Static task
static1
Behavioral task
behavioral1
Sample
b56133cad92c776cfbf82cd69cd484eb75aa99e363e855f0e61c1f0288a28b88.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
b56133cad92c776cfbf82cd69cd484eb75aa99e363e855f0e61c1f0288a28b88.exe
Resource
win10v2004-20220812-en
General
-
Target
b56133cad92c776cfbf82cd69cd484eb75aa99e363e855f0e61c1f0288a28b88
-
Size
566KB
-
MD5
54e1f3e0e97ef5734d33b99586cc2e32
-
SHA1
8e9300fa7ff1b7276ab9b6ad59d41f0226faa268
-
SHA256
b56133cad92c776cfbf82cd69cd484eb75aa99e363e855f0e61c1f0288a28b88
-
SHA512
ecdc5612bb7c2362805b323f326324f953d19c9e33940c2a951613cbd957cd80e1d732d9a15d29cc0bcc41cdf037f4115e85c816ad5b12ffd85951e71ba36694
-
SSDEEP
12288:K80LbGeo0+wVsLKZGBcUOYpNcK9P+G+4hM3BrUUaCz:K80LbC+Y4YpNcK9Wz4hMxrUfI
Malware Config
Signatures
Files
-
b56133cad92c776cfbf82cd69cd484eb75aa99e363e855f0e61c1f0288a28b88.exe windows x86
286513fbd0d7caf5c01d8e55b0595ac7
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
GetTraceEnableFlags
GetTraceEnableLevel
GetTraceLoggerHandle
RegisterTraceGuidsW
UnregisterTraceGuids
TraceEvent
ControlTraceW
LookupAccountSidW
LsaOpenPolicy
LsaQueryInformationPolicy
GetSidSubAuthorityCount
GetSidLengthRequired
GetLengthSid
GetSidSubAuthority
LsaFreeMemory
LsaClose
RegQueryInfoKeyW
RegEnumKeyW
RegFlushKey
RegEnumValueW
RegDeleteValueW
RegDeleteKeyW
RegQueryValueExW
RegSetValueExW
InitiateSystemShutdownW
RegCreateKeyExW
RegOpenKeyExW
RegCloseKey
kernel32
GetFileAttributesW
CompareStringW
LoadLibraryW
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
SetFileAttributesW
CopyFileW
CreateFileW
FlushFileBuffers
GetExitCodeProcess
CreateProcessW
LoadLibraryExW
OpenThread
CreateEventW
GetFullPathNameW
CreateDirectoryW
WritePrivateProfileStringW
SetThreadExecutionState
GlobalFree
GetModuleFileNameW
GetLastError
GetProcessHeap
HeapFree
GetVersionExW
GetModuleHandleW
GetProcAddress
InitializeCriticalSection
InterlockedExchange
Sleep
InterlockedCompareExchange
GetStartupInfoW
SetUnhandledExceptionFilter
GetModuleHandleA
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
HeapAlloc
ExpandEnvironmentStringsW
SetLastError
LocalFree
lstrlenW
CloseHandle
SetEvent
WaitForSingleObject
CreateThread
FreeLibrary
msvcrt
_vsnwprintf
memset
_vsnprintf
memcpy
_vscwprintf
_wcsnicmp
__wgetmainargs
_cexit
_exit
_XcptFilter
exit
_wcmdln
_initterm
_amsg_exit
__setusermatherr
__p__commode
__p__fmode
__set_app_type
_unlock
__dllonexit
_lock
_onexit
?terminate@@YAXXZ
_except_handler4_common
wcsrchr
_controlfp
wcschr
ole32
CoInitializeEx
CoUninitialize
CoTaskMemFree
shell32
CommandLineToArgvW
unattend
UnattendCtxSerializeSettingsStream
UnattendCtxCleanup
UnattendCtxDeserializeWithResults
UnattendCtxSerialize
UnattendFreeNode
UnattendCtxGetFlagByNode
UnattendAddResults
UnattendCtxOpenNode
UnattendCtxCancelModify
UnattendCtxCommitModify
UnattendCtxReplaceMatchedNodesWithText
UnattendFindFileFromCmdLine
UnattendFindAnswerFileWithResults
UnattendCtxGetEnumValueByNode
UnattendCtxBeginModify
UnattendMarkPassUsedInCtx
UnattendFreeResults
actionqueue
GenerateActionQueue
ProcessActionQueue
user32
LoadStringW
MessageBoxW
SystemParametersInfoW
UnregisterHotKey
GetMessageW
RegisterHotKey
PostThreadMessageW
netapi32
NetApiBufferFree
NetUserGetInfo
NetUserSetInfo
ntdll
RtlAdjustPrivilege
RtlFreeHeap
RtlAllocateHeap
NtSetInformationFile
RtlNtStatusToDosError
oleaut32
SysFreeString
Sections
.text Size: 56KB - Virtual size: 55KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.vmp0 Size: 500KB - Virtual size: 1.6MB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE