Static task
static1
Behavioral task
behavioral1
Sample
909e0d75b39c138efd81911b473c260a0d8b74d8848af9ce3d251d888ec61900.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
909e0d75b39c138efd81911b473c260a0d8b74d8848af9ce3d251d888ec61900.exe
Resource
win10v2004-20220901-en
General
-
Target
909e0d75b39c138efd81911b473c260a0d8b74d8848af9ce3d251d888ec61900
-
Size
125KB
-
MD5
4a2039ce51e15ecf02eadb0dfd364410
-
SHA1
4b5be67f10399d150d8b6274f510bb79abad0e00
-
SHA256
909e0d75b39c138efd81911b473c260a0d8b74d8848af9ce3d251d888ec61900
-
SHA512
2ad30dabd9d5ce9632a066014e98d59d19ad65131ef6d188cfbcd972fd4eb9b08b5808bb355544a44bef5e71f704fe66124df3a2d2ebdd4af4774ec039518c4e
-
SSDEEP
1536:0DKO6DoKxof5Jwzod1vPcZUx0VpFtPmxemwpiqpViifNHc89lEmCfnOZEBzDa3ox:iJoLZUxOpyxeTiEZckvCfntzY
Malware Config
Signatures
Files
-
909e0d75b39c138efd81911b473c260a0d8b74d8848af9ce3d251d888ec61900.exe windows x86
a3f31e43c98d3b6617739a6bc9a94b80
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
malloc
free
_resetstkoflw
_controlfp
_errno
memset
_onexit
_lock
__dllonexit
_unlock
_except_handler4_common
?terminate@@YAXXZ
__set_app_type
__p__fmode
__p__commode
wcstoul
_wcsicmp
??_U@YAPAXI@Z
realloc
??3@YAXPAX@Z
_CxxThrowException
memcpy
_ftol2
__CxxFrameHandler3
_purecall
??2@YAPAXI@Z
_vsnwprintf
memcpy_s
memmove_s
??1type_info@@UAE@XZ
__wgetmainargs
??_V@YAXPAX@Z
_cexit
_exit
_XcptFilter
exit
_wcmdln
_initterm
_amsg_exit
__setusermatherr
ntdll
RtlSubAuthoritySid
RtlInitializeSid
RtlFreeHeap
RtlAllocateHeap
RtlLengthRequiredSid
RtlSetLastWin32ErrorAndNtStatusFromNtStatus
RtlRandomEx
NtClose
NtAlpcCreatePort
NtAlpcAcceptConnectPort
RtlLengthSid
RtlCreateSecurityDescriptor
RtlCreateAcl
RtlAddAccessAllowedAce
RtlSetDaclSecurityDescriptor
AlpcInitializeMessageAttribute
AlpcGetMessageAttribute
NtAlpcSendWaitReceivePort
EtwLogTraceEvent
EtwEventRegister
EtwEventWrite
EtwTraceMessage
EtwGetTraceEnableFlags
EtwGetTraceEnableLevel
EtwGetTraceLoggerHandle
EtwRegisterTraceGuidsW
EtwUnregisterTraceGuids
ShipAssert
ShipAssertMsgW
NtQueryInformationProcess
WinSqmIncrementDWORD
RtlInitUnicodeStringEx
api-ms-win-core-debug-l1-1-0
OutputDebugStringA
api-ms-win-core-errorhandling-l1-1-0
GetLastError
RaiseException
SetUnhandledExceptionFilter
UnhandledExceptionFilter
api-ms-win-core-handle-l1-1-0
CloseHandle
GetHandleInformation
api-ms-win-core-heap-l1-1-0
HeapDestroy
HeapAlloc
HeapFree
HeapSetInformation
HeapSize
HeapReAlloc
GetProcessHeap
api-ms-win-core-interlocked-l1-1-0
InterlockedIncrement
InterlockedDecrement
InterlockedCompareExchange
InterlockedExchange
api-ms-win-core-libraryloader-l1-1-0
FreeLibrary
GetModuleHandleW
GetProcAddress
GetModuleHandleA
LoadLibraryExA
api-ms-win-core-misc-l1-1-0
LocalFree
Sleep
api-ms-win-core-processenvironment-l1-1-0
GetCommandLineW
api-ms-win-core-processthreads-l1-1-0
TerminateProcess
OpenProcessToken
GetCurrentProcess
GetCurrentThreadId
GetStartupInfoW
GetCurrentProcessId
api-ms-win-core-profile-l1-1-0
QueryPerformanceFrequency
QueryPerformanceCounter
api-ms-win-core-synch-l1-1-0
WaitForSingleObject
DeleteCriticalSection
OpenProcess
CreateEventW
SetEvent
InitializeCriticalSection
api-ms-win-core-sysinfo-l1-1-0
GetVersionExA
GetTickCount
GetSystemTimeAsFileTime
api-ms-win-security-base-l1-1-0
SetSecurityDescriptorOwner
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
SetSecurityDescriptorGroup
GetTokenInformation
rpcrt4
RpcImpersonateClient
RpcRevertToSelf
RpcServerUnregisterIfEx
RpcServerUseProtseqEpW
RpcServerRegisterIfEx
I_RpcBindingInqTransportType
I_RpcBindingInqLocalClientPID
NdrServerCall2
mmdevapi
ord9
ord2
ord8
kernel32
UnmapViewOfFile
WaitForMultipleObjects
MapViewOfFile
DelayLoadFailureHook
EnterCriticalSection
LeaveCriticalSection
DuplicateHandle
SizeofResource
LockResource
LoadResource
FindResourceA
FindResourceExA
CreateThread
WerRegisterMemoryBlock
RegEnumKeyExW
RegCloseKey
RegOpenKeyExW
RegQueryValueExW
user32
UnregisterClassA
Sections
.text Size: 87KB - Virtual size: 86KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
RT_CODE Size: 512B - Virtual size: 153B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
RT_BSS Size: - Virtual size: 24B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
RT_DATA Size: 512B - Virtual size: 32B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 31KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
uaowwqx Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE