Static task
static1
Behavioral task
behavioral1
Sample
a89e43b15b880c1b3bb0cc5692654b6e0965f05b0f882f951b3e06db1c0e22e7.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
a89e43b15b880c1b3bb0cc5692654b6e0965f05b0f882f951b3e06db1c0e22e7.exe
Resource
win10v2004-20220812-en
General
-
Target
a89e43b15b880c1b3bb0cc5692654b6e0965f05b0f882f951b3e06db1c0e22e7
-
Size
73KB
-
MD5
962f568619d6bd9eb7a4c8dcb2021058
-
SHA1
03a0c67c3c8c1fe8f17bf5bf58e9c4b80ef92ece
-
SHA256
a89e43b15b880c1b3bb0cc5692654b6e0965f05b0f882f951b3e06db1c0e22e7
-
SHA512
3c0951adb85d61d78a429a882c25a61d7affe39bcdca95ea4a8ad852f8c5de2a1fa4ed36d3c5d85759ea0dbaf672c9979d0da5b87f1efd7dfa2e1ef40c40f092
-
SSDEEP
1536:s9tzJvjb4fRIRDoaqK048uVkclNsEVmRu8S3+rID3LGMhZWt2/ai:2U8Do0ECkcw0s5S35GMhst2/ai
Malware Config
Signatures
Files
-
a89e43b15b880c1b3bb0cc5692654b6e0965f05b0f882f951b3e06db1c0e22e7.exe windows x86
35799ed6badbcbd7b2935dec46e515c5
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
LookupPrivilegeValueW
OpenProcessToken
EventRegister
EventUnregister
EventWrite
AdjustTokenPrivileges
kernel32
GetConsoleMode
GetFileType
CloseHandle
GetLastError
GetCurrentProcess
CompareStringW
LocalFree
LocalAlloc
WideCharToMultiByte
WriteConsoleW
GetModuleHandleW
GetStdHandle
SetThreadPreferredUILanguages
GetConsoleOutputCP
HeapSetInformation
FormatMessageW
SearchPathW
GetUserDefaultUILanguage
GetSystemDefaultUILanguage
UnmapViewOfFile
FreeLibrary
GetLocaleInfoW
GetVersionExW
CreateFileW
CreateFileMappingW
MapViewOfFile
LoadLibraryExW
SetLastError
GetSystemDirectoryW
FindResourceExW
LoadResource
LockResource
GetSystemTime
GetTimeZoneInformation
GetDynamicTimeZoneInformation
EnterCriticalSection
LeaveCriticalSection
CompareStringOrdinal
DeleteCriticalSection
InitializeCriticalSection
RegQueryValueExW
IsTimeZoneRedirectionEnabled
InterlockedExchange
Sleep
InterlockedCompareExchange
SetUnhandledExceptionFilter
GetModuleHandleA
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
UnhandledExceptionFilter
IsValidLocale
RegEnumKeyExW
RegCloseKey
SystemTimeToFileTime
FileTimeToSystemTime
SetDynamicTimeZoneInformation
GetLocalTime
RegOpenKeyExW
msvcrt
_controlfp
_except_handler4_common
?terminate@@YAXXZ
__set_app_type
__p__fmode
__p__commode
__setusermatherr
_amsg_exit
_initterm
exit
_XcptFilter
_exit
_cexit
__wgetmainargs
_wsetlocale
_wcsicmp
memset
wprintf
??2@YAPAXI@Z
_vsnwprintf
_itow_s
_wtoi
wcschr
wcsncmp
_wcsnicmp
memcpy
bsearch
user32
LoadStringW
Sections
.text Size: 37KB - Virtual size: 37KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 29KB - Virtual size: 31KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
apobmrg Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE