Static task
static1
Behavioral task
behavioral1
Sample
eaddff315199a3d98488d5a4dcc69a641f8b6b6cb1c3a38602b70f8fba8a3c48.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
eaddff315199a3d98488d5a4dcc69a641f8b6b6cb1c3a38602b70f8fba8a3c48.exe
Resource
win10v2004-20220812-en
General
-
Target
eaddff315199a3d98488d5a4dcc69a641f8b6b6cb1c3a38602b70f8fba8a3c48
-
Size
68KB
-
MD5
901b96937d93c2d3e4b6b45cfcb0e52b
-
SHA1
21c92cfb4ce6791dae33ddbf9365949f3efb336d
-
SHA256
eaddff315199a3d98488d5a4dcc69a641f8b6b6cb1c3a38602b70f8fba8a3c48
-
SHA512
a1a5adad71c9542d2e71c1167ab91cae5c6a0ab7c7cf71dab8d564830c46bb828ca9eeb1af91148c76174fb88eb2cd745c4639188cc9d38b875303f60bbebed5
-
SSDEEP
1536:5Dtqvhjnz0062lZVM8s+vCzDI5MZTqm2S8HM12PdQuc:5MUAMUsDIuTqmJ8HM12lk
Malware Config
Signatures
Files
-
eaddff315199a3d98488d5a4dcc69a641f8b6b6cb1c3a38602b70f8fba8a3c48.exe windows x86
51f7b981cb6c1b911e230356ba0797cf
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
mssws
NetApiBufferFree
GetCommandLineW
DeregisterEventSource
InterlockedCompareExchange
RegisterEventSourceW
ReportEventW
LookupAccountNameW
GetSidSubAuthority
InitializeSid
GetSidLengthRequired
AddAccessAllowedAce
LsaOpenPolicy
LsaRemoveAccountRights
LsaAddAccountRights
LsaClose
I_NetLogonControl
SetSecurityDescriptorGroup
OpenProcessToken
NetGetDCName
SetSecurityDescriptorOwner
IsValidAcl
RegQueryValueExW
GetLengthSid
CopySid
SetSecurityDescriptorDacl
lstrcatW
lstrcpyW
LoadLibraryW
PeekMessageW
DispatchMessageW
GetModuleHandleW
LoadStringW
GetVersionExW
CreateEventW
RegEnumValueW
RegQueryInfoKeyW
RegSetValueExW
RegEnumKeyExW
RegOpenKeyExW
RegDeleteValueW
RegCreateKeyExW
RegDeleteKeyW
lstrcpynW
CharNextW
lstrcmpiW
LoadLibraryExW
FindResourceW
GetModuleFileNameW
GetShortPathNameW
lstrlenW
CreateMutexW
GetEnvironmentVariableW
SetEnvironmentVariableW
NetServerGetInfo
LsaNtStatusToWinError
LsaEnumerateAccountRights
OpenThreadToken
GetTokenInformation
msvcrt
??2@YAPAXI@Z
free
malloc
_EH_prolog
__CxxFrameHandler
?_set_se_translator@@YAP6AXIPAU_EXCEPTION_POINTERS@@@ZP6AXI0@Z@Z
_wcsicmp
_CxxThrowException
_onexit
_controlfp
??1type_info@@UAE@XZ
_except_handler3
__dllonexit
?terminate@@YAXXZ
__p__commode
__set_app_type
__p__fmode
_initterm
_adjust_fdiv
__setusermatherr
exit
__getmainargs
_acmdln
realloc
wcscmp
_exit
_XcptFilter
??3@YAXPAX@Z
printf
wcslen
wcsncpy
iswspace
wcschr
advapi32
OpenSCManagerW
SetTokenInformation
InitializeSecurityDescriptor
ControlService
QueryServiceStatus
DeleteService
StartServiceCtrlDispatcherW
OpenServiceW
CreateServiceW
CloseServiceHandle
ChangeServiceConfigW
RegisterServiceCtrlHandlerW
SetServiceStatus
RegCloseKey
kernel32
HeapReAlloc
FreeLibrary
VirtualFree
MultiByteToWideChar
WaitForSingleObject
GetCurrentProcess
GetProcAddress
LoadLibraryA
SetEvent
GetVersionExA
GetCurrentThread
SetLastError
GetProcessHeap
HeapFree
HeapAlloc
LeaveCriticalSection
EnterCriticalSection
Sleep
GetLastError
CloseHandle
InterlockedIncrement
InitializeCriticalSection
InterlockedDecrement
DeleteCriticalSection
SizeofResource
GetModuleHandleA
lstrlenA
HeapDestroy
LoadResource
GetStartupInfoA
ole32
CoTaskMemRealloc
CoRevokeClassObject
CoRegisterClassObject
CoInitializeSecurity
CoTaskMemAlloc
CoTaskMemFree
CoCreateInstance
CoInitializeEx
CoUninitialize
oleaut32
VarUI4FromStr
RegisterTypeLi
SysFreeString
VariantClear
LoadRegTypeLi
SysStringLen
SysAllocString
LoadTypeLi
user32
RegisterClassExA
MsgWaitForMultipleObjects
DestroyWindow
DefWindowProcA
PostQuitMessage
CreateWindowExA
Sections
.text Size: 52KB - Virtual size: 50KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ