Static task
static1
Behavioral task
behavioral1
Sample
42a585144d4ede74cce046579bf2739e586e0148dc59d7374782246cc044788c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
42a585144d4ede74cce046579bf2739e586e0148dc59d7374782246cc044788c.exe
Resource
win10v2004-20220901-en
General
-
Target
42a585144d4ede74cce046579bf2739e586e0148dc59d7374782246cc044788c
-
Size
524KB
-
MD5
81339d8922c0c31a97869cc0f081a559
-
SHA1
14d0a97f7c6a640dc74724dfe9564f9129bd41b6
-
SHA256
42a585144d4ede74cce046579bf2739e586e0148dc59d7374782246cc044788c
-
SHA512
35d0effdddefe3689d5e55514a893434131cee9d404f1a333b4920cbc500e69b9cb1ee8751e2363d34d9aea695c8b75267a0428216ecd727d85a911d047f4632
-
SSDEEP
12288:bA//r51gjmKLRF3+PNGDX7wzGoDdR30Fr:U//ILRl+FGDX7wzdDdR30F
Malware Config
Signatures
Files
-
42a585144d4ede74cce046579bf2739e586e0148dc59d7374782246cc044788c.exe windows x86
e95d5a38706297ff1e71cbc58557da3e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_FORCE_INTEGRITY
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
memmng
?InitMemMng@@YAHXZ
prremote
PRRegisterObject
PRCreateProcess
PRStopServer
PRIsValidProxy
PRInitialize
PRCloseProcessRequest
PRDeinitialize
PRUnregisterObject
PRGetObjectProxy
PRReleaseObjectProxy
fssync
FSSync_ScreeSet
FSSync_Init
FSSync_DR
FSSync_DUR
FSSync_DACL
FSSync_ScreeState
FSSync_ScreeStateEx
FSSync_ScreeStateEx2
FSSync_Done
FSSync_SetCheck
FSSync_ScreeActive
FSSync_Remove
FSSync_ScreeNotify
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
kernel32
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
GetFileSize
GetCurrentProcessId
GetCurrentThreadId
CompareFileTime
GetLastError
GetDiskFreeSpaceExA
UnmapViewOfFile
WaitForMultipleObjects
CreateProcessA
MultiByteToWideChar
MapViewOfFile
DuplicateHandle
CreateEventA
CreateFileMappingA
GetFileAttributesA
GetModuleFileNameA
WideCharToMultiByte
SetEvent
DeleteFileA
FindClose
FindNextFileA
FindFirstFileA
ReleaseMutex
lstrcpynA
GetComputerNameA
lstrlenA
GetExitCodeProcess
GetDriveTypeA
CreateThread
GetModuleHandleA
OutputDebugStringA
CreateMutexW
OpenMutexW
GetModuleFileNameW
GetVersionExA
GetFileType
GetStdHandle
CreateMutexA
OpenMutexA
ExpandEnvironmentStringsW
GetPrivateProfileStringW
GetPrivateProfileIntW
FindFirstFileW
CreateProcessW
SetProcessAffinityMask
SetErrorMode
InitializeCriticalSection
DeleteCriticalSection
lstrcpyA
LeaveCriticalSection
EnterCriticalSection
SetProcessWorkingSetSize
FreeConsole
SetConsoleCtrlHandler
LoadLibraryW
lstrcatA
ExpandEnvironmentStringsA
GetTickCount
LocalFree
FormatMessageA
SetConsoleMode
GetConsoleMode
SetConsoleTitleA
AllocConsole
GetCurrentThread
SetConsoleCursorPosition
FillConsoleOutputAttribute
FillConsoleOutputCharacterA
GetConsoleScreenBufferInfo
GetFullPathNameA
GetTempFileNameA
CreateDirectoryA
GetTempPathA
lstrlenW
GetVersion
GetLocalTime
CreateSemaphoreA
ReleaseSemaphore
VirtualAlloc
VirtualFree
FileTimeToLocalFileTime
GetSystemTimeAsFileTime
WaitForSingleObject
GetExitCodeThread
CreateFileA
WriteFile
CloseHandle
FlushFileBuffers
LoadLibraryA
GetProcAddress
FreeLibrary
Sleep
HeapFree
QueryPerformanceCounter
GetProcessHeap
HeapAlloc
InterlockedExchange
InterlockedCompareExchange
GetStartupInfoA
UnhandledExceptionFilter
IsDebuggerPresent
GetCommandLineW
user32
wsprintfA
CharUpperBuffA
GetSystemMetrics
RegisterWindowMessageA
PostMessageA
ExitWindowsEx
DefWindowProcA
IsWindow
DispatchMessageA
TranslateMessage
GetMessageA
PeekMessageA
MsgWaitForMultipleObjects
DestroyWindow
CreateWindowExA
RegisterClassA
advapi32
CopySid
RegSetValueExA
RegCloseKey
RegQueryValueExA
SetFileSecurityA
RegOpenKeyExW
RegNotifyChangeKeyValue
OpenThreadToken
RevertToSelf
SetThreadToken
InitializeAcl
AddAccessAllowedAce
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
SetSecurityDescriptorSacl
AllocateAndInitializeSid
FreeSid
StartServiceCtrlDispatcherA
RegisterServiceCtrlHandlerExA
StartServiceA
ControlService
QueryServiceStatus
DeleteService
CreateServiceA
RegSetValueExW
RegDeleteValueA
SetServiceStatus
RegOpenKeyA
RegQueryValueExW
GetLengthSid
IsValidSid
LookupAccountNameA
GetUserNameA
CloseServiceHandle
OpenServiceA
OpenSCManagerA
RegCreateKeyA
UnlockServiceDatabase
ChangeServiceConfigA
LockServiceDatabase
RegOpenKeyExA
shell32
SHFileOperationA
ShellExecuteExA
msvcr80
_encode_pointer
_lock
_unlock
_onexit
_decode_pointer
_except_handler4_common
_amsg_exit
__getmainargs
_cexit
_exit
_XcptFilter
exit
_acmdln
_initterm
_initterm_e
__dllonexit
_wcsicmp
_controlfp_s
_invoke_watson
?_type_info_dtor_internal_method@type_info@@QAEXXZ
?terminate@@YAXXZ
_crt_debugger_hook
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_mbscmp
_wtoi
strchr
memcpy
memmove
_set_invalid_parameter_handler
atoi
??0exception@std@@QAE@ABQBD@Z
?what@exception@std@@UBEPBDXZ
??1exception@std@@UAE@XZ
??3@YAXPAX@Z
??0exception@std@@QAE@XZ
__CxxFrameHandler3
_vsnprintf_s
sscanf_s
memset
sprintf_s
strcpy_s
_CxxThrowException
??0exception@std@@QAE@ABV01@@Z
_invalid_parameter_noinfo
??2@YAPAXI@Z
strrchr
wcsrchr
_mbschr
_mbsicmp
_mbsnbicmp
_time32
printf
_getch
sprintf
_wmakepath
_wsplitpath
vsprintf_s
_set_error_mode
malloc
free
__argc
__argv
_snprintf_s
_beginthreadex
_itoa
setlocale
_mbslen
??_U@YAPAXI@Z
??_V@YAXPAX@Z
setvbuf
_fdopen
_open_osfhandle
__iob_func
_ismbblead
_localtime32
fflush
fprintf
_vsnprintf
fclose
fgets
fopen
strerror
_errno
_snprintf
getchar
getc
_flushall
sscanf
_splitpath
_mbsnbcat_s
_mbsnbcpy_s
_configthreadlocale
msvcp80
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@ABV01@@Z
??Y?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@ABV01@@Z
??Y?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@PBD@Z
??Y?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@D@Z
??$?HDU?$char_traits@D@std@@V?$allocator@D@1@@std@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@ABV10@PBD@Z
??1?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE@XZ
??0?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE@ABV01@@Z
??Y?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAEAAV01@PB_W@Z
??Y?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAEAAV01@_W@Z
??0?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE@PB_W@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
Sections
.text Size: 224KB - Virtual size: 221KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 60KB - Virtual size: 59KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 20KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.vmp0 Size: 192KB - Virtual size: 1.3MB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE