Static task
static1
Behavioral task
behavioral1
Sample
903e880ce1c999f1a0f4956146088276dd8cd61af896360c62c2bf6c915bb3fa.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
903e880ce1c999f1a0f4956146088276dd8cd61af896360c62c2bf6c915bb3fa.exe
Resource
win10v2004-20220812-en
General
-
Target
903e880ce1c999f1a0f4956146088276dd8cd61af896360c62c2bf6c915bb3fa
-
Size
313KB
-
MD5
a381515708fecfe0cc1b997ad6f82480
-
SHA1
703d0af9d781529a714d551fc5a249fe87415a46
-
SHA256
903e880ce1c999f1a0f4956146088276dd8cd61af896360c62c2bf6c915bb3fa
-
SHA512
7758c0006b79eff3b6e85c51d53905c40f6977a366d824ce47a3f365b0acbeab725b86e084caa4f5dba3f89cce6ac958de3428702a8c3241ce455d0d5058b987
-
SSDEEP
6144:IEesYclzRCayeopvGE0zM6s4D8e8FIBK86dNvMXfAoWNj5T:IEerclzRCayeopvGNzM6s4D8e8FIBK8+
Malware Config
Signatures
Files
-
903e880ce1c999f1a0f4956146088276dd8cd61af896360c62c2bf6c915bb3fa.exe windows x86
dcdd642290ef7ddb3b5d95966881c025
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegCloseKey
RegCreateKeyExW
GetTokenInformation
OpenProcessToken
CreateProcessAsUserW
SetTokenInformation
GetLengthSid
ConvertStringSidToSidW
DuplicateTokenEx
kernel32
GetLastError
VerifyVersionInfoW
VerSetConditionMask
FreeLibrary
GetProcAddress
LoadLibraryW
CloseHandle
GetCurrentProcess
GetUserGeoID
GetExitCodeProcess
WaitForSingleObject
LocalFree
GetModuleHandleW
lstrcmpA
GetModuleFileNameW
UnhandledExceptionFilter
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
GetModuleHandleA
SetUnhandledExceptionFilter
GetStartupInfoA
InterlockedCompareExchange
Sleep
InterlockedExchange
user32
LoadStringW
msvcrt
_controlfp
_vsnwprintf
memset
??3@YAXPAX@Z
wcschr
_wcsnicmp
?terminate@@YAXXZ
__set_app_type
__p__fmode
__p__commode
__setusermatherr
_amsg_exit
_initterm
_acmdln
exit
_ismbblead
_XcptFilter
_exit
_cexit
__getmainargs
_wtoi
??2@YAPAXI@Z
ole32
CoUninitialize
CoTaskMemFree
CoCreateInstance
CoInitializeEx
ntdll
RtlUnwind
shell32
ord723
SHGetFolderPathW
ord155
ord190
ShellExecuteW
SHBindToParent
shlwapi
PathCombineW
PathAddExtensionW
ord158
SHRegGetBoolUSValueW
SHRegGetUSValueW
SHDeleteValueW
PathFindFileNameW
ord176
SHRegSetUSValueW
SHSetValueW
wininet
InternetGetCookieW
InternetSetCookieW
oleaut32
SysFreeString
SysAllocString
Sections
.text Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 269KB - Virtual size: 272KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 29KB - Virtual size: 30KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
jlfiqkt Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE