueExW
SystemFunction036
RegOpenKeyExW
kernel32
GetModuleHandleA
GetProcAddress
GetSystemInfo
GetThreadContext
SetThreadContext
GetCurrentProcess
CloseHandle
TerminateProcess
GetCurrentThread
GetProcessHeap
HeapFree
WaitForSingleObject
FormatMessageW
GetLastError
LoadLibraryA
FreeLibrary
HeapAlloc
AcquireSRWLockExclusive
ReleaseSRWLockExclusive
ReleaseMutex
ReleaseSRWLockShared
AddVectoredExceptionHandler
SetThreadStackGuarantee
SetLastError
RtlCaptureContext
RtlLookupFunctionEntry
GetCurrentDirectoryW
GetEnvironmentVariableW
GetCommandLineW
GetStdHandle
GetCurrentProcessId
QueryPerformanceCounter
TryAcquireSRWLockExclusive
GetSystemTimeAsFileTime
TlsAlloc
HeapReAlloc
AcquireSRWLockShared
WaitForSingleObjectEx
CreateMutexA
GetModuleHandleW
GetModuleFileNameW
TlsGetValue
TlsSetValue
GetConsoleMode
WriteConsoleW
TlsFree
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
EncodePointer
RaiseException
RtlPcToFileHeader
RtlUnwindEx
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsDebuggerPresent
RtlVirtualUnwind
InitializeSListHead
GetCurrentThreadId
LoadLibraryExW
psapi
GetModuleBaseNameW
EnumProcessModulesEx
user32
GetSystemMetrics
bcrypt
BCryptGenRandom
api-ms-win-crt-string-l1-1-0
wcsncmp
strcpy_s
api-ms-win-crt-runtime-l1-1-0
_initialize_onexit_table
abort
_seh_filter_exe
_set_app_type
_register_thread_local_exe_atexit_callback
_configure_narrow_argv
_c_exit
_initialize_narrow_environment
_get_initial_narrow_environment
_initterm
_initterm_e
_crt_atexit
exit
_register_onexit_function
_cexit
__p___argv
__p___argc
_exit
terminate
api-ms-win-crt-math-l1-1-0
__setusermatherr
api-ms-win-crt-stdio-l1-1-0
_set_fmode
__p__commode
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
api-ms-win-crt-heap-l1-1-0
calloc
_set_new_mode
malloc
free
Sections
.text Size: 202KB - Virtual size: 201KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 109KB - Virtual size: 108KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 348B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ