Static task
static1
Behavioral task
behavioral1
Sample
e601afa301e7be1bf495d145f832838606e2e6ba373154b1e32a4cef6ba439f2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e601afa301e7be1bf495d145f832838606e2e6ba373154b1e32a4cef6ba439f2.exe
Resource
win10v2004-20220812-en
General
-
Target
e601afa301e7be1bf495d145f832838606e2e6ba373154b1e32a4cef6ba439f2
-
Size
78KB
-
MD5
7c62ff89d799adcdded6f6455f0a6410
-
SHA1
1ff2ae2f83ace40f8deba00520e6b8ab4379c354
-
SHA256
e601afa301e7be1bf495d145f832838606e2e6ba373154b1e32a4cef6ba439f2
-
SHA512
651d8334a0aeba7582ed8dd6f632313aa4f6ab6aa62dbfbf10a6b3136e8bf384c9832b39d852d9264ccff1e009ef5bd275bf34f523b9caa502b32d142d918c6b
-
SSDEEP
1536:Zf+ziYlJGnDHxxZAo3vVksCoCTpYy5ol:ZfyimIXZn3XBCTpY0
Malware Config
Signatures
Files
-
e601afa301e7be1bf495d145f832838606e2e6ba373154b1e32a4cef6ba439f2.exe windows x86
7902bf509673142574ecb5d14bd25136
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
ConvertSidToStringSidW
RegCloseKey
RegSetValueExW
RegCreateKeyExW
RegOpenKeyExW
RegQueryValueExW
ControlTraceW
EnableTrace
StartTraceW
RegisterTraceGuidsW
UnregisterTraceGuids
GetTraceLoggerHandle
GetTraceEnableLevel
GetTraceEnableFlags
TraceEvent
kernel32
CreateFileW
GetFileAttributesW
WaitForSingleObject
OpenEventW
SetEvent
CreateDirectoryW
GetFullPathNameW
SetLastError
GetModuleFileNameW
HeapAlloc
LoadLibraryW
FreeLibrary
GetProcessHeap
HeapFree
GetProcAddress
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
QueryPerformanceCounter
GetModuleHandleA
SetUnhandledExceptionFilter
GetVersionExW
CreateEventW
InterlockedCompareExchange
InterlockedExchange
LocalFree
CloseHandle
WriteFile
GetLastError
ReadFile
GetModuleHandleW
HeapSetInformation
GetConsoleOutputCP
SetThreadPreferredUILanguages
FormatMessageW
ExpandEnvironmentStringsW
GetTickCount
Sleep
LocalAlloc
GetWindowsDirectoryW
GetFileSize
msvcrt
wcsrchr
_wcsnicmp
memset
memcpy
_vsnwprintf
_onexit
_lock
__dllonexit
_unlock
_controlfp
_except_handler4_common
?terminate@@YAXXZ
__set_app_type
__p__fmode
__p__commode
__setusermatherr
_amsg_exit
_initterm
exit
_XcptFilter
_exit
_cexit
__wgetmainargs
wprintf
fwprintf
swprintf_s
setlocale
_wtoi
printf
wcscpy_s
wcschr
malloc
free
_wcsicmp
_iob
_vsnprintf
user32
LoadStringW
ntdll
RtlAllocateHeap
RtlFreeHeap
DbgPrint
RtlGetNtProductType
RtlNtStatusToDosError
logoncli
DsGetDcNameW
wkscli
NetUseDel
NetUseAdd
NetJoinDomain
netutils
NetApiBufferAllocate
NetApiBufferFree
rpcrt4
UuidToStringW
RpcStringFreeW
netjoin
NetRequestOfflineDomainJoin
NetProvisionComputerAccount
NetpDecodeProvisioningBlob
Sections
.text Size: 36KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 23KB - Virtual size: 23KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE