Static task
static1
Behavioral task
behavioral1
Sample
a305ca46a6a80b72dbf6085bdb723e8cbf9d5a9aa959dd9095397a797b2d8cef.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
a305ca46a6a80b72dbf6085bdb723e8cbf9d5a9aa959dd9095397a797b2d8cef.exe
Resource
win10v2004-20220901-en
General
-
Target
a305ca46a6a80b72dbf6085bdb723e8cbf9d5a9aa959dd9095397a797b2d8cef
-
Size
74KB
-
MD5
63550c5bfff8f08894dbc0d2ec5f2a86
-
SHA1
a7e72fa3407663ced76cfb7c5a1917e330033352
-
SHA256
a305ca46a6a80b72dbf6085bdb723e8cbf9d5a9aa959dd9095397a797b2d8cef
-
SHA512
7358bea66e3235cf75b38f5a83cd5fcf1fba76bc5615f6c6db74d7c401f70f55f393ca7d1111e4a6c41fc7b14d514f2f4afa06883116b7a62deb9ed3e15a689d
-
SSDEEP
1536:hFpKvHo99mwwCWHWz8ujG8c1K8ofXFq0Z0cb++ZLh8:hHKfo99lwCW2z8ujG8cM8ovFqG0cXZLC
Malware Config
Signatures
Files
-
a305ca46a6a80b72dbf6085bdb723e8cbf9d5a9aa959dd9095397a797b2d8cef.exe windows x86
fb908fb816abfc18167ec13c3db9a3ed
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
wtsapi32
WTSFreeMemory
WTSEnumerateSessionsW
WTSQuerySessionInformationW
WTSQueryUserToken
kernel32
EnterCriticalSection
LeaveCriticalSection
LocalFree
HeapDestroy
HeapReAlloc
HeapSize
CloseHandle
UnmapViewOfFile
GetLogicalDrives
CreateMutexW
WaitForSingleObject
ReleaseMutex
CreateFileMappingW
MapViewOfFile
GetModuleHandleW
GetDriveTypeA
GetModuleFileNameW
FindResourceExW
FindResourceW
LoadResource
LockResource
SizeofResource
DeleteCriticalSection
InitializeCriticalSection
RaiseException
ExitProcess
GetVersionExA
GetModuleHandleA
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
GetCurrentProcess
HeapFree
HeapAlloc
GetProcessHeap
CreateProcessW
DeviceIoControl
CreateFileW
GetStartupInfoW
QueryPerformanceCounter
GetLastError
user32
FindWindowW
SetTimer
PostQuitMessage
KillTimer
DefWindowProcW
PostMessageW
SendMessageW
RegisterClassW
CreateWindowExW
GetMessageW
TranslateMessage
DispatchMessageW
DestroyWindow
UnregisterClassW
advapi32
AdjustTokenPrivileges
OpenProcessToken
RevertToSelf
CreateProcessAsUserW
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
StartServiceCtrlDispatcherW
RegisterServiceCtrlHandlerW
OpenServiceW
ControlService
DeleteService
OpenSCManagerW
CreateServiceW
StartServiceW
CloseServiceHandle
SetServiceStatus
ImpersonateLoggedOnUser
RegDeleteValueW
RegCreateKeyExW
RegEnumValueW
RegQueryInfoKeyW
LookupPrivilegeValueW
userenv
DestroyEnvironmentBlock
UnloadUserProfile
CreateEnvironmentBlock
LoadUserProfileW
msvcp71
??1?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAE@XZ
?_Nomemory@std@@YAXXZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??0?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAE@PBG@Z
shlwapi
PathFileExistsW
msvcr71
swprintf
wcsncpy
malloc
_callnewh
memset
__security_error_handler
??1type_info@@UAE@XZ
__dllonexit
_onexit
_c_exit
_exit
_XcptFilter
_cexit
exit
_wcmdln
_amsg_exit
__wgetmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
?terminate@@YAXXZ
_controlfp
??0exception@@QAE@ABV0@@Z
wcscpy
wcsrchr
wcscat
_snwprintf
??3@YAXPAX@Z
??0exception@@QAE@XZ
??1exception@@UAE@XZ
__CxxFrameHandler
_wcsnicmp
memmove
wcslen
free
_except_handler3
_CxxThrowException
_wcsicmp
oleaut32
VariantClear
Sections
.text Size: 20KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 684B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 36KB - Virtual size: 33KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ