Static task
static1
Behavioral task
behavioral1
Sample
0cbea6303c2f419a3491a3f4d72adc39c6501e6a1ad58f0a448e5e575f6fc912.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
0cbea6303c2f419a3491a3f4d72adc39c6501e6a1ad58f0a448e5e575f6fc912.exe
Resource
win10v2004-20220812-en
General
-
Target
0cbea6303c2f419a3491a3f4d72adc39c6501e6a1ad58f0a448e5e575f6fc912
-
Size
90KB
-
MD5
841315498641bdcb484db90b0878b570
-
SHA1
ad9c7b0cc48abdc02dd612752f6b77213ab44281
-
SHA256
0cbea6303c2f419a3491a3f4d72adc39c6501e6a1ad58f0a448e5e575f6fc912
-
SHA512
b5c1333f7af7b57bb90a6c4299bc4b634af48bc0cd950bdd2a4ce50c7f1b5655e15f721a0e3c261219a82376ed04d4f1469a2b28df00c534f0c0856024de5da4
-
SSDEEP
1536:4zZ+KS1IoJc/Abc3lG5x6cadpLgoin4XPFZyzYks4t7iXD/z/UmyRY1Bc1bo:91ioJc/AbAWoin4fF7sivUm6Y1yk
Malware Config
Signatures
Files
-
0cbea6303c2f419a3491a3f4d72adc39c6501e6a1ad58f0a448e5e575f6fc912.exe windows x86
9a63d48719fb6f65d73b9d8483c95315
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
OpenProcessToken
OpenThreadToken
SetNamedSecurityInfoW
GetSecurityDescriptorSacl
GetSecurityDescriptorDacl
GetSecurityDescriptorGroup
GetSecurityDescriptorOwner
GetSecurityDescriptorControl
ConvertStringSecurityDescriptorToSecurityDescriptorW
AdjustTokenPrivileges
ConvertSidToStringSidW
GetTokenInformation
LookupPrivilegeValueW
kernel32
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
GetSystemTimeAsFileTime
GetModuleHandleA
SetUnhandledExceptionFilter
OutputDebugStringA
GetStartupInfoW
InterlockedCompareExchange
Sleep
InterlockedExchange
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetLastError
GetFileAttributesW
GetVolumeInformationW
GetVolumePathNameW
SetFileAttributesW
FindClose
FindNextFileW
FindFirstFileW
WriteFile
CreateFileW
GetProcessHeap
HeapFree
HeapAlloc
GetLastError
LocalFree
QueryPerformanceCounter
CloseHandle
UnmapViewOfFile
MapViewOfFile
CreateFileMappingW
GetFileSizeEx
DeviceIoControl
CopyFileExW
GetFullPathNameW
CreateDirectoryW
GetCurrentThread
msvcrt
wcsstr
ungetc
_isatty
_lseeki64
_fileno
_read
__pioinfo
__badioinfo
realloc
wcstombs
ferror
wctomb
_itoa
_snprintf
localeconv
isxdigit
_wcsnicmp
fwprintf
fflush
_write
isleadbyte
mbtowc
isdigit
calloc
_controlfp
?terminate@@YAXXZ
iswctype
free
malloc
memcpy
memset
__set_app_type
__p__fmode
__p__commode
__setusermatherr
_amsg_exit
_initterm
_wcmdln
exit
_XcptFilter
_exit
_cexit
__wgetmainargs
_iob
__mb_cur_max
wcschr
_vsnwprintf
_wcslwr
_errno
_wcsicmp
wcsrchr
imagehlp
CheckSumMappedFile
shell32
CommandLineToArgvW
shlwapi
PathRemoveBackslashW
ntdll
NtResetEvent
NtQueryValueKey
NtOpenKey
NtQuerySymbolicLinkObject
NtOpenSymbolicLinkObject
RtlAllocateHeap
NtSetInformationFile
LdrFindResource_U
LdrAccessResource
NtQueryInformationFile
NtOpenProcess
NtQueryInformationProcess
RtlNtStatusToDosError
NtSetInformationThread
RtlInitUnicodeString
NtOpenFile
NtCreateEvent
NtDeviceIoControlFile
NtWaitForSingleObject
NtQueryInformationThread
NtClose
NtQuerySystemInformation
RtlUnwind
RtlFreeHeap
version
GetFileVersionInfoW
GetFileVersionInfoSizeW
VerQueryValueW
Sections
.text Size: 55KB - Virtual size: 55KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 30KB - Virtual size: 31KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE