Static task
static1
Behavioral task
behavioral1
Sample
94971043992412e7c4cde86794e1456c9238195f359ea9520b9732cfa8e59f15.exe
Resource
win7-20220812-en
General
-
Target
94971043992412e7c4cde86794e1456c9238195f359ea9520b9732cfa8e59f15
-
Size
817KB
-
MD5
6af559bfc49593faf454e0a016fbb930
-
SHA1
e9e61a6b70594fec6cf7872b6d120a9a5b77d0ab
-
SHA256
94971043992412e7c4cde86794e1456c9238195f359ea9520b9732cfa8e59f15
-
SHA512
7596cb60ee686f312bb9cb4308212ad6459381ea3ce3220a4cf1acad7ba057dc6907672ebf0a10e771a3a407c928ff5b15bf4aa2b10cf2e99ce2ae161b50f93e
-
SSDEEP
12288:X0Oz6g+f8VzT/KS5ABUhMifAqjlMGt7kPflT/k+lXZ:X1PeS532ifNxIPfF/plX
Malware Config
Signatures
Files
-
94971043992412e7c4cde86794e1456c9238195f359ea9520b9732cfa8e59f15.exe windows x64
049fbfb912a0ae446b564ce24bb16d72
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
advapi32
RegCreateKeyExW
RegQueryValueExW
RegDeleteValueW
RegGetValueW
RegCloseKey
RegSetValueExW
OpenThreadToken
PrivilegeCheck
LookupPrivilegeValueW
ConvertStringSecurityDescriptorToSecurityDescriptorW
RegEnumValueW
RegOpenKeyExW
RegFlushKey
AdjustTokenPrivileges
OpenProcessToken
kernel32
EnumUILanguagesW
GetProcAddress
FindClose
GetSystemPreferredUILanguages
GetProductInfo
FindNextFileW
DeleteFileW
GetFileTime
FreeResource
LockResource
GetVersionExW
SizeofResource
LoadLibraryExW
LoadResource
FindResourceW
GetSystemDirectoryW
IsValidLocale
CreateDirectoryW
MoveFileExW
GetFileAttributesW
ExpandEnvironmentStringsW
SetFileAttributesW
LocalFree
CloseHandle
GetDiskFreeSpaceExW
GetLastError
GetFileAttributesExW
OpenFileMappingW
DeviceIoControl
RemoveDirectoryW
GlobalMemoryStatusEx
CreateFileMappingW
SetLastError
GetFileSizeEx
FlushFileBuffers
CreateFileW
ReadFile
WriteFile
GetCurrentThread
FlushViewOfFile
WaitForSingleObject
HeapFree
GetSystemWindowsDirectoryW
UnmapViewOfFile
MapViewOfFile
CreateMutexW
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
GetModuleHandleW
SetUnhandledExceptionFilter
Sleep
LoadLibraryW
GetSystemTimeAsFileTime
GetProcessHeap
HeapAlloc
FreeLibrary
GetSystemDefaultUILanguage
LCIDToLocaleName
GetSystemTime
FindFirstFileW
SystemTimeToFileTime
ReleaseMutex
msvcrt
memcmp
towlower
printf
_wgetenv
_wcsupr
wcsrchr
bsearch
memcpy
memset
?terminate@@YAXXZ
??1type_info@@UEAA@XZ
_onexit
_lock
__dllonexit
_unlock
__set_app_type
_fmode
_commode
__setusermatherr
_amsg_exit
_initterm
exit
_cexit
_exit
_XcptFilter
__C_specific_handler
__wgetmainargs
_callnewh
malloc
free
??0exception@@QEAA@AEBQEBDH@Z
__CxxFrameHandler3
_CxxThrowException
fclose
towupper
memcpy_s
??0exception@@QEAA@AEBV0@@Z
??0exception@@QEAA@AEBQEBD@Z
??0exception@@QEAA@XZ
??1exception@@UEAA@XZ
?what@exception@@UEBAPEBDXZ
_vsnwprintf
wcsstr
_wcsupr_s
fgetws
wcstol
_wcsnicmp
wcstoul
swscanf
_wcsicmp
memmove_s
wcschr
_wfopen_s
wcsncmp
ntdll
RtlLookupFunctionEntry
RtlVirtualUnwind
EtwEventWrite
RtlGetSystemPreferredUILanguages
EtwEventUnregister
RtlExpandEnvironmentStrings
RtlAllocateHeap
RtlReAllocateHeap
RtlHashUnicodeString
EtwEventRegister
NtMapViewOfSection
NtUnmapViewOfSection
RtlNtStatusToDosError
RtlUnicodeStringToInteger
EtwEventEnabled
RtlInitUnicodeString
RtlFreeHeap
RtlCaptureContext
netapi32
NetApiBufferFree
NetGetJoinInformation
Sections
.text Size: 223KB - Virtual size: 222KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGELK Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 556KB - Virtual size: 1.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE