Static task
static1
Behavioral task
behavioral1
Sample
31174db34d6c9c59de06ac9f203b51cbe262c66c88815999fb9ffd7b7cca68c2.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
31174db34d6c9c59de06ac9f203b51cbe262c66c88815999fb9ffd7b7cca68c2.exe
Resource
win10v2004-20220901-en
General
-
Target
31174db34d6c9c59de06ac9f203b51cbe262c66c88815999fb9ffd7b7cca68c2
-
Size
1.0MB
-
MD5
8406309356522d652e71f6496297e5ad
-
SHA1
b79342fc830e97531aa5f30908582f776732d372
-
SHA256
31174db34d6c9c59de06ac9f203b51cbe262c66c88815999fb9ffd7b7cca68c2
-
SHA512
cf35ca04494497cf1cc9e469c3924b31d594950c142ef9bdc29560449fe2617bf52263fedc09d9b8cbe395f2fc705337faa94deb496b36ab931d7619ba97d6c8
-
SSDEEP
24576:lUlmXIrdFmXIrdSH5Uj3x/sc0OCbrb88223BA:lUlzBFzBSmuH3AwBA
Malware Config
Signatures
Files
-
31174db34d6c9c59de06ac9f203b51cbe262c66c88815999fb9ffd7b7cca68c2.exe windows x86
417cd2bb37c9182bfdeace4231e6c953
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegCreateKeyExW
RegDeleteValueW
AllocateAndInitializeSid
FreeSid
CheckTokenMembership
RegCloseKey
RegSetValueExW
RegCreateKeyW
RegSetValueExA
RegQueryValueExA
RegQueryValueExW
RegDeleteKeyW
RegCreateKeyA
RegOpenKeyExA
RegEnumValueW
RegOpenKeyExW
CopySid
EqualSid
InitializeSecurityDescriptor
ConvertStringSidToSidW
SetSecurityDescriptorDacl
SetEntriesInAclW
CreateWellKnownSid
RegOpenCurrentUser
RegOverridePredefKey
AddMandatoryAce
SetSecurityDescriptorSacl
GetLengthSid
GetSecurityDescriptorSacl
IsValidSid
InitializeAcl
SetKernelObjectSecurity
GetAce
GetKernelObjectSecurity
GetSidSubAuthorityCount
GetSidSubAuthority
GetTokenInformation
OpenProcessToken
kernel32
DeleteFileW
DeleteFileA
CreateThread
CreateFileA
lstrcmpA
CreateDirectoryExA
WideCharToMultiByte
CopyFileW
GetFileAttributesA
MultiByteToWideChar
FindFirstFileA
RemoveDirectoryA
FindClose
LocalAlloc
FindNextFileA
GetTempPathA
LocalFree
K32GetModuleBaseNameW
SetEvent
CreateEventW
HeapSetInformation
CloseHandle
GetVersionExA
HeapAlloc
HeapFree
WaitForSingleObject
GetModuleHandleW
DuplicateHandle
DeleteCriticalSection
lstrcmpiW
GetExitCodeThread
SetFileAttributesA
EnterCriticalSection
GetModuleFileNameW
DeactivateActCtx
ActivateActCtx
ReleaseActCtx
CreateActCtxW
SetLastError
ResumeThread
SuspendThread
VirtualProtect
FlushInstructionCache
VirtualFree
VirtualQuery
SetThreadContext
GetThreadContext
GetCurrentThread
SetProcessDEPPolicy
VirtualAlloc
GetTickCount
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentProcessId
QueryPerformanceCounter
GetModuleHandleA
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetStartupInfoW
Sleep
GetProcessHeap
GetLastError
SetProcessShutdownParameters
FreeLibrary
CreateProcessW
LoadLibraryExW
GetCurrentProcess
InitializeCriticalSection
OpenProcess
GetProcAddress
lstrcmpiA
CreateFileW
GetFileAttributesW
LeaveCriticalSection
LoadLibraryW
user32
LoadStringW
CharNextW
PostQuitMessage
msvcrt
exit
iswalpha
memcpy_s
wcschr
rand_s
__set_app_type
_controlfp
__wgetmainargs
_amsg_exit
__p__commode
_XcptFilter
wcstok
_wcsnicmp
_vsnprintf
_vsnwprintf
wcsrchr
memset
_except_handler4_common
_unlock
__dllonexit
_onexit
?terminate@@YAXXZ
_exit
_lock
_wcmdln
_initterm
__setusermatherr
__p__fmode
_cexit
ole32
CoRevokeClassObject
CoRegisterClassObject
CoCreateInstance
CoUninitialize
CoInitialize
CoInitializeEx
CoInitializeSecurity
StringFromGUID2
CLSIDFromString
CoGetCallContext
CoTaskMemAlloc
CoImpersonateClient
CoTaskMemFree
CoRevertToSelf
oleaut32
SysStringLen
SysFreeString
UnRegisterTypeLibForUser
RegisterTypeLibForUser
UnRegisterTypeLi
RegisterTypeLi
SysAllocString
rpcrt4
RpcStringFreeW
UuidToStringW
UuidCreate
urlmon
CompatFlagsFromClsid
CoInternetSetFeatureEnabled
CoInternetCreateSecurityManager
ord107
ord519
Extract
wintrust
CryptCATAdminReleaseCatalogContext
CryptCATAdminReleaseContext
CryptCATAdminAcquireContext
CryptCATAdminAddCatalog
iertutil
ord134
ord200
ord201
ord650
ord658
ntdll
NtFreeVirtualMemory
Sections
.text Size: 41KB - Virtual size: 40KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 404KB - Virtual size: 404KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 584KB - Virtual size: 2.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE