Static task
static1
Behavioral task
behavioral1
Sample
b04a05ef88673e87676386a13518903780506a2c2afe7f002134498a1ae29451.exe
Resource
win7-20220812-en
General
-
Target
b04a05ef88673e87676386a13518903780506a2c2afe7f002134498a1ae29451
-
Size
186KB
-
MD5
119547f70e4ba6e28a5b0dcbafb50c2e
-
SHA1
92371de45a4107bd0827b27f1bb418d402188c5e
-
SHA256
b04a05ef88673e87676386a13518903780506a2c2afe7f002134498a1ae29451
-
SHA512
1088067a2a6e6ff3221753bca28ef163ec1dc1e040987bdd15fb1235999e0d7caeca861826568d659e4e317105c138c03ce348821df1a9a3d637e0cc89cf93e9
-
SSDEEP
3072:pEwOIEo1bQIaAv+SHbJzd2qpQYUMHHOlaEH3nyGkEFENgkysPIZykcJ4vzlMat4q:pEN8Qz8n7Jz7fHHOlaCLkBukysPKcJ4D
Malware Config
Signatures
Files
-
b04a05ef88673e87676386a13518903780506a2c2afe7f002134498a1ae29451.exe windows x86
d14f21db3c7a98689ce6ca8a92293c57
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ole32
OleUninitialize
OleInitialize
user32
CharNextA
ReleaseDC
GetDC
SendMessageA
RegisterWindowMessageA
FindWindowA
GetWindowThreadProcessId
GetClassInfoExA
RegisterClassExA
CreateWindowExA
GetWindowLongA
DefWindowProcA
SetWindowLongA
DestroyWindow
UnregisterClassA
GetSystemMetrics
kernel32
CreateMutexA
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
WideCharToMultiByte
VirtualQuery
DuplicateHandle
GetCurrentProcess
OpenProcess
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
HeapDestroy
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
GetProcessHeap
GetVersion
GetSystemInfo
MoveFileA
WaitForSingleObject
GetFileAttributesA
CreateFileA
DeleteFileA
GetVersionExA
LoadLibraryA
FreeLibrary
InterlockedDecrement
InterlockedIncrement
IsDebuggerPresent
UnhandledExceptionFilter
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
SetUnhandledExceptionFilter
GetStartupInfoA
InterlockedCompareExchange
Sleep
InterlockedExchange
CloseHandle
ReleaseMutex
lstrlenA
MultiByteToWideChar
LocalFree
GetModuleHandleA
GetProcAddress
FindResourceExA
FindResourceA
LoadResource
LockResource
SizeofResource
GetLastError
RaiseException
GetEnvironmentVariableA
GetModuleFileNameA
SetEnvironmentVariableA
GetCommandLineW
LocalAlloc
SetFilePointer
SetErrorMode
SetCurrentDirectoryA
GetCurrentDirectoryA
IsBadWritePtr
VirtualProtect
GetThreadContext
IsBadReadPtr
TerminateThread
CreateThread
WriteFile
CreateDirectoryA
GlobalMemoryStatus
shell32
SHGetFolderPathA
SHGetFolderPathW
CommandLineToArgvW
msvcp90
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??0strstreambuf@std@@QAE@PBDH@Z
??0?$basic_istream@DU?$char_traits@D@std@@@std@@QAE@PAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z
??_7?$basic_ios@DU?$char_traits@D@std@@@std@@6B@
??_7ios_base@std@@6B@
??_7?$basic_istream@DU?$char_traits@D@std@@@std@@6B@
??1strstreambuf@std@@UAE@XZ
?_Ios_base_dtor@ios_base@std@@CAXPAV12@@Z
??0strstreambuf@std@@QAE@H@Z
??0?$basic_ostream@DU?$char_traits@D@std@@@std@@QAE@PAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z
??_7?$basic_ostream@DU?$char_traits@D@std@@@std@@6B@
?freeze@strstreambuf@std@@QAEX_N@Z
?pcount@strstreambuf@std@@QBEHXZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
?seekp@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV12@JH@Z
?seekp@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV12@V?$fpos@H@2@@Z
?write@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV12@PBDH@Z
??1?$basic_ios@DU?$char_traits@D@std@@@std@@UAE@XZ
?read@?$basic_istream@DU?$char_traits@D@std@@@std@@QAEAAV12@PADH@Z
??0?$basic_ios@DU?$char_traits@D@std@@@std@@IAE@XZ
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
msvcr90
__p__commode
_adjust_fdiv
__setusermatherr
_configthreadlocale
_initterm_e
_initterm
exit
_ismbblead
_XcptFilter
_exit
_cexit
__getmainargs
_amsg_exit
wcstol
__CxxFrameHandler3
??2@YAPAXI@Z
??0exception@std@@QAE@ABV01@@Z
_CxxThrowException
_invalid_parameter_noinfo
??0exception@std@@QAE@XZ
??1exception@std@@UAE@XZ
?what@exception@std@@UBEPBDXZ
vswprintf_s
_vscwprintf
wcsstr
malloc
memcpy
wcsnlen
memset
_recalloc
calloc
asctime
free
memmove_s
_purecall
memcpy_s
strncpy
strrchr
??3@YAXPAX@Z
strstr
strtol
vsprintf
??_V@YAXPAX@Z
getenv
_crt_debugger_hook
_controlfp_s
_invoke_watson
?_type_info_dtor_internal_method@type_info@@QAEXXZ
?terminate@@YAXXZ
_except_handler4_common
_decode_pointer
_onexit
_lock
__dllonexit
_unlock
__set_app_type
_encode_pointer
??0exception@std@@QAE@ABQBD@Z
__p__fmode
_stricmp
atoi
strnlen
_gmtime32
_time32
_putenv
_acmdln
printf
strchr
memmove
_vsnprintf
sprintf
realloc
gdi32
GetDeviceCaps
advapi32
ConvertStringSecurityDescriptorToSecurityDescriptorW
RegCloseKey
RegQueryValueExA
RegOpenKeyA
RegDeleteValueA
RegQueryValueA
RegSetValueA
RegCreateKeyA
RegDeleteKeyA
RegEnumKeyA
RegOpenKeyExA
RegEnumKeyExA
RegSetValueExA
SetFileSecurityW
FreeSid
SetNamedSecurityInfoW
OpenProcessToken
AllocateAndInitializeSid
SetEntriesInAclA
GetNamedSecurityInfoW
CreateWellKnownSid
AdjustTokenPrivileges
LookupPrivilegeValueA
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
shlwapi
PathFindNextComponentW
PathAddBackslashA
PathAppendA
PathStripToRootW
Sections
.text Size: 60KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 22KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 27KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.erdata Size: 68KB - Virtual size: 68KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE