Static task
static1
Behavioral task
behavioral1
Sample
ac62391cf9a35ac6bef8bd793c2a2dd286a4c48dba5cbdc3eff9c61a2d111244.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
ac62391cf9a35ac6bef8bd793c2a2dd286a4c48dba5cbdc3eff9c61a2d111244.exe
Resource
win10v2004-20220901-en
General
-
Target
ac62391cf9a35ac6bef8bd793c2a2dd286a4c48dba5cbdc3eff9c61a2d111244
-
Size
605KB
-
MD5
77976ab50fd985fbc0d324e7583cd220
-
SHA1
e76332f3ebce425d9eee206cbc6ccb6a19d2e8d1
-
SHA256
ac62391cf9a35ac6bef8bd793c2a2dd286a4c48dba5cbdc3eff9c61a2d111244
-
SHA512
d0d83398bdb78a28386d3dbfd510a3661a251f50e99a4e44f66cc9018e93b660b5823fca8a5ca872642a83faf4afca15394294ce641fb2df285ba1fecaeeb074
-
SSDEEP
12288:4/EAFlaMozFxocOqTfWGYrUqGJKZKirNzXUWY+ID:AEAFleFefrbNKidg
Malware Config
Signatures
Files
-
ac62391cf9a35ac6bef8bd793c2a2dd286a4c48dba5cbdc3eff9c61a2d111244.exe windows x64
12b20ae62a34ee5d283bf41c1793febd
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
advapi32
IsTextUnicode
kernel32
ExitProcess
GetCommandLineW
FreeLibrary
LoadLibraryExW
GetCurrentProcess
WaitForSingleObject
WriteConsoleInputA
SetEvent
GetModuleHandleW
GetProcessHeap
ReadConsoleW
WriteFile
InitializeCriticalSection
GetConsoleCP
WideCharToMultiByte
LoadLibraryW
GetConsoleMode
FormatMessageW
HeapDestroy
LeaveCriticalSection
SetConsoleMode
WriteConsoleW
ReadFile
GetConsoleOutputCP
GetStdHandle
SetThreadPreferredUILanguages
GetLastError
SetLastError
GetProcAddress
SetStdHandle
EnterCriticalSection
CancelIoEx
LocalAlloc
GetFileType
SetConsoleCtrlHandler
CreateEventW
WaitForMultipleObjects
HeapSetInformation
DeleteCriticalSection
DuplicateHandle
CloseHandle
LocalFree
CreateThread
SetUnhandledExceptionFilter
QueryPerformanceCounter
GetTickCount
Sleep
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
UnhandledExceptionFilter
msvcrt
_purecall
isdigit
_vsnwprintf
__CxxFrameHandler3
_snwscanf_s
_strnicmp
_wcsicmp
?terminate@@YAXXZ
_onexit
free
memcpy
_lock
__dllonexit
_unlock
__set_app_type
_fmode
_commode
__setusermatherr
_amsg_exit
_initterm
exit
_cexit
_exit
_XcptFilter
__C_specific_handler
malloc
__wgetmainargs
_wcsnicmp
memset
ntdll
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
EtwGetTraceLoggerHandle
EtwUnregisterTraceGuids
EtwRegisterTraceGuidsW
EtwLogTraceEvent
EtwGetTraceEnableFlags
EtwGetTraceEnableLevel
user32
LoadStringW
LoadStringA
credui
CredUICmdLinePromptForCredentialsW
wsmsvc
WSManCloseOperation
WSManCloseShell
WSManRunShellCommand
WSManCloseCommand
WSManSetSessionOption
WSManSendShellInput
WSManSignalShell
WSManCloseSession
?Alloc@WSManMemory@@SAPEAX_KAEBVCallSite@TestSystem@@W4Mode@3@@Z
?Free@WSManMemory@@SAXPEAXAEBVCallSite@TestSystem@@@Z
WSManCreateShell
WSManInitialize
WSManDeinitialize
WSManCreateSession
WSManReceiveShellOutput
Sections
.text Size: 42KB - Virtual size: 42KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 556KB - Virtual size: 2.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE