Static task
static1
Behavioral task
behavioral1
Sample
81bba6630c399185a69864f248420963e2ab659fffd0beab02f7965a1b3eac3e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
81bba6630c399185a69864f248420963e2ab659fffd0beab02f7965a1b3eac3e.exe
Resource
win10v2004-20220901-en
General
-
Target
81bba6630c399185a69864f248420963e2ab659fffd0beab02f7965a1b3eac3e
-
Size
745KB
-
MD5
5f8fa9a0dc9edb7f4c9882277213e3a0
-
SHA1
92cdcfc8a2ddd57a1414e8cf225fe8b026c37355
-
SHA256
81bba6630c399185a69864f248420963e2ab659fffd0beab02f7965a1b3eac3e
-
SHA512
8f196dbbb504090113ae6f2a7f31b14171c0a5c03499dc754e7e3f545028c98b2e65f2a00be231ca4cf5df8d96b30afba1a06cf52501c922d2c6cb2b9f6b2bf9
-
SSDEEP
12288:0Su0QQfKGDDuJBztwHSjU1bXFmQfgVVlA/NpploX/YYs0AKHF4v2FkBgTOCv:0SwGDDuP5WbFmQfgvlA/nCAj3
Malware Config
Signatures
Files
-
81bba6630c399185a69864f248420963e2ab659fffd0beab02f7965a1b3eac3e.exe windows x86
31e7e92a41d87a26946c6e7c2b9a51c1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
rpcrt4
RpcBindingFromStringBindingW
RpcStringBindingComposeW
RpcBindingFree
NdrClientCall2
RpcStringFreeW
adohelper
ord850
ord78
ord788
ord666
ord675
ord116
ord232
ord521
ord1013
ord494
ord64
ord610
ord415
ord55
ord803
ord1041
ord545
ord574
ord564
ord1078
ord1081
ord1079
ord339
ord244
ord556
ord326
ord1167
ord999
ord596
ord338
ord980
ord6
ord77
ord1207
ord274
ord725
ord341
ord898
ord291
ord226
ord966
ord558
ord213
ord1011
ord857
ord797
ord250
ord251
ord1119
ord457
ord422
ord833
ord762
ord674
ord449
ord1026
ord535
ord111
ord923
ord469
ord18
ord85
ord42
ord41
ord98
ord986
ord502
ord689
ord220
ord732
ord604
ord955
ord1127
ord71
ord120
ord819
ord1136
ord806
ord1169
ord313
ord314
ord609
ord615
ord225
ord99
ord67
ord43
ord905
ord1126
ord267
ord271
ord270
ord269
ord321
ord977
ord1118
ord319
ord323
ord322
ord100
ord940
ord295
ord1128
ord297
ord760
ord848
ord462
ord7
ord933
ord495
ord824
ord818
ord296
ord726
ord998
mfc90u
ord2106
ord3543
ord1354
ord2103
ord1601
ord4510
ord2277
ord1667
ord4654
ord3496
ord615
ord2283
ord1719
ord4660
ord3654
ord778
ord1938
ord2901
ord3183
ord1599
ord6579
ord4543
ord524
ord744
ord6187
ord1144
ord1383
ord2372
ord809
ord899
ord1779
ord1708
ord3627
ord750
ord4442
ord2904
ord6311
ord3622
ord6095
ord6101
ord6065
ord525
ord333
ord3488
ord6094
ord3768
ord4044
ord4519
ord6171
ord1183
ord1486
ord5548
ord6741
ord5830
ord4213
ord2087
ord3217
ord5674
ord5676
ord4347
ord2251
ord5680
ord5663
ord6018
ord3115
ord4905
ord5632
ord5324
ord1810
ord1809
ord1675
ord3353
ord6408
ord1492
ord4664
ord4682
ord3589
ord265
ord261
ord6811
ord5767
ord1243
ord5778
ord6822
ord266
ord5851
ord938
ord2360
ord799
ord2069
ord285
ord3220
ord1607
ord6604
ord935
ord280
ord2208
ord1603
ord1248
ord286
ord811
ord6170
ord6514
ord782
ord580
ord1108
ord2537
ord4681
ord4910
ord4348
ord2891
ord4071
ord4081
ord4080
ord2764
ord2893
ord2774
ord3140
ord2966
ord4728
ord3112
ord2983
ord2771
ord5650
ord1727
ord1791
ord1792
ord2139
ord5625
ord1442
ord3226
ord6376
ord5404
ord3682
ord6804
ord4174
ord6802
ord1641
ord2368
ord2375
ord3486
ord611
ord595
ord3489
ord3286
ord5664
ord4652
ord1493
ord6411
ord3355
ord1665
ord2274
ord277
ord5938
ord5939
ord1048
ord4494
ord4490
ord6687
ord12404
ord13194
ord9972
ord10457
ord10304
ord13136
ord12165
ord12617
ord7766
ord9965
ord4448
ord4423
ord6801
ord2597
ord4747
ord2630
ord2612
ord2610
ord2628
ord2640
ord2617
ord2633
ord2638
ord2621
ord2623
ord2625
ord2619
ord2635
ord2615
ord971
ord967
ord969
ord965
ord960
ord5683
ord5685
ord6466
ord1728
ord4702
ord2206
ord6035
ord4996
ord4179
ord5154
ord3743
ord4603
ord6800
ord5512
ord2074
ord5602
ord4345
ord1751
ord1754
ord1137
ord2326
ord2694
ord813
ord600
ord1250
ord1272
ord1254
ord296
ord801
ord2479
msvcr90
_time64
_wtoi
_mktime64
swprintf_s
__argc
__CxxFrameHandler3
memset
_CxxThrowException
floor
__wargv
_wsplitpath_s
wcscpy_s
memcpy_s
free
memcpy
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_crt_debugger_hook
_controlfp_s
_invoke_watson
_except_handler4_common
?terminate@@YAXXZ
_decode_pointer
_onexit
_lock
__dllonexit
_unlock
__set_app_type
_encode_pointer
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_configthreadlocale
_initterm_e
_initterm
_wcmdln
exit
_XcptFilter
_exit
_cexit
__wgetmainargs
_amsg_exit
_wtof
_wsplitpath
vswprintf_s
??0exception@std@@QAE@XZ
??0exception@std@@QAE@ABQBD@Z
??1exception@std@@UAE@XZ
?what@exception@std@@UBEPBDXZ
??0exception@std@@QAE@ABV01@@Z
wcsftime
wcsncpy
_localtime64_s
malloc
kernel32
GetModuleFileNameW
GetCurrentProcess
GetSystemDirectoryW
GetDiskFreeSpaceExW
GetVolumeInformationW
GetDriveTypeW
GetLogicalDrives
CloseHandle
CreateFileW
WriteFile
WideCharToMultiByte
FindClose
FindNextFileW
CopyFileW
lstrcmpW
FindFirstFileW
Sleep
GetCommandLineW
GetLocaleInfoW
GetNumberFormatW
CreateDirectoryW
ExitProcess
IsDebuggerPresent
UnhandledExceptionFilter
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
SetUnhandledExceptionFilter
GetStartupInfoW
InterlockedCompareExchange
InterlockedExchange
user32
UpdateWindow
FillRect
InflateRect
OffsetRect
GetClientRect
SetCursor
LoadCursorW
PtInRect
CopyRect
SetRect
ExitWindowsEx
InvalidateRect
SendMessageW
DestroyIcon
LoadBitmapW
GetWindowRect
PostMessageW
SetForegroundWindow
BringWindowToTop
IsWindowVisible
KillTimer
SetTimer
PostQuitMessage
LoadIconW
RegisterWindowMessageW
EnableWindow
DispatchMessageW
TranslateMessage
PeekMessageW
SetActiveWindow
gdi32
DeleteDC
BitBlt
CreateCompatibleDC
SelectObject
Rectangle
CreatePen
CreateSolidBrush
GetObjectW
advapi32
LookupPrivilegeValueW
OpenProcessToken
ChangeServiceConfigW
ControlService
StartServiceW
OpenServiceW
QueryServiceStatus
CloseServiceHandle
OpenSCManagerW
AdjustTokenPrivileges
shlwapi
PathFileExistsW
PathAddBackslashW
SHDeleteKeyW
oleaut32
SystemTimeToVariantTime
VarBstrFromDate
SysFreeString
VariantTimeToSystemTime
msvcp90
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
??0?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE@ABV01@@Z
??4?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAEAAV01@ABV01@@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??4?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAEAAV01@PB_W@Z
??0?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE@XZ
??1?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE@XZ
Sections
.text Size: 71KB - Virtual size: 70KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 51KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 105KB - Virtual size: 104KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.vmp0 Size: 500KB - Virtual size: 1.6MB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE