Static task
static1
Behavioral task
behavioral1
Sample
ea6fa0b79b69954b3c457215e5ca8d6747f64125a43ec1ca2b98f52ce0e0c6e4.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
ea6fa0b79b69954b3c457215e5ca8d6747f64125a43ec1ca2b98f52ce0e0c6e4.exe
Resource
win10v2004-20220812-en
General
-
Target
ea6fa0b79b69954b3c457215e5ca8d6747f64125a43ec1ca2b98f52ce0e0c6e4
-
Size
305KB
-
MD5
838c4529502294463e399606961aef85
-
SHA1
47d35295e052d9eaa520c00b6ee9d0c24151f05f
-
SHA256
ea6fa0b79b69954b3c457215e5ca8d6747f64125a43ec1ca2b98f52ce0e0c6e4
-
SHA512
bf6820ccd7fb55864b88991656bb3e2933c124ba8f0f1c4155ef9fd19cdf286bdf5dd6292bad0a465d4f3236f5bf45fbc13e3eb32db9982c505784ab79eb05b2
-
SSDEEP
6144:gWKXGLrjiOHHw5fnA5WgllkL/3K8fqeXOz47IdzRpos:gWKWLi4Q545Wgllkj3K8fdezmwpos
Malware Config
Signatures
Files
-
ea6fa0b79b69954b3c457215e5ca8d6747f64125a43ec1ca2b98f52ce0e0c6e4.exe windows x86
c1380ad14638e0d1a37e461829102486
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
wtsapi32
WTSQueryUserToken
userenv
DestroyEnvironmentBlock
CreateEnvironmentBlock
advapi32
RegCloseKey
StartServiceCtrlDispatcherW
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
DuplicateTokenEx
ConvertStringSidToSidW
SetTokenInformation
GetLengthSid
CreateProcessAsUserW
RegisterServiceCtrlHandlerExW
SetServiceStatus
RegQueryValueExW
RegOpenKeyExW
RegCreateKeyExW
setupapi
SetupDiGetClassDevsW
CM_Reenumerate_DevNode
SetupDiDestroyDeviceInfoList
SetupDiEnumDeviceInfo
kernel32
FindNextFileA
GetCurrentProcess
WaitForSingleObject
UnmapViewOfFile
CreateFileMappingA
MapViewOfFileEx
CreateFileA
DeleteFileA
GetSystemInfo
GetFileSizeEx
CreateDirectoryA
RemoveDirectoryA
LoadLibraryA
FreeLibrary
GetProcAddress
GetModuleHandleA
Sleep
GetSystemTimeAsFileTime
FindClose
WTSGetActiveConsoleSessionId
CreateEventW
ResetEvent
OpenEventW
WriteFile
ExpandEnvironmentStringsW
GetModuleHandleW
GetVersionExW
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
SetLastError
DeleteFileW
CreateProcessW
GetModuleFileNameW
SetFilePointer
CreateMutexW
ReleaseMutex
OutputDebugStringA
InterlockedCompareExchange
InterlockedExchange
GetEnvironmentVariableW
GetCommandLineW
IsDebuggerPresent
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
RaiseException
GetSystemDirectoryW
GetWindowsDirectoryW
FindFirstFileA
GetTempPathW
GetCurrentDirectoryW
ReadFile
QueryPerformanceCounter
SetUnhandledExceptionFilter
MultiByteToWideChar
WideCharToMultiByte
TlsGetValue
TlsAlloc
VirtualAlloc
TlsSetValue
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetModuleFileNameA
GetStdHandle
IsValidCodePage
GetOEMCP
GetACP
ExitProcess
LCMapStringW
LCMapStringA
GetCPInfo
RtlUnwind
GetConsoleMode
GetConsoleCP
UnhandledExceptionFilter
TerminateProcess
GetProcessHeap
HeapSize
HeapReAlloc
HeapFree
HeapAlloc
HeapDestroy
lstrlenA
InitializeCriticalSection
InterlockedIncrement
FlushFileBuffers
GetUserDefaultLCID
GetLocaleInfoA
GetLocaleInfoW
SetEnvironmentVariableA
EnumSystemLocalesA
IsValidLocale
CloseHandle
LocalFree
FormatMessageA
GetLastError
CreateFileW
SetEvent
InterlockedDecrement
GetStartupInfoA
HeapCreate
CompareStringW
CompareStringA
GetStringTypeW
GetStringTypeA
VirtualFree
GetTimeZoneInformation
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetStdHandle
TlsFree
user32
MessageBoxW
shell32
SHGetFolderPathW
CommandLineToArgvW
ole32
CoInitializeSecurity
CoCreateInstance
CoInitializeEx
CoUninitialize
oleaut32
SysFreeString
SysAllocStringLen
VariantClear
VariantInit
SysAllocString
winmm
timeGetTime
Sections
.text Size: 226KB - Virtual size: 225KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 41KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 21KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ