Static task
static1
Behavioral task
behavioral1
Sample
ed58e8a2649519992e19667b40f11c1032069d817472cab00f4782e98135b54a.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
ed58e8a2649519992e19667b40f11c1032069d817472cab00f4782e98135b54a.exe
Resource
win10v2004-20220812-en
General
-
Target
ed58e8a2649519992e19667b40f11c1032069d817472cab00f4782e98135b54a
-
Size
4.2MB
-
MD5
95306827900bad7a242f0a922b7638af
-
SHA1
ba624f44857eb695e752864f22e63349cf9daf5e
-
SHA256
ed58e8a2649519992e19667b40f11c1032069d817472cab00f4782e98135b54a
-
SHA512
bacaa940cbb6d8a169071bb2968b7d92351942e5c7d578583e5e45865ee21facfb20dfea947670fee7ac05fd313c88cb8a40f8ae04790028e95d0eba516eed6d
-
SSDEEP
98304:NrJss8LlPxem4JeCuZKPdbxy/EbCqKyi:NbA/tV
Malware Config
Signatures
Files
-
ed58e8a2649519992e19667b40f11c1032069d817472cab00f4782e98135b54a.exe windows x64
a92738565287d8c609ab89594562c72d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DEBUG_STRIPPED
Imports
advapi32
AdjustTokenPrivileges
DeregisterEventSource
LookupPrivilegeValueA
OpenProcessToken
RegisterEventSourceW
ReportEventW
gdi32
BitBlt
CreateCompatibleBitmap
CreateCompatibleDC
CreateDCW
DeleteDC
DeleteObject
GetBitmapBits
GetDeviceCaps
GetObjectW
SelectObject
kernel32
CloseHandle
CreateEventA
CreateIoCompletionPort
CreateMutexW
CreateSemaphoreA
CreateThread
CreateWaitableTimerA
DeleteCriticalSection
DuplicateHandle
EnterCriticalSection
FormatMessageA
FreeLibrary
GetCurrentProcess
GetCurrentProcessId
GetCurrentThread
GetCurrentThreadId
GetFileType
GetLargePageMinimum
GetLastError
GetModuleFileNameW
GetModuleHandleA
GetModuleHandleW
GetProcAddress
GetProcessHeap
GetQueuedCompletionStatus
GetStartupInfoA
GetStdHandle
GetSystemInfo
GetSystemTimeAsFileTime
GetTickCount
GetTimeZoneInformation
GetVersion
GetVersionExW
GlobalMemoryStatus
HeapAlloc
HeapFree
InitializeCriticalSection
InitializeCriticalSectionAndSpinCount
IsDBCSLeadByteEx
LeaveCriticalSection
LoadLibraryA
LoadLibraryW
LocalFree
MultiByteToWideChar
OpenEventA
PostQueuedCompletionStatus
QueryPerformanceCounter
QueueUserAPC
RaiseException
ReleaseMutex
ReleaseSemaphore
ResetEvent
ResumeThread
RtlAddFunctionTable
RtlCaptureContext
RtlLookupFunctionEntry
RtlUnwindEx
RtlVirtualUnwind
SetEvent
SetLastError
SetThreadAffinityMask
SetUnhandledExceptionFilter
SetWaitableTimer
Sleep
SleepEx
SystemTimeToFileTime
TerminateProcess
TerminateThread
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
VirtualProtect
VirtualQuery
WaitForMultipleObjects
WaitForSingleObject
WideCharToMultiByte
msvcrt
__C_specific_handler
___lc_codepage_func
__dllonexit
__doserrno
__getmainargs
__initenv
__iob_func
__lconv_init
__mb_cur_max
__pioinfo
__set_app_type
__setusermatherr
_acmdln
_aligned_free
_aligned_malloc
_amsg_exit
_beginthreadex
_cexit
_environ
_errno
_exit
_fdopen
_filelengthi64
_fileno
_fileno
_fmode
_fstat64
_getch
_gmtime64
_initterm
_localtime64
_lock
_lseeki64
_onexit
_read
_setmode
_snwprintf
_stricmp
_strnicmp
_time64
_unlock
_vsnwprintf
_wfopen
_write
_write
abort
atoi
calloc
exit
fclose
feof
ferror
fflush
fgetpos
fgets
fopen
fprintf
fputc
fputs
fread
free
fseek
fsetpos
ftell
fwprintf
fwrite
getc
getenv
getwc
isalnum
islower
ispunct
isspace
isupper
iswctype
isxdigit
localeconv
malloc
memchr
memcmp
memcpy
memmove
memset
printf
putc
putchar
puts
putwc
qsort
raise
rand
realloc
setbuf
setlocale
setvbuf
signal
sprintf
srand
sscanf
strcat
strchr
strcmp
strcoll
strcpy
strerror
strftime
strlen
strncmp
strncpy
strrchr
strtol
strtoul
strxfrm
tolower
towlower
towupper
ungetc
ungetwc
vfprintf
wcscoll
wcscpy
wcsftime
wcslen
wcsstr
wcsxfrm
user32
GetDesktopWindow
GetProcessWindowStation
GetUserObjectInformationW
MessageBoxW
ws2_32
WSACleanup
WSAGetLastError
WSAIoctl
WSARecv
WSASend
WSASetLastError
WSASocketA
WSAStartup
__WSAFDIsSet
accept
bind
closesocket
connect
freeaddrinfo
getaddrinfo
getsockname
getsockopt
inet_addr
ioctlsocket
listen
select
setsockopt
Sections
.text Size: 3.3MB - Virtual size: 3.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 101KB - Virtual size: 100KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512KB - Virtual size: 512KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.pdata Size: 116KB - Virtual size: 115KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.xdata Size: 203KB - Virtual size: 202KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 21KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 112B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 80B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE