Static task
static1
Behavioral task
behavioral1
Sample
33c2d0a401f3026ce1425afe1e72c9f26b0c5964362fb93a7b2ca9052f0f00bb.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
33c2d0a401f3026ce1425afe1e72c9f26b0c5964362fb93a7b2ca9052f0f00bb.exe
Resource
win10v2004-20220812-en
General
-
Target
33c2d0a401f3026ce1425afe1e72c9f26b0c5964362fb93a7b2ca9052f0f00bb
-
Size
473KB
-
MD5
69916276459bd9dda52a235b4578a080
-
SHA1
5f8c38d997a984c602391b25802fbc5ed59966fb
-
SHA256
33c2d0a401f3026ce1425afe1e72c9f26b0c5964362fb93a7b2ca9052f0f00bb
-
SHA512
3d8ac81aa58d755f516b03e40f63002d40c35fa58027cdb6ca0ff6d6d78cd7e898856d708afde922545cc48b16ec235d53bcab8f8599df065eab75f8c57a0f05
-
SSDEEP
12288:Tq/9ONXeBXaNMZ/+FTe6Ms/peVRsPzPaGc:QONXeBX9Qde6M5VRsPzPaGc
Malware Config
Signatures
Files
-
33c2d0a401f3026ce1425afe1e72c9f26b0c5964362fb93a7b2ca9052f0f00bb.exe windows x86
2e500d56f8ba905c05df6712f4f713de
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
awesomium
?AwesomiumMain@@YAHPAUHINSTANCE__@@PATSandboxInterfaceInfo@sandbox@@PA_W@Z
kernel32
InterlockedExchange
SignalObjectAndWait
FreeLibrary
LoadLibraryW
WriteProcessMemory
MapViewOfFile
CreateFileMappingW
GetExitCodeProcess
GetThreadContext
AssignProcessToJobObject
InterlockedIncrement
InterlockedDecrement
UnregisterWaitEx
RegisterWaitForSingleObject
GetVersionExW
CreateJobObjectW
CreateMutexW
GetCurrentProcessId
GetModuleHandleW
VirtualFreeEx
VirtualAllocEx
VirtualProtectEx
CreateNamedPipeW
CreateProcessW
OpenEventW
SearchPathW
DebugBreak
lstrlenW
WideCharToMultiByte
VirtualQuery
GetProcAddress
GetCurrentDirectoryW
ReadProcessMemory
SuspendThread
GetModuleFileNameW
GetLongPathNameW
GetFileAttributesW
QueryDosDeviceW
InterlockedCompareExchange
SetFilePointer
CreateFileW
ReleaseMutex
WriteFile
OutputDebugStringA
GetModuleHandleA
Sleep
RaiseException
IsDebuggerPresent
InitializeCriticalSectionAndSpinCount
GetUserDefaultLCID
GetStringTypeA
GetLocaleInfoA
IsValidCodePage
GetOEMCP
GetACP
FlushFileBuffers
SetStdHandle
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
GetTimeZoneInformation
SetEnvironmentVariableA
HeapReAlloc
VirtualAlloc
HeapSize
QueryPerformanceCounter
VirtualFree
ResumeThread
LocalFree
PostQueuedCompletionStatus
DeleteCriticalSection
CreateIoCompletionPort
CreateEventW
CreateThread
GetCurrentThreadId
DuplicateHandle
ResetEvent
GetQueuedCompletionStatus
SetEvent
TerminateJobObject
CloseHandle
InitializeCriticalSection
GetLastError
SetLastError
WaitForSingleObject
SetInformationJobObject
LeaveCriticalSection
EnterCriticalSection
GetTickCount
TerminateProcess
GetCurrentProcess
EnumSystemLocalesA
IsValidLocale
ReadFile
LoadLibraryA
GetLocaleInfoW
CreateFileA
CompareStringA
CompareStringW
HeapCreate
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetFileType
MultiByteToWideChar
GetCommandLineA
GetStartupInfoA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
HeapFree
GetSystemTimeAsFileTime
GetConsoleCP
GetConsoleMode
HeapAlloc
RtlUnwind
LCMapStringA
LCMapStringW
GetCPInfo
GetStringTypeW
ExitProcess
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
user32
CloseWindowStation
MessageBoxW
GetUserObjectInformationW
GetThreadDesktop
SetProcessWindowStation
CreateDesktopW
GetProcessWindowStation
CreateWindowStationW
CloseDesktop
advapi32
RegOpenKeyExW
RegCreateKeyExW
SetEntriesInAclW
GetSecurityInfo
CreateWellKnownSid
CopySid
LookupPrivilegeValueW
GetTokenInformation
EqualSid
DuplicateToken
DuplicateTokenEx
CreateRestrictedToken
CreateProcessAsUserW
SetThreadToken
OpenProcessToken
ConvertStringSidToSidW
GetLengthSid
SetTokenInformation
ConvertStringSecurityDescriptorToSecurityDescriptorW
GetSecurityDescriptorSacl
SetSecurityInfo
RevertToSelf
RegDisablePredefinedCache
RegCloseKey
Sections
.text Size: 231KB - Virtual size: 230KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 97KB - Virtual size: 96KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 137KB - Virtual size: 137KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ