Static task
static1
Behavioral task
behavioral1
Sample
b790b5e471b65cb13421ce9b77017051dac54eb5b623ce45ee52863c11082289.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b790b5e471b65cb13421ce9b77017051dac54eb5b623ce45ee52863c11082289.exe
Resource
win10v2004-20220812-en
General
-
Target
b790b5e471b65cb13421ce9b77017051dac54eb5b623ce45ee52863c11082289
-
Size
337KB
-
MD5
96ef71419e87f0d98ae0d1124d175e40
-
SHA1
2f37e8aa22ca4e9e212f1093fe2a99d908ab3ff5
-
SHA256
b790b5e471b65cb13421ce9b77017051dac54eb5b623ce45ee52863c11082289
-
SHA512
b5ae28417ec2a15a39b5f8082b3af2a6923f7d7202a0d7a2641d27811c814d481a08e9bbfa724de450504804a2687dafc76650405cb67814ffe4c60e8944c7d8
-
SSDEEP
6144:UyXcYqOH+rvcmKwLuDmGN8GpfM2S5Wd0mMV:gvc5TUr5W8
Malware Config
Signatures
Files
-
b790b5e471b65cb13421ce9b77017051dac54eb5b623ce45ee52863c11082289.exe windows x86
f4d1f84bfb6a2101fc4ec4ff112b132e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegDeleteKeyW
RegCloseKey
RegDeleteValueW
RegEnumValueW
RegSetValueExW
RegCreateKeyExW
SetNamedSecurityInfoW
GetSecurityDescriptorControl
GetSecurityDescriptorDacl
ConvertStringSecurityDescriptorToSecurityDescriptorW
RegQueryValueExW
RegOpenKeyExW
RegEnumKeyExW
CloseServiceHandle
ControlService
QueryServiceStatus
ChangeServiceConfigW
QueryServiceConfigW
OpenServiceW
OpenSCManagerW
RegEnumKeyW
RegQueryValueExA
RegOpenKeyExA
RegQueryInfoKeyW
SetEntriesInAclW
ConvertStringSidToSidW
GetNamedSecurityInfoW
StartServiceW
kernel32
GetLongPathNameW
WritePrivateProfileStringW
GetPrivateProfileStringW
GetProfileStringW
WriteProfileStringW
CreateFileA
GetFileSize
GetTempPathA
SetFilePointer
WriteFile
GetTempPathW
GetModuleFileNameW
GetSystemDefaultLangID
GetWindowsDirectoryA
CreateDirectoryA
LoadLibraryExW
CopyFileW
CreateFileW
GetFileTime
GetTimeZoneInformation
GetVersionExA
GetVersionExW
GetFileAttributesA
LoadLibraryW
GetProcAddress
FreeLibrary
CloseHandle
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetCurrentProcessId
GetCurrentThreadId
QueryPerformanceCounter
GetModuleHandleA
RtlUnwind
GetStartupInfoA
InterlockedCompareExchange
InterlockedExchange
ExpandEnvironmentStringsW
lstrlenW
GetSystemWindowsDirectoryW
FindFirstFileExW
lstrcmpW
GetShortPathNameW
Sleep
GetCurrentDirectoryW
SetCurrentDirectoryW
FindFirstFileW
FindNextFileW
FindClose
GetTickCount
CreateHardLinkW
SetFileAttributesW
GetSystemTimeAsFileTime
FileTimeToSystemTime
GetFileAttributesW
GetWindowsDirectoryW
MoveFileW
MoveFileExW
RemoveDirectoryW
CreateDirectoryW
GetSystemDirectoryW
GetLastError
DeleteFileW
SetLastError
LocalFree
GetLocalTime
GetVersion
user32
LoadStringW
CharNextA
msvcrt
malloc
_lock
__dllonexit
_unlock
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
_amsg_exit
_initterm
_acmdln
exit
_ismbblead
_XcptFilter
_exit
_cexit
__getmainargs
_wcsupr
??_U@YAPAXI@Z
??_V@YAXPAX@Z
free
_wtol
mbstowcs
memset
wcschr
_wcslwr
wcsstr
wcsrchr
_wcsicmp
_wcsnicmp
_vsnwprintf
__setusermatherr
memcpy
_vsnprintf
swscanf
_wtoi
_itow
iswalnum
iswalpha
_onexit
ole32
CoCreateGuid
CoUninitialize
CoCreateInstance
CoInitialize
OleUninitialize
OleInitialize
StringFromGUID2
oleaut32
VariantTimeToSystemTime
SystemTimeToVariantTime
version
GetFileVersionInfoW
GetFileVersionInfoSizeW
VerQueryValueW
shell32
SHGetPathFromIDListA
SHGetSpecialFolderPathW
SHChangeNotify
SHGetFolderPathW
ShellExecuteW
SHSetLocalizedName
SHGetMalloc
SHGetSpecialFolderLocation
SHGetPathFromIDListW
shlwapi
PathIsDirectoryW
PathAddBackslashW
PathRemoveBlanksW
PathAppendW
PathRemoveFileSpecW
PathAddBackslashA
wmdrmsdk
WMDRMCreateProvider
Sections
.text Size: 272KB - Virtual size: 272KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 13KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 45KB - Virtual size: 46KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
atbnsac Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE