Static task
static1
Behavioral task
behavioral1
Sample
07fc4af354edcf57d5ed9f94becfcf0e2d5cd8d748eb93595b80621e34e3d592.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
07fc4af354edcf57d5ed9f94becfcf0e2d5cd8d748eb93595b80621e34e3d592.exe
Resource
win10v2004-20220812-en
General
-
Target
07fc4af354edcf57d5ed9f94becfcf0e2d5cd8d748eb93595b80621e34e3d592
-
Size
241KB
-
MD5
73480f057f3653618b5cdd3f8be616cd
-
SHA1
7ec089fea00bc85b6fca6f5a61408f82e1e19621
-
SHA256
07fc4af354edcf57d5ed9f94becfcf0e2d5cd8d748eb93595b80621e34e3d592
-
SHA512
65fdba3784505b694fc1d309e1e06e99ed194927a4b4dc10679a679ba218f50a311ee8c25585d281fe9cd0b4490baef35a2c5e8086a228fe126d6cb0dfefe32c
-
SSDEEP
6144:08IauaxNO0TwNLlIN29c4KUkf45qB/3La+3r:qauau0T2by4YWk/bJ7
Malware Config
Signatures
Files
-
07fc4af354edcf57d5ed9f94becfcf0e2d5cd8d748eb93595b80621e34e3d592.exe windows x86
06aaa17a234d9e965a577c00e3874cba
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
OpenProcessToken
AdjustTokenPrivileges
LookupPrivilegeValueW
SetFileSecurityW
SetSecurityDescriptorOwner
SetSecurityDescriptorDacl
GetSecurityInfo
InitializeSecurityDescriptor
GetTokenInformation
AddAce
InitializeAcl
GetLengthSid
GetAclInformation
GetSecurityDescriptorDacl
GetFileSecurityW
FreeSid
LookupAccountNameW
AllocateAndInitializeSid
CheckTokenMembership
kernel32
CloseHandle
OpenProcess
GetCurrentProcessId
GetLastError
GetComputerNameW
LocalFree
CreateFileW
GetVolumeInformationW
GetVolumePathNameW
FindClose
FindNextFileW
FindFirstFileW
GetCurrentDirectoryW
ReadFile
FlushConsoleInputBuffer
SetConsoleMode
GetConsoleMode
GetStdHandle
GetFileAttributesW
GetFullPathNameW
HeapSetInformation
SetThreadUILanguage
SetLastError
GetComputerNameExW
GetModuleFileNameW
ReadConsoleW
WriteConsoleW
ExitProcess
GetConsoleOutputCP
HeapReAlloc
HeapFree
HeapSize
HeapAlloc
GetProcessHeap
HeapValidate
WideCharToMultiByte
MultiByteToWideChar
CompareStringA
GetThreadLocale
CompareStringW
lstrlenW
lstrlenA
GetFileType
VerSetConditionMask
VerifyVersionInfoW
FormatMessageW
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
InterlockedExchange
Sleep
InterlockedCompareExchange
SetUnhandledExceptionFilter
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
GetModuleHandleA
msvcrt
_controlfp
_except_handler4_common
?terminate@@YAXXZ
__set_app_type
__p__fmode
__p__commode
__setusermatherr
_amsg_exit
_initterm
exit
_XcptFilter
_exit
_cexit
__wgetmainargs
wcsrchr
wcspbrk
_wcsicmp
memcpy
memset
wcstok
_iob
_vsnwprintf
_memicmp
_get_osfhandle
_errno
_fileno
toupper
fflush
fprintf
__iob_func
wcstod
wcstoul
wcstol
user32
CharUpperW
LoadStringW
mpr
WNetCancelConnection2W
WNetGetLastErrorW
WNetAddConnection2W
secur32
GetUserNameExW
ws2_32
WSACleanup
GetAddrInfoW
WSAGetLastError
FreeAddrInfoW
GetNameInfoW
WSAStartup
shlwapi
StrStrIW
StrChrW
StrStrW
StrChrIW
netapi32
NetApiBufferFree
NetServerGetInfo
version
VerQueryValueW
GetFileVersionInfoSizeW
GetFileVersionInfoW
Sections
.text Size: 43KB - Virtual size: 43KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.vmp0 Size: 192KB - Virtual size: 1.3MB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE