Static task
static1
Behavioral task
behavioral1
Sample
fb7f6aa4e104554ddbd04b08fad62bb7ce2f07f8fd0e1d1c6c5d3623021503da.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
fb7f6aa4e104554ddbd04b08fad62bb7ce2f07f8fd0e1d1c6c5d3623021503da.exe
Resource
win10v2004-20220901-en
General
-
Target
fb7f6aa4e104554ddbd04b08fad62bb7ce2f07f8fd0e1d1c6c5d3623021503da
-
Size
80KB
-
MD5
24442ac5386685cb8a9eda78e4c45800
-
SHA1
bed9c5ccbd959779dec791559e185c7ffc7cd635
-
SHA256
fb7f6aa4e104554ddbd04b08fad62bb7ce2f07f8fd0e1d1c6c5d3623021503da
-
SHA512
a1bca8a30dd45fcf7ab84f15ad11acfafaa1483d1f865c8ca89776db96c2c1cae0de1e8740498165ebc619f97f1af0f0c1bbf496b789fddecbd3dd57ee1de1a3
-
SSDEEP
1536:y9Z+KS1IoJc/Abc3lG5x6cadpLgoin4//PFZOxJ+xPA0MQ:51ioJc/AbAWoin4PF0spzM
Malware Config
Signatures
Files
-
fb7f6aa4e104554ddbd04b08fad62bb7ce2f07f8fd0e1d1c6c5d3623021503da.exe windows x86
9a63d48719fb6f65d73b9d8483c95315
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
OpenProcessToken
OpenThreadToken
SetNamedSecurityInfoW
GetSecurityDescriptorSacl
GetSecurityDescriptorDacl
GetSecurityDescriptorGroup
GetSecurityDescriptorOwner
GetSecurityDescriptorControl
ConvertStringSecurityDescriptorToSecurityDescriptorW
AdjustTokenPrivileges
ConvertSidToStringSidW
GetTokenInformation
LookupPrivilegeValueW
kernel32
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
GetSystemTimeAsFileTime
GetModuleHandleA
SetUnhandledExceptionFilter
OutputDebugStringA
GetStartupInfoW
InterlockedCompareExchange
Sleep
InterlockedExchange
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetLastError
GetFileAttributesW
GetVolumeInformationW
GetVolumePathNameW
SetFileAttributesW
FindClose
FindNextFileW
FindFirstFileW
WriteFile
CreateFileW
GetProcessHeap
HeapFree
HeapAlloc
GetLastError
LocalFree
QueryPerformanceCounter
CloseHandle
UnmapViewOfFile
MapViewOfFile
CreateFileMappingW
GetFileSizeEx
DeviceIoControl
CopyFileExW
GetFullPathNameW
CreateDirectoryW
GetCurrentThread
msvcrt
wcsstr
ungetc
_isatty
_lseeki64
_fileno
_read
__pioinfo
__badioinfo
realloc
wcstombs
ferror
wctomb
_itoa
_snprintf
localeconv
isxdigit
_wcsnicmp
fwprintf
fflush
_write
isleadbyte
mbtowc
isdigit
calloc
_controlfp
?terminate@@YAXXZ
iswctype
free
malloc
memcpy
memset
__set_app_type
__p__fmode
__p__commode
__setusermatherr
_amsg_exit
_initterm
_wcmdln
exit
_XcptFilter
_exit
_cexit
__wgetmainargs
_iob
__mb_cur_max
wcschr
_vsnwprintf
_wcslwr
_errno
_wcsicmp
wcsrchr
imagehlp
CheckSumMappedFile
shell32
CommandLineToArgvW
shlwapi
PathRemoveBackslashW
ntdll
NtResetEvent
NtQueryValueKey
NtOpenKey
NtQuerySymbolicLinkObject
NtOpenSymbolicLinkObject
RtlAllocateHeap
NtSetInformationFile
LdrFindResource_U
LdrAccessResource
NtQueryInformationFile
NtOpenProcess
NtQueryInformationProcess
RtlNtStatusToDosError
NtSetInformationThread
RtlInitUnicodeString
NtOpenFile
NtCreateEvent
NtDeviceIoControlFile
NtWaitForSingleObject
NtQueryInformationThread
NtClose
NtQuerySystemInformation
RtlUnwind
RtlFreeHeap
version
GetFileVersionInfoW
GetFileVersionInfoSizeW
VerQueryValueW
Sections
.text Size: 55KB - Virtual size: 55KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 20KB - Virtual size: 23KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE