Static task
static1
Behavioral task
behavioral1
Sample
752887a4c739db4e93ecc9bba2ad28f87c6549289d47d97785f113e00c81e3e6.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
752887a4c739db4e93ecc9bba2ad28f87c6549289d47d97785f113e00c81e3e6.exe
Resource
win10v2004-20220812-en
General
-
Target
752887a4c739db4e93ecc9bba2ad28f87c6549289d47d97785f113e00c81e3e6
-
Size
387KB
-
MD5
5da30ae1a1e5548645e3f6c5b5c526a1
-
SHA1
4d32dffa4ca5a9e43ec79187b787ffb42313d5ae
-
SHA256
752887a4c739db4e93ecc9bba2ad28f87c6549289d47d97785f113e00c81e3e6
-
SHA512
1371aaf1c6481840953421314a01648aed88508e1cdd0b81f5642208840fac8c20f5e912352dd16142c3a3762b9ce659ed08afa5d36f86bbb44b80cf671fb18b
-
SSDEEP
12288:jxrXHnwS2m2aDwcvl/UvG55or6gYyL7mOAmta8FFEyQyQtTSsPda:jxrcGIhL7metZFFpQhSok
Malware Config
Signatures
Files
-
752887a4c739db4e93ecc9bba2ad28f87c6549289d47d97785f113e00c81e3e6.exe windows x86
2c2aff551c77f0fec5682f1b4867b3f7
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
PathRemoveFileSpecW
PathAppendW
winmm
timeGetTime
kernel32
GetSystemDirectoryW
ReadProcessMemory
GetFileAttributesW
TerminateProcess
GetCurrentDirectoryW
VirtualProtectEx
GetExitCodeThread
DuplicateHandle
GetCurrentProcessId
WriteProcessMemory
CreateFileW
LocalAlloc
DeviceIoControl
GetCurrentThreadId
GetVersion
VirtualQuery
IsBadReadPtr
GetProcAddress
CreateFileMappingW
HeapAlloc
HeapFree
GetCurrentThread
GetProcessHeap
CreateRemoteThread
VirtualQueryEx
VirtualFreeEx
VirtualAllocEx
VirtualProtect
CreateFileA
GetConsoleMode
GetConsoleCP
GetTimeZoneInformation
HeapSize
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
GetTickCount
GetCurrentProcess
UnmapViewOfFile
MapViewOfFile
Module32NextW
Module32FirstW
AttachConsole
SetLastError
SetHandleCount
FreeConsole
CreateThread
InterlockedExchange
FlushFileBuffers
DisconnectNamedPipe
ReadFile
TerminateThread
WriteFile
CreateNamedPipeW
ConnectNamedPipe
WaitForSingleObject
CloseHandle
CreateToolhelp32Snapshot
Process32NextW
GetModuleFileNameA
Process32FirstW
OpenProcess
GetModuleHandleW
LocalFree
DeleteCriticalSection
EnterCriticalSection
GetLastError
GetModuleFileNameW
LeaveCriticalSection
FormatMessageW
CopyFileW
Sleep
InitializeCriticalSection
GetCommandLineW
SetStdHandle
SetEndOfFile
SetEnvironmentVariableA
GetEnvironmentStringsW
SetFilePointer
GetSystemTimeAsFileTime
QueryPerformanceCounter
RaiseException
WideCharToMultiByte
PeekNamedPipe
InterlockedIncrement
InterlockedDecrement
InterlockedCompareExchange
MultiByteToWideChar
GetStringTypeW
EncodePointer
DecodePointer
GetLocaleInfoW
ExitProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
WriteConsoleW
GetCommandLineA
HeapSetInformation
GetStartupInfoW
HeapReAlloc
GetCPInfo
RtlUnwind
LCMapStringW
GetTimeFormatA
GetDateFormatA
CompareStringW
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InitializeCriticalSectionAndSpinCount
LoadLibraryW
GetStdHandle
IsProcessorFeaturePresent
HeapCreate
FreeEnvironmentStringsW
GetFileType
user32
GetWindowTextW
MessageBoxW
GetWindowThreadProcessId
EnumWindows
advapi32
OpenServiceW
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
GetKernelObjectSecurity
AdjustTokenPrivileges
LookupPrivilegeValueW
GetTokenInformation
OpenProcessToken
RegEnumKeyW
ConvertStringSecurityDescriptorToSecurityDescriptorW
RegSetValueExW
RegCloseKey
QueryServiceConfigW
ControlService
ReportEventW
UnlockServiceDatabase
RegOpenKeyExW
SetServiceStatus
ChangeServiceConfigW
QueryServiceStatus
StartServiceW
LookupAccountNameW
RegDeleteKeyW
DeregisterEventSource
RegQueryInfoKeyW
RegQueryValueExW
RegCreateKeyExW
RegisterServiceCtrlHandlerExW
GetUserNameW
StartServiceCtrlDispatcherW
OpenSCManagerW
DeleteService
CloseServiceHandle
RegisterEventSourceW
CreateServiceW
shell32
CommandLineToArgvW
SHGetFolderPathW
Sections
.text Size: 274KB - Virtual size: 273KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 42KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 57KB - Virtual size: 57KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ