Static task
static1
Behavioral task
behavioral1
Sample
0a65afe485d95d471a0008e6b550f1c2bed6c5c1d697940310a7d44b046aaef6.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0a65afe485d95d471a0008e6b550f1c2bed6c5c1d697940310a7d44b046aaef6.exe
Resource
win10v2004-20220812-en
General
-
Target
0a65afe485d95d471a0008e6b550f1c2bed6c5c1d697940310a7d44b046aaef6
-
Size
679KB
-
MD5
54d7fcd9dd7c0d4ef7596d7ceccbeed0
-
SHA1
2301631d12b22b5870c279ac5d3c4707ea9c2078
-
SHA256
0a65afe485d95d471a0008e6b550f1c2bed6c5c1d697940310a7d44b046aaef6
-
SHA512
5533bafbcea651b192b4d6b5e4f0b74dd4ce2b737b3117af9a1d6d2e27a7ae561428f89626861a7822c2c884010477b7730adbc6574b785a1e324323b9a7c1dd
-
SSDEEP
12288:DtYgp7FWT9iqPMrc/zlLBR9KEx6KLNsSjOMsw7sDZbrLzSGPu6j:5hFWT4rc/xLj6sjNsw4/RPuo
Malware Config
Signatures
Files
-
0a65afe485d95d471a0008e6b550f1c2bed6c5c1d697940310a7d44b046aaef6.exe windows x64
cddef87c821a24732ba3a3dcef69f972
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
advapi32
OpenProcessToken
OpenThreadToken
SetSecurityDescriptorGroup
GetTokenInformation
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
SetSecurityDescriptorOwner
GetSecurityDescriptorOwner
ConvertStringSecurityDescriptorToSecurityDescriptorW
ConvertSidToStringSidW
GetSecurityDescriptorGroup
GetSecurityDescriptorDacl
RegCloseKey
RegOpenKeyExW
RegQueryValueExW
kernel32
HeapAlloc
SystemTimeToFileTime
GetCurrentProcess
SetFilePointerEx
HeapFree
GlobalLock
GetCurrentThread
GetProcessHeap
ReadConsoleW
GlobalAlloc
GetConsoleMode
SizeofResource
SetConsoleMode
ReadFile
CreateFileW
MultiByteToWideChar
GlobalUnlock
GetStdHandle
GetLastError
GetCurrentDirectoryW
GlobalFree
GetFileType
LockResource
HeapSetInformation
CloseHandle
LoadResource
GetUserDefaultUILanguage
CreateFileMappingW
SetLastError
GetVersionExW
LoadLibraryExW
FindResourceExW
GetSystemDefaultUILanguage
UnmapViewOfFile
MapViewOfFile
SearchPathW
FindClose
FindNextFileW
FindFirstFileW
GetConsoleScreenBufferInfo
SetThreadUILanguage
DecodePointer
GetProcAddress
EncodePointer
GetLocaleInfoW
GetModuleFileNameW
ExpandEnvironmentStringsW
FreeLibrary
LoadLibraryW
FormatMessageW
WriteFile
WriteConsoleW
GetConsoleOutputCP
UnhandledExceptionFilter
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
FindResourceW
QueryPerformanceCounter
FreeResource
GetFullPathNameW
GetModuleHandleW
LocalFree
SetUnhandledExceptionFilter
Sleep
msvcrt
memset
memcpy
?terminate@@YAXXZ
__set_app_type
_fmode
_commode
__setusermatherr
_amsg_exit
_initterm
exit
_cexit
_exit
_XcptFilter
__C_specific_handler
__wgetmainargs
_getmbcp
fclose
wcstok
fseek
ferror
_vsnwprintf
wcsstr
wcsrchr
fgetws
wprintf
_errno
_wfopen
qsort
isspace
_wtoi
towlower
_wcsicmp
wcschr
_wsplitpath_s
_wmakepath_s
iswspace
_wcsnicmp
wcsncmp
bsearch
user32
LoadStringW
CharToOemW
ole32
StringFromGUID2
CoInitializeEx
CreateStreamOnHGlobal
CoUninitialize
CoCreateInstance
CoInitializeSecurity
oleaut32
SafeArrayUnaccessData
VarBstrFromDate
VariantChangeType
SysAllocString
VariantClear
SafeArrayCreateVector
SafeArrayAccessData
SafeArrayDestroy
VariantInit
SystemTimeToVariantTime
VarDateFromStr
SysFreeString
VariantTimeToSystemTime
ntdll
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
NtOpenProcessToken
NtClose
NtQueryInformationToken
NtOpenThreadToken
shlwapi
PathIsNetworkPathW
secur32
GetUserNameExW
version
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
Sections
.text Size: 83KB - Virtual size: 83KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 580KB - Virtual size: 2.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE