Static task
static1
Behavioral task
behavioral1
Sample
54e337d1d025434a77596d6f68866c160d722e3377a27096fde258533c7f64b0.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
54e337d1d025434a77596d6f68866c160d722e3377a27096fde258533c7f64b0.exe
Resource
win10v2004-20220812-en
General
-
Target
54e337d1d025434a77596d6f68866c160d722e3377a27096fde258533c7f64b0
-
Size
124KB
-
MD5
5f08b5d622f219d4d56bb9637fb637dc
-
SHA1
81865f1ab8c6f283ce3033836464784290b6011c
-
SHA256
54e337d1d025434a77596d6f68866c160d722e3377a27096fde258533c7f64b0
-
SHA512
2fc9a8709f94c38dc725afa55103095d4564c7023920af1bc3d32ca41fe31298a363bbfdaa2f0a35f5274965aa10086ce83d04dca3f97c9cf353ab5336c2a1c9
-
SSDEEP
3072:oxCQJKE1fyKJR7SsFmiTIGSjf7DqAefJXza0bnas1:lQUKvN0iTIHSAWN0s1
Malware Config
Signatures
Files
-
54e337d1d025434a77596d6f68866c160d722e3377a27096fde258533c7f64b0.exe windows x86
6c092cc3d3fa50ae9a31c119cf209cfe
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
wcschr
_beginthreadex
_wcsnicmp
?terminate@@YAXXZ
swprintf
wcsncat
swscanf
_wcsdup
wcscpy
memmove
_ftol
wcslen
_CxxThrowException
malloc
free
_purecall
_wcsicmp
??1type_info@@UAE@XZ
__dllonexit
_onexit
_controlfp
_except_handler3
wcscmp
_exit
_c_exit
__CxxFrameHandler
_XcptFilter
_cexit
exit
_wcmdln
__wgetmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
iswspace
__set_app_type
wcscat
advapi32
RegSetValueExW
RegConnectRegistryW
RegOpenKeyExW
RegCloseKey
OpenThreadToken
RegisterEventSourceW
DeregisterEventSource
SetThreadToken
kernel32
GetTickCount
GlobalUnlock
GlobalLock
GlobalSize
GetCommandLineW
GetFileAttributesExW
GetLastError
GetUserDefaultLCID
GetTimeZoneInformation
CreateDirectoryW
GetTempPathW
WaitForMultipleObjects
GetCurrentThread
SetEnvironmentVariableW
GetEnvironmentVariableW
MultiByteToWideChar
WideCharToMultiByte
WriteFile
SetFilePointer
CreateFileW
lstrlenA
MoveFileExW
ReadFile
GetFileInformationByHandle
DuplicateHandle
GetCurrentProcess
SetFileAttributesW
DeleteFileW
GetModuleHandleA
GetStartupInfoW
RaiseException
LoadLibraryA
LocalAlloc
GetSystemTime
InterlockedExchange
CreateEventW
GetCurrentThreadId
Sleep
CreateThread
ReleaseMutex
ResetEvent
DeleteTimerQueueTimer
ChangeTimerQueueTimer
CreateTimerQueueTimer
SetLastError
lstrcmpiA
InitializeCriticalSection
DeleteCriticalSection
HeapDestroy
InterlockedIncrement
InterlockedDecrement
LeaveCriticalSection
EnterCriticalSection
lstrlenW
CloseHandle
lstrcpyW
lstrcatW
GetModuleFileNameW
LoadLibraryW
FreeLibrary
WaitForSingleObject
SetEvent
GetProcAddress
user32
LoadStringW
PostThreadMessageW
CharNextW
DispatchMessageW
GetMessageW
MsgWaitForMultipleObjects
TranslateMessage
PeekMessageW
ole32
CoGetCallContext
CLSIDFromString
CoTaskMemAlloc
CoCreateInstance
CoSuspendClassObjects
CoRevokeClassObject
CoInitializeEx
CoInitializeSecurity
CoUninitialize
CoRegisterClassObject
oleaut32
SysAllocStringLen
SysFreeString
LoadRegTypeLi
SysStringLen
VariantInit
VariantTimeToSystemTime
VariantChangeTypeEx
SafeArrayCreateVector
SafeArrayAccessData
VariantChangeType
VariantCopy
VariantClear
SysAllocString
LoadTypeLi
RegisterTypeLi
SystemTimeToVariantTime
SafeArrayUnaccessData
ntdll
_ltow
Sections
.text Size: 88KB - Virtual size: 87KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 29KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
vpfdyim Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE