Static task
static1
Behavioral task
behavioral1
Sample
ca88746ba10e58428b136186bc6fd58f85bbcbc24df20fa519acccbd14580c8e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ca88746ba10e58428b136186bc6fd58f85bbcbc24df20fa519acccbd14580c8e.exe
Resource
win10v2004-20220812-en
General
-
Target
ca88746ba10e58428b136186bc6fd58f85bbcbc24df20fa519acccbd14580c8e
-
Size
268KB
-
MD5
029b9d794e9bba3fc82bf04c4d1c7d40
-
SHA1
0d37fe1772c9d74da315f2c2ced1d325a28ef207
-
SHA256
ca88746ba10e58428b136186bc6fd58f85bbcbc24df20fa519acccbd14580c8e
-
SHA512
888965233777c3dcb4080bfcc30c309cf437d85e023ce4b7c8861d2bcfde53baf3ead8899f0971d44cead2d27195fa2603f5d0aadf1ef700c622cec229866a85
-
SSDEEP
6144:+vcEAjZkIu86H3H9u4eIE5t5Br0sG5oYZRijq6h/05DrQ7:JbjZZu3H3du4etV0sDaUMFM7
Malware Config
Signatures
Files
-
ca88746ba10e58428b136186bc6fd58f85bbcbc24df20fa519acccbd14580c8e.exe windows x86
4b2fcad000a6a13135e56d62db0a565e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
FreeSid
CheckTokenMembership
AllocateAndInitializeSid
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
RegEnumValueW
kernel32
InterlockedDecrement
CloseHandle
HeapSetInformation
Sleep
SetThreadPriority
GetThreadPriority
QueryPerformanceCounter
QueryPerformanceFrequency
GetCurrentThread
GetSystemInfo
GetLastError
SystemTimeToFileTime
GetLocalTime
HeapAlloc
GetProcessHeap
FileTimeToSystemTime
InterlockedIncrement
GetDiskFreeSpaceExW
FreeLibrary
LoadLibraryW
GetFileTime
CreateFileW
CreateFileMappingW
GetFileSizeEx
LocaleNameToLCID
GetModuleFileNameW
GetUserDefaultUILanguage
GetProductInfo
GetVersionExW
UnmapViewOfFile
MapViewOfFile
SetEvent
WaitForSingleObject
QueueUserWorkItem
CreateEventW
GetModuleHandleA
SetUnhandledExceptionFilter
InterlockedCompareExchange
InterlockedExchange
GetModuleHandleW
GetProcAddress
GetConsoleOutputCP
FormatMessageW
LocalFree
CompareFileTime
GetCurrentThreadId
GetCurrentProcessId
GetTickCount
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
lstrcmpiW
GetWindowsDirectoryW
lstrlenW
msvcrt
_initterm
_amsg_exit
__setusermatherr
__p__commode
__p__fmode
__set_app_type
_except_handler4_common
?terminate@@YAXXZ
_controlfp
__wgetmainargs
exit
wcsrchr
strstr
_strnicmp
strtok
strtoul
atoi
memcpy
wcstoul
memset
mbstowcs
wcschr
wcsstr
wcstok
_XcptFilter
_exit
_cexit
swscanf
_wtof
_wcsnicmp
_wcsicmp
??2@YAPAXI@Z
_ftol2
??3@YAXPAX@Z
_wsetlocale
_snwprintf_s
printf
_getmbcp
_vsnwprintf
ntdll
RtlFreeUnicodeString
RtlAnsiStringToUnicodeString
RtlInitUnicodeString
RtlExpandEnvironmentStrings_U
RtlInitAnsiString
ole32
CoGetMalloc
CoUninitialize
CoInitializeEx
CoCreateInstance
oleaut32
SysAllocString
SysFreeString
version
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
powrprof
PowerDeterminePlatformRole
Sections
.text Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 236KB - Virtual size: 396KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ