Static task
static1
Behavioral task
behavioral1
Sample
b63169a8cb24819576a74cb805082c04473ec70ad86e1b08e6dc815ae4d673bd.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b63169a8cb24819576a74cb805082c04473ec70ad86e1b08e6dc815ae4d673bd.exe
Resource
win10v2004-20220901-en
General
-
Target
b63169a8cb24819576a74cb805082c04473ec70ad86e1b08e6dc815ae4d673bd
-
Size
225KB
-
MD5
0af8c1e1bf6b74d6df17d9ba258823a0
-
SHA1
ab85c493ce3e243c8060d4c0e34d3ae36a687666
-
SHA256
b63169a8cb24819576a74cb805082c04473ec70ad86e1b08e6dc815ae4d673bd
-
SHA512
087fc2b2516ec12475fa5b501c89aea57dfc63c72657133f2c0c64ae77760fb4c32eca0c0a9a2c285b753e224e1748a83bf67f9af95405c7d2e06c31cbb253eb
-
SSDEEP
6144:5JOFOZtXGRLDSvrqHBCKJmuAMLrJ5sY2:VXGRci0KJmuAc
Malware Config
Signatures
Files
-
b63169a8cb24819576a74cb805082c04473ec70ad86e1b08e6dc815ae4d673bd.exe windows x86
03e927665fbd0297cac3a1489c3f1d69
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_REMOVABLE_RUN_FROM_SWAP
IMAGE_FILE_NET_RUN_FROM_SWAP
Imports
advapi32
AdjustTokenPrivileges
LookupPrivilegeValueW
OpenProcessToken
InitiateSystemShutdownExW
AddAce
InitializeAcl
GetSecurityDescriptorControl
MakeAbsoluteSD
GetSecurityDescriptorSacl
GetSecurityDescriptorDacl
GetSecurityDescriptorGroup
GetSecurityDescriptorOwner
InitializeSecurityDescriptor
GetLengthSid
IsValidSid
CopySid
GetAclInformation
SetSecurityDescriptorOwner
SetSecurityDescriptorGroup
SetSecurityDescriptorDacl
GetSidSubAuthority
InitializeSid
GetSidLengthRequired
IsValidSecurityDescriptor
RegQueryValueExW
RegCloseKey
RegOpenKeyExW
kernel32
OutputDebugStringW
SetConsoleCtrlHandler
SetErrorMode
GetStdHandle
GetConsoleMode
GetFileType
LocalFree
WriteFile
WideCharToMultiByte
LocalAlloc
WriteConsoleW
HeapAlloc
lstrlenW
GetModuleFileNameW
SetLastError
GetFileAttributesW
FormatMessageW
IsWow64Process
GetVersionExW
GetSystemInfo
LeaveCriticalSection
EnterCriticalSection
CompareStringW
GetDriveTypeW
GetProcessHeap
SearchPathW
GetUserDefaultUILanguage
GetSystemDefaultUILanguage
UnmapViewOfFile
GetLocaleInfoW
CreateFileMappingW
MapViewOfFile
LoadLibraryExW
FreeLibrary
GetProcAddress
LoadLibraryW
ExpandEnvironmentStringsW
GetSystemWindowsDirectoryW
GetModuleHandleExW
ReadFile
SetFilePointer
GetFullPathNameW
GetTempFileNameW
CreateFileW
UnhandledExceptionFilter
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetModuleHandleA
SetUnhandledExceptionFilter
OutputDebugStringA
InterlockedCompareExchange
MultiByteToWideChar
InterlockedExchange
HeapSize
HeapReAlloc
HeapDestroy
GetVersionExA
HeapFree
Sleep
RaiseException
GetCommandLineW
InitializeCriticalSection
DeleteCriticalSection
SizeofResource
LockResource
LoadResource
FindResourceW
FindResourceExW
SetThreadUILanguage
SetEvent
InterlockedDecrement
InterlockedIncrement
GetCurrentThreadId
GetModuleHandleW
GetCurrentProcess
GetLastError
CloseHandle
msvcrt
_CxxThrowException
_wcsicmp
_vscwprintf
bsearch
_wcsnicmp
wcsncmp
wcsstr
wcschr
wprintf
_vsnwprintf
towupper
_isatty
_write
_lseeki64
_fileno
__pioinfo
__badioinfo
ferror
_itoa
_snprintf
_iob
isleadbyte
__mb_cur_max
mbtowc
_controlfp
memmove
memcpy
realloc
_onexit
_lock
__dllonexit
_unlock
?terminate@@YAXXZ
??1type_info@@UAE@XZ
__set_app_type
__p__fmode
__p__commode
__setusermatherr
_amsg_exit
_initterm
exit
_XcptFilter
_exit
_cexit
__wgetmainargs
_callnewh
_wcslwr
_errno
__CxxFrameHandler
??0exception@@QAE@XZ
malloc
wcsrchr
calloc
__RTDynamicCast
_purecall
free
??0exception@@QAE@ABV0@@Z
??1exception@@UAE@XZ
?what@exception@@UBEPBDXZ
??0exception@@QAE@ABQBD@Z
memset
_getwch
ntdll
RtlFreeHeap
RtlAllocateHeap
RtlUnwind
user32
UnregisterClassA
CharLowerBuffW
PostThreadMessageW
ole32
CoInitializeSecurity
CoCreateInstance
CoUninitialize
CoInitializeEx
oleaut32
GetErrorInfo
SysFreeString
SysAllocString
SysStringLen
LoadRegTypeLi
LoadTypeLi
VariantClear
SysAllocStringLen
SysAllocStringByteLen
SysStringByteLen
VarBstrCmp
version
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
Sections
.text Size: 149KB - Virtual size: 148KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 216KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 40KB - Virtual size: 41KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE