Static task
static1
Behavioral task
behavioral1
Sample
32b71cdcf413d02a05f053ca68bd6e1b3c851b88c573ed4fa8e4b31a9a78a84f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
32b71cdcf413d02a05f053ca68bd6e1b3c851b88c573ed4fa8e4b31a9a78a84f.exe
Resource
win10v2004-20220812-en
General
-
Target
32b71cdcf413d02a05f053ca68bd6e1b3c851b88c573ed4fa8e4b31a9a78a84f
-
Size
108KB
-
MD5
4b0826544ae384e8e4a9ef864605f3e0
-
SHA1
c43907ffd1e0a09e9082697fa5729435de1f7f8e
-
SHA256
32b71cdcf413d02a05f053ca68bd6e1b3c851b88c573ed4fa8e4b31a9a78a84f
-
SHA512
f6ce8590c59bef2ba114d339551b93c2e7048fd8a396d9c3fc58c4d647a0f4b201a24934e3eaae0a38a753428b904456d071a2413c6c14fa373b19eb6aca231f
-
SSDEEP
3072:YE9cKL+9ZUlsKjUHZTzLRKwmlzuJvCahF6pda:YE9rL+ffgwN/RKFzuJqahF6pd
Malware Config
Signatures
Files
-
32b71cdcf413d02a05f053ca68bd6e1b3c851b88c573ed4fa8e4b31a9a78a84f.exe windows x86
eb0eff780527e323c357000cfe6b7c4c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
_controlfp
_onexit
__dllonexit
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_cexit
_XcptFilter
_exit
_c_exit
swscanf
iswctype
_ftol
_wcsupr
_wcsicmp
_fmode
_wfopen
fgetws
fclose
wcscmp
localeconv
atoi
sprintf
towupper
wcsstr
swprintf
_local_unwind2
wcscat
wcsrchr
wcschr
wcscspn
wcsncmp
wcsncat
wcscpy
memmove
??3@YAXPAX@Z
??2@YAPAXI@Z
wcslen
wcsncpy
_wtoi
_except_handler3
advapi32
GetSecurityDescriptorDacl
InitializeSecurityDescriptor
AllocateAndInitializeSid
SetEntriesInAclW
LookupPrivilegeValueW
OpenProcessToken
SetSecurityDescriptorDacl
FreeSid
RegCreateKeyExW
RegSetValueExW
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
AdjustTokenPrivileges
kernel32
WideCharToMultiByte
FlushFileBuffers
SetFilePointer
OutputDebugStringA
GetLocalTime
SystemTimeToFileTime
LocalFree
SetErrorMode
DeviceIoControl
GlobalHandle
GetFileAttributesExW
GetFileInformationByHandle
GetExitCodeThread
GetComputerNameW
OpenEventW
ExitThread
SetEvent
GetCommandLineW
CreateThread
GetSystemPowerStatus
GetVersionExW
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetModuleHandleA
GetStartupInfoA
QueryPerformanceCounter
GetCurrentProcess
GlobalLock
GlobalFree
GlobalReAlloc
GlobalUnlock
GlobalSize
GlobalAlloc
SetLastError
ReadFile
WriteFile
InterlockedIncrement
InterlockedDecrement
Sleep
CloseHandle
GetLastError
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
lstrcpyW
GetFileSize
CreateFileW
ReleaseMutex
lstrcatW
FormatMessageW
GetCurrentThreadId
lstrlenW
GetTimeFormatW
GetDateFormatW
WaitForSingleObject
lstrcpynW
SizeofResource
FindResourceW
lstrcmpiW
CompareStringW
ExpandEnvironmentStringsW
LoadLibraryW
GetDiskFreeSpaceW
lstrcmpW
GetVolumeInformationW
GetVolumeNameForVolumeMountPointW
GetDriveTypeW
FindVolumeMountPointClose
FindNextVolumeMountPointW
FindFirstVolumeMountPointW
GetSystemWindowsDirectoryW
gdi32
GetStockObject
user32
LoadStringW
CharUpperW
wvsprintfA
SendMessageW
DefWindowProcW
MessageBoxW
LoadCursorW
CreateWindowExW
SetTimer
KillTimer
PostQuitMessage
DestroyWindow
DispatchMessageW
TranslateMessage
GetMessageW
RegisterClassExW
PostMessageW
wsprintfW
ntdll
NtQueryInformationFile
NtFsControlFile
NtQueryVolumeInformationFile
NtWaitForSingleObject
comctl32
ord17
shell32
SHGetSpecialFolderLocation
SHGetPathFromIDListW
ole32
CoUninitialize
CoCreateInstanceEx
CLSIDFromString
CoRegisterClassObject
ReleaseStgMedium
CoInitializeEx
vssapi
ord5
Sections
.text Size: 75KB - Virtual size: 75KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 117KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 29KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
qtdvvxg Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE