Static task
static1
Behavioral task
behavioral1
Sample
d88a5593ce7ba7728dcdf7d6726f2f492669a4dab26a62029a791dbf5bd0baec.exe
Resource
win10-20220812-en
General
-
Target
d88a5593ce7ba7728dcdf7d6726f2f492669a4dab26a62029a791dbf5bd0baec
-
Size
2.4MB
-
MD5
786da4fcaf680395db940791336d477d
-
SHA1
a991968047eb42b8257a0c2e537d6c075c4ae160
-
SHA256
d88a5593ce7ba7728dcdf7d6726f2f492669a4dab26a62029a791dbf5bd0baec
-
SHA512
2153ebe88d7af01d6e7ddc8925fc0650249fbbde0a76f6e4a57ed0a0fc70c2737b933366a34ed8e22864c16f968a46d0e2cc4fdbe5e30b1d40d61bfb6d3d3e42
-
SSDEEP
49152:zNmOUCb2cR8gfJCTwqacE0lKp5OmW22/+vedhfydybAhBoi2:zNfR8UJETacNl8f2PdhqdMA392
Malware Config
Signatures
Files
-
d88a5593ce7ba7728dcdf7d6726f2f492669a4dab26a62029a791dbf5bd0baec.exe windows x86
08569e64bf889aa1485728956b8b0f52
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegCreateKeyA
RegSetValueA
GetUserNameA
RegCloseKey
RegOpenKeyExA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegQueryValueExA
RegDeleteKeyA
kernel32
IsProcessorFeaturePresent
GetModuleHandleA
GetProcAddress
MultiByteToWideChar
CreateThread
FreeConsole
CloseHandle
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
SetEvent
ResetEvent
WaitForSingleObjectEx
CreateEventW
GetModuleHandleW
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
GetCurrentProcess
TerminateProcess
FormatMessageA
WideCharToMultiByte
EncodePointer
DecodePointer
LocalFree
InitializeCriticalSectionEx
LCMapStringEx
GetLocaleInfoEx
GetStringTypeW
CompareStringEx
GetCPInfo
CreateFileW
RaiseException
RtlUnwind
InterlockedPushEntrySList
InterlockedFlushSList
GetLastError
SetLastError
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
ExitProcess
GetModuleHandleExW
GetModuleFileNameW
GetStdHandle
WriteFile
GetCommandLineA
GetCommandLineW
GetCurrentThread
HeapFree
HeapAlloc
GetFileType
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetProcessHeap
SetConsoleCtrlHandler
OutputDebugStringW
SetStdHandle
FlushFileBuffers
GetConsoleOutputCP
GetConsoleMode
ReadFile
GetFileSizeEx
SetFilePointerEx
ReadConsoleW
HeapReAlloc
GetTimeZoneInformation
HeapSize
WriteConsoleW
Sections
.text Size: 926KB - Virtual size: 925KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 347KB - Virtual size: 346KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 1024B - Virtual size: 777B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.00cfg Size: 512B - Virtual size: 265B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.D3} Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 26KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
0wV Size: 219KB - Virtual size: 219KB
IMAGE_SCN_MEM_READ
��&� �� Size: 234KB - Virtual size: 234KB
IMAGE_SCN_MEM_READ
\*. Size: 207KB - Virtual size: 207KB
IMAGE_SCN_MEM_READ
��h � Size: 239KB - Virtual size: 239KB
IMAGE_SCN_MEM_READ
5ƃ�� Size: 217KB - Virtual size: 217KB
IMAGE_SCN_MEM_READ