Static task
static1
Behavioral task
behavioral1
Sample
042e48314340b41be385311ed81a42be9054e2ab74ad7d6dd3be3923ccbee789.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
042e48314340b41be385311ed81a42be9054e2ab74ad7d6dd3be3923ccbee789.exe
Resource
win10v2004-20220812-en
General
-
Target
042e48314340b41be385311ed81a42be9054e2ab74ad7d6dd3be3923ccbee789
-
Size
588KB
-
MD5
0eb63eb1b1c7f3b56e793902568d957f
-
SHA1
2d2e5556501e209464cd61a974d26b24e428180e
-
SHA256
042e48314340b41be385311ed81a42be9054e2ab74ad7d6dd3be3923ccbee789
-
SHA512
6d2e2ec757b649a05a99aad6542b05a55440d1abab7cf4fa38704031de10f328a8816a43786c069e9d7782be0e31ae61e56b061b65f1a11db15547b7b52fbecc
-
SSDEEP
12288:VoHD12dXNl4868bX2/O94itZdRVqOOCRaFydv/s50JKJmvvdUwJzzPLuv2OQ7VKl:VoCQ866X2G6yNugCMvx/VqIr
Malware Config
Signatures
Files
-
042e48314340b41be385311ed81a42be9054e2ab74ad7d6dd3be3923ccbee789.exe windows x86
3eba27a98fcd98ce3e57738faba6ff78
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
atl
ord16
ord21
ord18
ord57
ord23
ord17
ord20
ord32
ord43
ord44
ord37
kernel32
CloseHandle
WaitForSingleObject
InitializeCriticalSection
DeleteCriticalSection
InterlockedIncrement
InterlockedDecrement
CreateThread
CreateEventW
SetEvent
Sleep
lstrcmpiW
GetCurrentThreadId
GetCommandLineW
HeapFree
GetProcessHeap
GetLastError
GetExitCodeProcess
CreateProcessW
GetSystemDirectoryW
LocalFree
FormatMessageW
FlushInstructionCache
GetCurrentProcess
HeapAlloc
GetModuleHandleA
GetStartupInfoW
GetVersionExA
ExitProcess
GetProcAddress
WriteFile
GetStdHandle
GetModuleFileNameA
UnhandledExceptionFilter
GetModuleFileNameW
FreeEnvironmentStringsA
MultiByteToWideChar
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
SetHandleCount
GetFileType
GetStartupInfoA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
LoadLibraryA
SetFilePointer
RtlUnwind
SetStdHandle
WideCharToMultiByte
FlushFileBuffers
user32
GetWindowTextW
LoadStringW
SetThreadDesktop
OpenDesktopW
GetThreadDesktop
SetProcessWindowStation
OpenWindowStationW
GetUserObjectInformationW
GetProcessWindowStation
SetForegroundWindow
EnumThreadWindows
PostMessageW
DefWindowProcW
UnregisterClassW
SetWindowLongW
GetDesktopWindow
RegisterClassW
LoadIconW
MessageBoxW
UpdateWindow
SetDlgItemTextW
ShowWindow
MsgWaitForMultipleObjects
PeekMessageW
TranslateMessage
GetMessageW
DispatchMessageW
CharNextW
CreateWindowExW
DestroyWindow
PostQuitMessage
PostThreadMessageW
ntmsapi
CancelNtmsLibraryRequest
CancelNtmsOperatorRequest
OpenNtmsSessionW
SatisfyNtmsOperatorRequest
CloseNtmsSession
shell32
Shell_NotifyIconW
ole32
CoInitializeSecurity
CoInitializeEx
CoSuspendClassObjects
CoResumeClassObjects
CoUninitialize
Sections
.text Size: 27KB - Virtual size: 27KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vmp1 Size: 540KB - Virtual size: 1.6MB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE