Static task
static1
Behavioral task
behavioral1
Sample
b596dac54a0ae8edc7137c852881074e8cabcdb1205a71264c8fbeef4fb269c1.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b596dac54a0ae8edc7137c852881074e8cabcdb1205a71264c8fbeef4fb269c1.exe
Resource
win10v2004-20220901-en
General
-
Target
b596dac54a0ae8edc7137c852881074e8cabcdb1205a71264c8fbeef4fb269c1
-
Size
65KB
-
MD5
5b1c3e6aea52ccdb4ea7ee9fac8bc4ef
-
SHA1
26095dce1c0f55c4ee6f10a56c166831b497f2f6
-
SHA256
b596dac54a0ae8edc7137c852881074e8cabcdb1205a71264c8fbeef4fb269c1
-
SHA512
105131c7bba6e038309d9c239397f9a8adaeea844846fdd8c46748f65c7fd7c182f99b4de85f3c88af8a834d72545b2dce24ae137b72bad7ec4633a695c060b2
-
SSDEEP
1536:jMi8nqF4cNNRviJMDtzo/ek8pPFHvFnLMAk:AdI4WviJgtzomkO9Hv9
Malware Config
Signatures
Files
-
b596dac54a0ae8edc7137c852881074e8cabcdb1205a71264c8fbeef4fb269c1.exe windows x86
16660a94f8a6a5052fe5334a712f36be
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegDeleteValueW
RegCloseKey
RegCreateKeyExW
RegOpenKeyExW
RegSetValueExW
RegQueryInfoKeyW
GetTraceEnableFlags
GetTraceEnableLevel
GetTraceLoggerHandle
RegisterTraceGuidsW
UnregisterTraceGuids
RegEnumKeyExW
TraceMessage
kernel32
lstrlenW
RaiseException
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
GetLastError
LoadLibraryW
GetProcAddress
GetModuleHandleW
lstrcmpiW
GetModuleFileNameW
Sleep
GetCurrentThreadId
InterlockedIncrement
InterlockedDecrement
SetEvent
FreeLibrary
MultiByteToWideChar
SizeofResource
LoadResource
FindResourceW
LoadLibraryExW
GetCommandLineW
DebugBreak
FormatMessageW
InterlockedExchange
GetVersionExA
OutputDebugStringA
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetModuleHandleA
SetUnhandledExceptionFilter
GetStartupInfoW
InterlockedCompareExchange
user32
UnregisterClassA
PostThreadMessageW
TranslateMessage
DispatchMessageW
CharUpperW
CharNextW
GetMessageW
msvcrt
malloc
free
memcpy_s
wcscpy_s
wcsncpy_s
wcscat_s
??_V@YAXPAX@Z
??_U@YAPAXI@Z
memset
??3@YAXPAX@Z
_controlfp
?terminate@@YAXXZ
_onexit
_lock
__dllonexit
_unlock
_errno
realloc
_except_handler4_common
__p__commode
__set_app_type
__p__fmode
_initterm
__setusermatherr
_amsg_exit
_wcmdln
exit
_XcptFilter
_exit
_cexit
__wgetmainargs
??2@YAPAXI@Z
_purecall
ole32
CoTaskMemAlloc
CoTaskMemRealloc
CoRevokeClassObject
CoRegisterClassObject
PropVariantClear
CoCreateInstance
StringFromGUID2
CoUninitialize
CoInitializeEx
CoTaskMemFree
oleaut32
GetErrorInfo
VarUI4FromStr
RegisterTypeLi
SysStringLen
UnRegisterTypeLi
LoadTypeLi
SysAllocString
SysFreeString
shlwapi
SHStrDupW
propsys
PropVariantToGUID
PropVariantToUInt32
winsync
ord1
Sections
.text Size: 30KB - Virtual size: 30KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 29KB - Virtual size: 30KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
signxxh Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE