Static task
static1
Behavioral task
behavioral1
Sample
aaaa4f03c18757ff3bf5a2f931049f05cb2d609d444cbbc8d590c4628c26f604.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
aaaa4f03c18757ff3bf5a2f931049f05cb2d609d444cbbc8d590c4628c26f604.exe
Resource
win10v2004-20220812-en
General
-
Target
aaaa4f03c18757ff3bf5a2f931049f05cb2d609d444cbbc8d590c4628c26f604
-
Size
56KB
-
MD5
74374599fad6ef33eb1b3a644d43cd67
-
SHA1
6b1a18e0389375494afd8585df0f9b668af8e179
-
SHA256
aaaa4f03c18757ff3bf5a2f931049f05cb2d609d444cbbc8d590c4628c26f604
-
SHA512
4bcc873995d1c4150318043f004bb22d7df60e3713a3f6a303849d123780894864fa72cb7ecc5aaa0f87ad812efe94b74d73a733d3af059c14db7dc0ca8a96f9
-
SSDEEP
768:HuQygrKV7TD9zMa+YXmgWTMST0awZh1H9xllMGCV1H9xllMGCNxYRJuI6rHjgDdK:OngrKVZ+ZPf0awZh101GSJh6b8xvZDA
Malware Config
Signatures
Files
-
aaaa4f03c18757ff3bf5a2f931049f05cb2d609d444cbbc8d590c4628c26f604.exe windows x86
45bdd932e986574a74f62f595b7078b6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
imagehlp
SymUnDName
SymSetOptions
SymInitialize
SymGetModuleBase
SymFunctionTableAccess
StackWalk
SymGetModuleInfo
SymCleanup
SymGetSymFromAddr
sqlunirl
_GetUnicodeRedirectionLayer@0
_GetVersionEx@4
_FormatMessage@28
_LoadString@16
_GetProcAddress_@8
atl
ord30
ord23
ord21
ord22
ord18
ord20
ord17
ord16
ord58
ord32
version
GetFileVersionInfoA
VerQueryValueA
GetFileVersionInfoSizeA
kernel32
WriteFile
CloseHandle
FlushFileBuffers
ReadProcessMemory
HeapFree
lstrlenA
HeapAlloc
GetProcessHeap
GetCurrentProcess
Sleep
SetErrorMode
GetEnvironmentVariableA
GetModuleFileNameA
QueryPerformanceFrequency
GlobalMemoryStatus
GetVersionExA
GetSystemInfo
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
FreeLibrary
GetModuleHandleA
LoadLibraryA
lstrcatA
FormatMessageA
GetLastError
GetSystemDefaultLangID
GetSystemDefaultLCID
lstrcpyA
ExpandEnvironmentStringsA
WideCharToMultiByte
ResetEvent
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
SetEvent
InterlockedIncrement
InterlockedDecrement
GetStdHandle
WaitForSingleObject
WaitForMultipleObjects
SetConsoleScreenBufferSize
GetConsoleScreenBufferInfo
SetConsoleCtrlHandler
AllocConsole
CreateFileA
CreateEventA
GetCommandLineA
SetFilePointer
GetCurrentThreadId
user32
MessageBoxA
wsprintfA
advapi32
DeregisterEventSource
ReportEventA
RegisterEventSourceA
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
RegSetValueExA
MakeSelfRelativeSD
GetSecurityDescriptorLength
OpenProcessToken
GetTokenInformation
SetSecurityDescriptorGroup
SetSecurityDescriptorOwner
GetLengthSid
CopySid
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
ole32
CoInitializeEx
CoInitializeSecurity
CoUninitialize
CoCreateInstance
oleaut32
LoadRegTypeLi
SysFreeString
SysStringLen
msvcrt
wcslen
_stricmp
asctime
localtime
__p___initenv
exit
_XcptFilter
_iob
freopen
printf
fclose
_controlfp
_onexit
__dllonexit
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_exit
wcscpy
strncpy
malloc
??3@YAXPAX@Z
wprintf
_except_handler3
sprintf
_strnicmp
strchr
_purecall
time
wcsncat
wcsncpy
wcschr
??2@YAPAXI@Z
free
Sections
.text Size: 28KB - Virtual size: 25KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 9KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE