Static task
static1
Behavioral task
behavioral1
Sample
d4c72e0f8a3bb5e5ec3811fdfad58d5efd31bbd0b4d4056e919e7cb132f71e62.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d4c72e0f8a3bb5e5ec3811fdfad58d5efd31bbd0b4d4056e919e7cb132f71e62.exe
Resource
win10v2004-20220812-en
General
-
Target
d4c72e0f8a3bb5e5ec3811fdfad58d5efd31bbd0b4d4056e919e7cb132f71e62
-
Size
156KB
-
MD5
799b9cc78a0fe0053853f84ab840e668
-
SHA1
05af61a696d140048bea332cc2f690d956f82034
-
SHA256
d4c72e0f8a3bb5e5ec3811fdfad58d5efd31bbd0b4d4056e919e7cb132f71e62
-
SHA512
08dd984562d0ca0c1bae46c69d597d15d2057b08a3b1eba785fe4b931f8c6f06a3add20f3b585b37e1d5e07db7f29f1311507f3bc8991d95052e7cbae2259f13
-
SSDEEP
3072:XAr9lG6TZ9WqfkA/ar9xMS/TEcxYPpsCmOPsy3TMELk6B/ck710KPMvJiY:XcXTZppyx7hx+rPsGo76BEW2JiY
Malware Config
Signatures
Files
-
d4c72e0f8a3bb5e5ec3811fdfad58d5efd31bbd0b4d4056e919e7cb132f71e62.exe windows x86
4eadfec2f0763fd2f2082a665e604fce
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
sprintf
wcscpy
wcscat
wcslen
wcscmp
_snprintf
floor
strncpy
atoi
_strnicmp
_iob
strtoul
_vsnprintf
fprintf
free
malloc
perror
memmove
_stricmp
_wcsicmp
rand
wcsrchr
_snwprintf
wcsncat
wcschr
wcsstr
_c_exit
_exit
_XcptFilter
_cexit
__initenv
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
_controlfp
_ftol
exit
advapi32
RegisterServiceCtrlHandlerExA
SetServiceStatus
AllocateAndInitializeSid
GetLengthSid
InitializeAcl
AddAccessAllowedAce
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
FreeSid
RegNotifyChangeKeyValue
RegQueryValueExW
RegSetValueExA
RegCloseKey
CryptAcquireContextA
CryptGenRandom
CryptReleaseContext
OpenSCManagerA
OpenServiceA
QueryServiceStatus
CloseServiceHandle
RegOpenKeyExA
RegQueryValueExA
ReportEventA
RegisterEventSourceA
StartServiceCtrlDispatcherA
kernel32
IsBadWritePtr
InterlockedExchangeAdd
InterlockedDecrement
OpenProcess
CreateFileA
ReadFile
GetStdHandle
WriteFile
IsBadReadPtr
GetLocalTime
SystemTimeToFileTime
UnmapViewOfFile
CreateSemaphoreA
CreateFileMappingA
MapViewOfFile
WaitForMultipleObjects
GetTickCount
WaitForSingleObject
DeleteCriticalSection
FormatMessageA
LocalFree
CreateEventA
InitializeCriticalSection
ResetEvent
SetProcessWorkingSetSize
GetCurrentProcess
GetSystemTime
HeapDestroy
HeapCreate
CreateDirectoryW
CompareFileTime
GetFileAttributesExW
SetFilePointer
CreateFileW
WideCharToMultiByte
LoadLibraryExW
GetSystemDirectoryW
GetVersionExA
HeapSize
OpenEventA
FlushViewOfFile
ReleaseSemaphore
GetModuleHandleA
LocalAlloc
OpenFileMappingA
CloseHandle
ExitProcess
HeapAlloc
HeapFree
FreeLibrary
GetProcAddress
GetLastError
MultiByteToWideChar
ExpandEnvironmentStringsW
SetEvent
LeaveCriticalSection
EnterCriticalSection
CreateThread
ntdll
DbgBreakPoint
RtlRandomEx
DbgPrint
rpcrt4
NdrServerCall2
RpcAsyncCompleteCall
UuidCreate
RpcServerUnregisterIfEx
RpcServerListen
RpcServerRegisterIf
RpcServerUseProtseqEpA
RpcServerRegisterAuthInfoA
RpcAsyncAbortCall
RpcServerTestCancel
RpcRevertToSelfEx
RpcImpersonateClient
RpcMgmtWaitServerListen
RpcMgmtStopServerListening
NdrAsyncServerCall
secur32
GetUserNameExA
user32
DefWindowProcA
PostQuitMessage
DispatchMessageA
GetMessageA
CreateWindowExA
RegisterClassA
ws2_32
WSACreateEvent
WSAWaitForMultipleEvents
ntohs
ntohl
htons
htonl
inet_ntoa
closesocket
WSACloseEvent
setsockopt
WSAGetLastError
WSAIoctl
WSACleanup
WSCEnumProtocols
WSAStartup
WSASocketW
bind
sendto
recvfrom
socket
WSAEnumNetworkEvents
WSAEventSelect
Sections
.text Size: 124KB - Virtual size: 123KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 3KB - Virtual size: 138KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 29KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ixefozj Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE