Static task
static1
Behavioral task
behavioral1
Sample
fccc8d1722b74e789e58d3ab28c5df6065c6023fcd7da516c611b231184b08dd.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
fccc8d1722b74e789e58d3ab28c5df6065c6023fcd7da516c611b231184b08dd.exe
Resource
win10v2004-20220812-en
General
-
Target
fccc8d1722b74e789e58d3ab28c5df6065c6023fcd7da516c611b231184b08dd
-
Size
225KB
-
MD5
a3488a647076cda02eaa5264ce944754
-
SHA1
032175fef6546033a029ef60a349a0ea6e59fafb
-
SHA256
fccc8d1722b74e789e58d3ab28c5df6065c6023fcd7da516c611b231184b08dd
-
SHA512
ec65c4e82e15ec021b2c034dc7854a539e4277099395073444272ed2376472184bb1b8f1b5c274f92c2a0e26293134144fa336477b830b3a701086e1f47b20f0
-
SSDEEP
6144:bJOFOZtXGRLDSvrqHBCKJmuAMLrJPeBc0s:/XGRci0KJmuAc2
Malware Config
Signatures
Files
-
fccc8d1722b74e789e58d3ab28c5df6065c6023fcd7da516c611b231184b08dd.exe windows x86
03e927665fbd0297cac3a1489c3f1d69
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_REMOVABLE_RUN_FROM_SWAP
IMAGE_FILE_NET_RUN_FROM_SWAP
Imports
advapi32
AdjustTokenPrivileges
LookupPrivilegeValueW
OpenProcessToken
InitiateSystemShutdownExW
AddAce
InitializeAcl
GetSecurityDescriptorControl
MakeAbsoluteSD
GetSecurityDescriptorSacl
GetSecurityDescriptorDacl
GetSecurityDescriptorGroup
GetSecurityDescriptorOwner
InitializeSecurityDescriptor
GetLengthSid
IsValidSid
CopySid
GetAclInformation
SetSecurityDescriptorOwner
SetSecurityDescriptorGroup
SetSecurityDescriptorDacl
GetSidSubAuthority
InitializeSid
GetSidLengthRequired
IsValidSecurityDescriptor
RegQueryValueExW
RegCloseKey
RegOpenKeyExW
kernel32
OutputDebugStringW
SetConsoleCtrlHandler
SetErrorMode
GetStdHandle
GetConsoleMode
GetFileType
LocalFree
WriteFile
WideCharToMultiByte
LocalAlloc
WriteConsoleW
HeapAlloc
lstrlenW
GetModuleFileNameW
SetLastError
GetFileAttributesW
FormatMessageW
IsWow64Process
GetVersionExW
GetSystemInfo
LeaveCriticalSection
EnterCriticalSection
CompareStringW
GetDriveTypeW
GetProcessHeap
SearchPathW
GetUserDefaultUILanguage
GetSystemDefaultUILanguage
UnmapViewOfFile
GetLocaleInfoW
CreateFileMappingW
MapViewOfFile
LoadLibraryExW
FreeLibrary
GetProcAddress
LoadLibraryW
ExpandEnvironmentStringsW
GetSystemWindowsDirectoryW
GetModuleHandleExW
ReadFile
SetFilePointer
GetFullPathNameW
GetTempFileNameW
CreateFileW
UnhandledExceptionFilter
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetModuleHandleA
SetUnhandledExceptionFilter
OutputDebugStringA
InterlockedCompareExchange
MultiByteToWideChar
InterlockedExchange
HeapSize
HeapReAlloc
HeapDestroy
GetVersionExA
HeapFree
Sleep
RaiseException
GetCommandLineW
InitializeCriticalSection
DeleteCriticalSection
SizeofResource
LockResource
LoadResource
FindResourceW
FindResourceExW
SetThreadUILanguage
SetEvent
InterlockedDecrement
InterlockedIncrement
GetCurrentThreadId
GetModuleHandleW
GetCurrentProcess
GetLastError
CloseHandle
msvcrt
_CxxThrowException
_wcsicmp
_vscwprintf
bsearch
_wcsnicmp
wcsncmp
wcsstr
wcschr
wprintf
_vsnwprintf
towupper
_isatty
_write
_lseeki64
_fileno
__pioinfo
__badioinfo
ferror
_itoa
_snprintf
_iob
isleadbyte
__mb_cur_max
mbtowc
_controlfp
memmove
memcpy
realloc
_onexit
_lock
__dllonexit
_unlock
?terminate@@YAXXZ
??1type_info@@UAE@XZ
__set_app_type
__p__fmode
__p__commode
__setusermatherr
_amsg_exit
_initterm
exit
_XcptFilter
_exit
_cexit
__wgetmainargs
_callnewh
_wcslwr
_errno
__CxxFrameHandler
??0exception@@QAE@XZ
malloc
wcsrchr
calloc
__RTDynamicCast
_purecall
free
??0exception@@QAE@ABV0@@Z
??1exception@@UAE@XZ
?what@exception@@UBEPBDXZ
??0exception@@QAE@ABQBD@Z
memset
_getwch
ntdll
RtlFreeHeap
RtlAllocateHeap
RtlUnwind
user32
UnregisterClassA
CharLowerBuffW
PostThreadMessageW
ole32
CoInitializeSecurity
CoCreateInstance
CoUninitialize
CoInitializeEx
oleaut32
GetErrorInfo
SysFreeString
SysAllocString
SysStringLen
LoadRegTypeLi
LoadTypeLi
VariantClear
SysAllocStringLen
SysAllocStringByteLen
SysStringByteLen
VarBstrCmp
version
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
Sections
.text Size: 149KB - Virtual size: 148KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 216KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 40KB - Virtual size: 41KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE