Static task
static1
Behavioral task
behavioral1
Sample
62ebec6beae0adf6deef8b936d8512e6cb11a60536360505fbf694de31d19745.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
62ebec6beae0adf6deef8b936d8512e6cb11a60536360505fbf694de31d19745.exe
Resource
win10v2004-20220901-en
General
-
Target
62ebec6beae0adf6deef8b936d8512e6cb11a60536360505fbf694de31d19745
-
Size
376KB
-
MD5
9608133ad836ff56b42630918b9b0330
-
SHA1
83e12cc67b709788649a983b2cb07c6fbbbf2dac
-
SHA256
62ebec6beae0adf6deef8b936d8512e6cb11a60536360505fbf694de31d19745
-
SHA512
a322d19a93a41b1870bf499c4737a4fb35292f46bacdca7948510976c31edbaf106d8d2a5c03902cf74a6f99ed23fe73e9fc8d91c2d0d136f1b92405b1583dcf
-
SSDEEP
6144:+g2sZP1xzzonNs869KtITpctMxLoLh08Sf5+Szj:xfwnS8692IStMxLoL1Sf5+Sz
Malware Config
Signatures
Files
-
62ebec6beae0adf6deef8b936d8512e6cb11a60536360505fbf694de31d19745.exe windows x86
eadd0d8f18e4a0b0bc43588a46a84aeb
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapAlloc
GetProcessHeap
HeapSetInformation
DeleteFileW
HeapFree
CreateFileW
GetEnvironmentVariableW
GetCurrentDirectoryA
GetEnvironmentVariableA
FindResourceW
GetFileTime
LoadLibraryA
GetModuleFileNameA
FindResourceExW
LoadLibraryExW
GetSystemDefaultUILanguage
GetUserDefaultUILanguage
SearchPathW
SetConsoleMode
ReadConsoleInputW
ReadConsoleW
FindFirstFileW
FindNextFileW
FindClose
GetConsoleMode
SizeofResource
LoadResource
LockResource
WriteFile
GetLastError
CreateFileA
InterlockedExchange
Sleep
InterlockedCompareExchange
SetUnhandledExceptionFilter
GetModuleHandleA
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
LocalFree
MultiByteToWideChar
GetTimeFormatW
GetDateFormatW
FileTimeToSystemTime
HeapDestroy
HeapCreate
ReadFile
GetFileSize
SetEvent
lstrlenW
WaitForSingleObject
CreateThread
EncodePointer
GetProcAddress
LoadLibraryW
GetVersionExW
SetLastError
GetTempFileNameW
GetTempPathW
SetEndOfFile
SetFilePointer
WideCharToMultiByte
lstrlenA
GetFileMUIPath
ExpandEnvironmentStringsW
SystemTimeToFileTime
TzSpecificLocalTimeToSystemTime
FreeLibrary
FormatMessageW
SystemTimeToTzSpecificLocalTime
DecodePointer
VirtualFree
VirtualAlloc
HeapReAlloc
GlobalFree
FreeResource
GlobalUnlock
GlobalLock
GlobalAlloc
GetUserDefaultLocaleName
UnmapViewOfFile
MapViewOfFile
CreateFileMappingW
WriteConsoleW
GetFileType
GetStdHandle
GetFullPathNameW
GetModuleFileNameW
GetLocaleInfoW
GetModuleHandleW
GetConsoleScreenBufferInfo
SetThreadUILanguage
GetConsoleOutputCP
CloseHandle
msvcrt
ceil
wcstok
_wmakepath_s
_wsplitpath_s
ferror
fgetws
_errno
bsearch
wcsncmp
_makepath_s
strncpy_s
strstr
_splitpath_s
_strcmpi
strcpy_s
vsprintf_s
fputs
_purecall
wcstoul
iswspace
wcstombs_s
_vsnprintf
_wcslwr
fprintf
_stricmp
fwprintf
sprintf_s
_iob
fopen
wcsstr
strncmp
strchr
_wfopen
fclose
memcpy
_getmbcp
_ftol2
_except_handler4_common
_controlfp
free
malloc
?terminate@@YAXXZ
__set_app_type
__p__fmode
__p__commode
__setusermatherr
_amsg_exit
_initterm
exit
_XcptFilter
_exit
??2@YAPAXI@Z
_strnicmp
_wcsnicmp
??3@YAXPAX@Z
wcsrchr
wcschr
qsort
_ftol2_sse
rewind
atol
strtok
_atoi64
isprint
fgets
_cexit
__wgetmainargs
memset
wprintf
_wcsicmp
printf
wcstok_s
_vsnwprintf
advapi32
OpenTraceW
ProcessTrace
CloseTrace
LookupAccountSidW
ConvertSidToStringSidW
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
ntdll
NtOpenThreadToken
RtlRaiseException
RtlEqualUnicodeString
RtlCompareString
RtlAnsiCharToUnicodeChar
RtlCompareMemory
RtlEnterCriticalSection
RtlLeaveCriticalSection
RtlInitializeCriticalSection
RtlDeleteCriticalSection
NtQueryInformationToken
NtClose
NtOpenProcessToken
version
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
shlwapi
SHCreateStreamOnFileEx
user32
LoadStringW
CharToOemW
ole32
CoInitializeEx
CreateStreamOnHGlobal
CoCreateInstance
CoSetProxyBlanket
CoUninitialize
oleaut32
VarDateFromStr
VariantTimeToSystemTime
VariantChangeType
SystemTimeToVariantTime
VarBstrFromDate
VariantInit
VariantClear
SysAllocString
SysStringLen
SysFreeString
tdh
TdhGetPropertySize
TdhGetProperty
TdhGetPropertyOffsetAndSize
TdhUnloadManifest
TdhLoadManifest
TdhGetEventInformation
TdhGetAllEventsInformation
TdhQueryProviderFieldInformation
TdhEnumerateProviderFieldInformation
TdhFormatProperty
TdhGetEventMapInformation
ws2_32
WSAGetLastError
WSACleanup
WSAStartup
WSAAddressToStringW
dbghelp
MakeSureDirectoryPathExists
SymLoadModuleEx
SymUnloadModule64
SymInitialize
SymRegisterCallback64
SymGetTypeInfo
SymSetOptions
SymEnumTypes
wevtapi
EvtIntCreateLocalLogfile
EvtIntRenderResourceEventTemplate
EvtClose
EvtIntWriteXmlEventToLocalLogfile
xmllite
CreateXmlReader
pdh
PdhOpenQueryH
PdhGetDataSourceTimeRangeH
PdhSetQueryTimeRange
PdhCloseLog
PdhBindInputDataSourceW
PdhGetRawCounterValue
PdhAddCounterW
PdhComputeCounterStatistics
PdhCollectQueryData
PdhGetLogFileTypeW
PdhTranslate009CounterW
PdhExpandWildCardPathHW
PdhCloseQuery
PdhParseCounterPathW
Sections
.text Size: 332KB - Virtual size: 332KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 146KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 35KB - Virtual size: 35KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE