Static task
static1
Behavioral task
behavioral1
Sample
f854b1e3aee8e8971441fe4fc80ead4281ce0788c148a93fbeedbda40b36c666.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f854b1e3aee8e8971441fe4fc80ead4281ce0788c148a93fbeedbda40b36c666.exe
Resource
win10v2004-20220901-en
General
-
Target
f854b1e3aee8e8971441fe4fc80ead4281ce0788c148a93fbeedbda40b36c666
-
Size
75KB
-
MD5
0b2304f5bd2301326545f6427375cdc0
-
SHA1
a5140c3759aaed2f0dd17977f2ff7c556cc0cd80
-
SHA256
f854b1e3aee8e8971441fe4fc80ead4281ce0788c148a93fbeedbda40b36c666
-
SHA512
5d78747efdbc06762df4f593712cc2a8b3f7371f00de31f1472a95f2999a451a713782c5597313dd4425a9418d34319e9634207dd0e447a3de4d3280272e46e2
-
SSDEEP
768:9HcofKow5ztpzQrrdr/PRu97gZsKy50f3wlVk/DOiEZBnkEZ6EO0FKLLpgjKP02u:dfsI5rHTZsK8lVkVaBnkEZmMjPE
Malware Config
Signatures
Files
-
f854b1e3aee8e8971441fe4fc80ead4281ce0788c148a93fbeedbda40b36c666.exe windows x86
7902bf509673142574ecb5d14bd25136
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
ConvertSidToStringSidW
RegCloseKey
RegSetValueExW
RegCreateKeyExW
RegOpenKeyExW
RegQueryValueExW
ControlTraceW
EnableTrace
StartTraceW
RegisterTraceGuidsW
UnregisterTraceGuids
GetTraceLoggerHandle
GetTraceEnableLevel
GetTraceEnableFlags
TraceEvent
kernel32
CreateFileW
GetFileAttributesW
WaitForSingleObject
OpenEventW
SetEvent
CreateDirectoryW
GetFullPathNameW
SetLastError
GetModuleFileNameW
HeapAlloc
LoadLibraryW
FreeLibrary
GetProcessHeap
HeapFree
GetProcAddress
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
QueryPerformanceCounter
GetModuleHandleA
SetUnhandledExceptionFilter
GetVersionExW
CreateEventW
InterlockedCompareExchange
InterlockedExchange
LocalFree
CloseHandle
WriteFile
GetLastError
ReadFile
GetModuleHandleW
HeapSetInformation
GetConsoleOutputCP
SetThreadPreferredUILanguages
FormatMessageW
ExpandEnvironmentStringsW
GetTickCount
Sleep
LocalAlloc
GetWindowsDirectoryW
GetFileSize
msvcrt
wcsrchr
_wcsnicmp
memset
memcpy
_vsnwprintf
_onexit
_lock
__dllonexit
_unlock
_controlfp
_except_handler4_common
?terminate@@YAXXZ
__set_app_type
__p__fmode
__p__commode
__setusermatherr
_amsg_exit
_initterm
exit
_XcptFilter
_exit
_cexit
__wgetmainargs
wprintf
fwprintf
swprintf_s
setlocale
_wtoi
printf
wcscpy_s
wcschr
malloc
free
_wcsicmp
_iob
_vsnprintf
user32
LoadStringW
ntdll
RtlAllocateHeap
RtlFreeHeap
DbgPrint
RtlGetNtProductType
RtlNtStatusToDosError
logoncli
DsGetDcNameW
wkscli
NetUseDel
NetUseAdd
NetJoinDomain
netutils
NetApiBufferAllocate
NetApiBufferFree
rpcrt4
UuidToStringW
RpcStringFreeW
netjoin
NetRequestOfflineDomainJoin
NetProvisionComputerAccount
NetpDecodeProvisioningBlob
Sections
.text Size: 36KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 20KB - Virtual size: 23KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE