Static task
static1
Behavioral task
behavioral1
Sample
0c09878dd121591d918d29048d2bf91ea5ee6229998f6f7f95e01e55cb801900.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0c09878dd121591d918d29048d2bf91ea5ee6229998f6f7f95e01e55cb801900.exe
Resource
win10v2004-20220812-en
General
-
Target
0c09878dd121591d918d29048d2bf91ea5ee6229998f6f7f95e01e55cb801900
-
Size
305KB
-
MD5
482e768306f5ba656bffa5d6a61f9810
-
SHA1
afd2c41dcb21ad41a5f0d734af925e1fc9479571
-
SHA256
0c09878dd121591d918d29048d2bf91ea5ee6229998f6f7f95e01e55cb801900
-
SHA512
1a8f7363dd6a84e66ccb9c5acfeb512dd415f5cdc9f0a923c58d60613b75f34bace30da054b876e3d40c1a0ca7fb991f06c6dcfc3aeb2d8a9303869dbd6adf34
-
SSDEEP
3072:Z/lIyjVlXgty0/ISHUv5x7Y+4ctBI5IhwMNg4CKcTRhdNV/ysXo34D62xKe1P/uK:hVXmy0ATtC5IhfRtvx
Malware Config
Signatures
Files
-
0c09878dd121591d918d29048d2bf91ea5ee6229998f6f7f95e01e55cb801900.exe windows x86
aea7ec4000ea25c8f07648a3a844869b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetConsoleOutputCP
WriteConsoleW
GetConsoleMode
GetFileType
GetStdHandle
DeviceIoControl
CloseHandle
CreateFileW
GetModuleFileNameW
SetLastError
FreeLibrary
GetProcAddress
LoadLibraryW
LocalFree
FormatMessageW
WideCharToMultiByte
LoadLibraryExW
LoadResource
FindResourceExW
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
GetModuleHandleA
SetUnhandledExceptionFilter
OutputDebugStringA
InterlockedCompareExchange
Sleep
InterlockedExchange
WriteFile
QueryDosDeviceW
GetLastError
CreateFileMappingW
GetVersionExW
GetLocaleInfoW
UnmapViewOfFile
GetSystemDefaultUILanguage
GetUserDefaultUILanguage
SearchPathW
MapViewOfFile
msvcrt
__wgetmainargs
_cexit
_exit
_XcptFilter
exit
_initterm
_amsg_exit
__setusermatherr
__p__commode
__set_app_type
memmove
malloc
free
iswctype
?terminate@@YAXXZ
_controlfp
calloc
isdigit
mbtowc
isleadbyte
isxdigit
localeconv
_snprintf
_itoa
wctomb
ferror
wcstombs
realloc
__badioinfo
__pioinfo
_read
_fileno
_lseeki64
_write
_isatty
ungetc
bsearch
wcsncmp
strncmp
wcsstr
wcsrchr
_iob
__mb_cur_max
_wcsupr
_wcslwr
_errno
_wsetlocale
iswspace
towupper
_vsnwprintf
memcpy
memset
wcschr
_wcsicmp
wcstoul
_wcsnicmp
__p__fmode
ntdll
RtlUnwind
RtlStringFromGUID
NtOpenFile
NtClose
RtlGUIDFromString
RtlDosPathNameToNtPathName_U
RtlInitUnicodeString
RtlFreeUnicodeString
RtlCompareMemory
RtlAllocateHeap
RtlNtStatusToDosError
RtlFreeHeap
NtQuerySystemInformation
NtWaitForSingleObject
NtDeviceIoControlFile
NtCreateEvent
NtOpenKey
NtEnumerateKey
NtQueryKey
NtQueryAttributesFile
NtUnloadKey
NtLoadKey
NtAdjustPrivilegesToken
NtOpenProcessToken
NtOpenThreadToken
RtlFreeSid
RtlSetOwnerSecurityDescriptor
RtlLengthSecurityDescriptor
RtlSetDaclSecurityDescriptor
RtlCreateSecurityDescriptor
RtlAddAccessAllowedAceEx
RtlCreateAcl
RtlLengthSid
RtlAllocateAndInitializeSid
NtSetSecurityObject
NtCreateKey
NtDeleteValueKey
NtQueryValueKey
NtSetValueKey
NtSaveKey
NtCreateFile
NtDeleteKey
LdrGetProcedureAddress
RtlInitAnsiString
LdrGetDllHandle
NtDeleteFile
NtQueryInformationFile
NtQueryVolumeInformationFile
NtResetEvent
RtlGetVersion
NtQuerySymbolicLinkObject
NtOpenSymbolicLinkObject
NtAllocateUuids
advapi32
RegCloseKey
RegOpenKeyExW
RegQueryValueExW
Sections
.text Size: 143KB - Virtual size: 143KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 135KB - Virtual size: 134KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 24KB - Virtual size: 27KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ