Static task
static1
Behavioral task
behavioral1
Sample
73bdcc47874af427aa53a87795a7bd0a2af88c2ead120a430c77bf2414bd89ed.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
73bdcc47874af427aa53a87795a7bd0a2af88c2ead120a430c77bf2414bd89ed.exe
Resource
win10v2004-20220812-en
General
-
Target
73bdcc47874af427aa53a87795a7bd0a2af88c2ead120a430c77bf2414bd89ed
-
Size
111KB
-
MD5
932eae86bd5d0488cf315cb67e179780
-
SHA1
0a987cca2244f5bfeb145e240c126e6f0a4f9213
-
SHA256
73bdcc47874af427aa53a87795a7bd0a2af88c2ead120a430c77bf2414bd89ed
-
SHA512
73e14902d187300bda26638759a52bc862dd0f87be04130eb1e006606cd67b50c91ebe7bc4cc3081c841e65cf93439df22dad9c2f054bfc93a7876901177fc92
-
SSDEEP
1536:vmOyxg3ClmlYCCzKwOePVCc/Z/lpQ8Q0R2LTnEx7ERpKfI0ecTeUMfPI8Be:vmOmg3CclYXKwOCVCcbkTnizehUuPI8
Malware Config
Signatures
Files
-
73bdcc47874af427aa53a87795a7bd0a2af88c2ead120a430c77bf2414bd89ed.exe windows x86
fc2e00384f3823ac07951cf8a3376149
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
PeekNamedPipe
WaitForMultipleObjects
GlobalMemoryStatusEx
TerminateProcess
GetCurrentProcess
lstrcmpiA
CopyFileA
DisconnectNamedPipe
CreatePipe
SystemTimeToFileTime
LocalFileTimeToFileTime
SetFileTime
GetCurrentThreadId
GetSystemTime
OpenProcess
GetModuleFileNameA
CreateMutexA
SetErrorMode
OpenEventA
GetSystemInfo
GlobalMemoryStatus
GlobalAlloc
GlobalLock
GlobalFree
LocalSize
GetProcessHeap
HeapAlloc
HeapFree
GetLocalTime
GetSystemDirectoryA
CreateToolhelp32Snapshot
Process32First
Process32Next
GetVersionExA
lstrlenA
WinExec
GetProcAddress
GetWindowsDirectoryA
MoveFileA
WriteFile
SetFilePointer
ReadFile
CreateFileA
GetFileSize
RemoveDirectoryA
LocalAlloc
FindFirstFileA
FindNextFileA
LocalFree
GetLogicalDriveStringsA
GetVolumeInformationA
GetDiskFreeSpaceExA
GetDriveTypeA
lstrcatA
CreateProcessA
GetFileAttributesA
CreateDirectoryA
Sleep
CreateThread
ResumeThread
SetEvent
TerminateThread
GetLastError
RaiseException
FreeLibrary
GetStartupInfoA
GetModuleHandleA
CloseHandle
LoadLibraryA
InterlockedExchange
gdi32
GetDIBits
BitBlt
DeleteDC
DeleteObject
CreateCompatibleDC
CreateDIBSection
SelectObject
CreateCompatibleBitmap
advapi32
AddAccessAllowedAce
RegQueryValueA
CloseEventLog
GetTokenInformation
LookupAccountSidA
GetUserNameA
CreateServiceA
StartServiceCtrlDispatcherA
RegisterServiceCtrlHandlerA
SetServiceStatus
EnumServicesStatusA
QueryServiceConfigA
StartServiceA
LockServiceDatabase
ChangeServiceConfigA
UnlockServiceDatabase
RegSaveKeyA
RegRestoreKeyA
RegQueryInfoKeyA
RegDeleteValueA
RegDeleteKeyA
RegEnumValueA
RegEnumKeyExA
RegQueryValueExA
AllocateAndInitializeSid
GetLengthSid
InitializeAcl
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
RegSetKeySecurity
FreeSid
DeleteService
RegCreateKeyExA
OpenSCManagerA
OpenServiceA
QueryServiceStatus
ControlService
CloseServiceHandle
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegCreateKeyA
OpenEventLogA
ClearEventLogA
RegCloseKey
shell32
ShellExecuteA
SHGetFileInfoA
msvcrt
memmove
ceil
_ftol
strlen
strstr
_CxxThrowException
memcmp
free
malloc
_except_handler3
strrchr
strcmp
strcpy
atoi
strncmp
strncpy
strcat
strchr
_errno
exit
strncat
atol
sprintf
_beginthreadex
calloc
??1type_info@@UAE@XZ
__dllonexit
_onexit
_iob
_exit
_XcptFilter
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_controlfp
__CxxFrameHandler
memcpy
??3@YAXPAX@Z
??1exception@@UAE@XZ
??0exception@@QAE@ABV0@@Z
_strcmpi
_strupr
_strnicmp
memset
??2@YAPAXI@Z
??0exception@@QAE@ABQBD@Z
avicap32
capCreateCaptureWindowA
capGetDriverDescriptionA
psapi
EnumProcessModules
GetModuleFileNameExA
wtsapi32
WTSQuerySessionInformationA
WTSFreeMemory
Sections
.rdata Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 95KB - Virtual size: 99KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 124B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ