Static task
static1
Behavioral task
behavioral1
Sample
f9f0421608219f2dee730b0e7da38764528477fad74786ab9b1acaf6108ad47d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f9f0421608219f2dee730b0e7da38764528477fad74786ab9b1acaf6108ad47d.exe
Resource
win10v2004-20220812-en
General
-
Target
f9f0421608219f2dee730b0e7da38764528477fad74786ab9b1acaf6108ad47d
-
Size
96KB
-
MD5
82a476b53203d58efae1887930426447
-
SHA1
99a16d38cdc7067572fe80f93a143ac19de9d4fb
-
SHA256
f9f0421608219f2dee730b0e7da38764528477fad74786ab9b1acaf6108ad47d
-
SHA512
d09941ba6513d8954d814b09664974b61a724fcff59944eb7516f3655700e9e68bf38a7ca7190c1d813ac6a1bec03c296e64170e0108a34cf3cd8c269db29ce2
-
SSDEEP
1536:Gue16zCsJt4pdXvjhozjf2r8tktnS7urPsUP0bJyyU0dlLQI5A93ZGWTBD4W:Gue16zCbVtcjf2rykUJHdlcxBD4
Malware Config
Signatures
Files
-
f9f0421608219f2dee730b0e7da38764528477fad74786ab9b1acaf6108ad47d.exe windows x86
ee68dac18e8578fdda84605161b0796b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegCloseKey
kernel32
MultiByteToWideChar
GetPrivateProfileStringA
GetProcAddress
LoadLibraryA
FreeLibrary
lstrcpyA
GetCommandLineA
LocalFree
lstrcatA
lstrlenA
LocalAlloc
GetSystemDirectoryA
lstrcmpiA
GetVersionExA
FormatMessageA
WriteFile
CreateFileA
MoveFileA
DeleteFileA
SetFileAttributesA
lstrcpynA
GetFileAttributesA
GetWindowsDirectoryA
GetCurrentProcess
GetModuleHandleA
GetStartupInfoA
ExitProcess
GetStdHandle
GetModuleFileNameA
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetLastError
GetEnvironmentStringsW
SetHandleCount
GetFileType
DeleteCriticalSection
TlsFree
SetLastError
GetCurrentThreadId
TlsSetValue
TlsGetValue
TlsAlloc
HeapDestroy
HeapCreate
VirtualFree
HeapFree
LeaveCriticalSection
EnterCriticalSection
GetACP
GetOEMCP
GetCPInfo
HeapAlloc
InitializeCriticalSection
VirtualAlloc
HeapReAlloc
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
RtlUnwind
VirtualProtect
GetSystemInfo
VirtualQuery
user32
MessageBoxA
CharNextA
ExitWindowsEx
LoadStringA
wsprintfA
shlwapi
PathCombineA
StrStrIA
SHRegGetUSValueA
Sections
.text Size: 25KB - Virtual size: 25KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 66KB - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ