Static task
static1
Behavioral task
behavioral1
Sample
f3104923dc89c2dfcf7321ee2ac7af188c8f718800306a23bd2ab6ea0a538c69.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f3104923dc89c2dfcf7321ee2ac7af188c8f718800306a23bd2ab6ea0a538c69.exe
Resource
win10v2004-20220812-en
General
-
Target
f3104923dc89c2dfcf7321ee2ac7af188c8f718800306a23bd2ab6ea0a538c69
-
Size
140KB
-
MD5
117c884478a6eb139b1a4fe6b9f751d0
-
SHA1
0f718decc7ea5a14906a64f1cf77372f63f97ae0
-
SHA256
f3104923dc89c2dfcf7321ee2ac7af188c8f718800306a23bd2ab6ea0a538c69
-
SHA512
9fa233fc0d5f0cb6d5297db2cc0129820947457b4a889ef60c6f9453e7af6963727794dfab103a0fd39a641f133e80ced66f9c601b3ac889f57e4abb34cfdaa9
-
SSDEEP
3072:wuGUIY4jWtIHCJXlC2XQ0XjhZN0MDJkPX5lgg8b9DeYt/yHB6Wg8:w+IY4jWPJQ2gCjhb04yPXDggClUh6Wg
Malware Config
Signatures
Files
-
f3104923dc89c2dfcf7321ee2ac7af188c8f718800306a23bd2ab6ea0a538c69.exe windows x86
526ed57ac20d74c74561faacecb8f7c3
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualQueryEx
ReadProcessMemory
GetThreadContext
GetProcAddress
GetModuleHandleA
TerminateProcess
ResumeThread
SetThreadContext
WriteProcessMemory
VirtualAllocEx
VirtualProtectEx
VirtualAlloc
GetTickCount
Sleep
CreateThread
lstrcpyA
FindClose
FindNextFileA
lstrcmpA
FindFirstFileA
lstrcatA
GetSystemDirectoryA
GetTempPathW
WideCharToMultiByte
LocalAlloc
GetModuleFileNameA
GetCurrentProcessId
GetTempPathA
WaitForSingleObject
CreateRemoteThread
SetFileTime
GetFileTime
ExitProcess
GetSystemInfo
VirtualProtect
GetLocaleInfoA
LocalFree
GetCurrentProcess
CreateToolhelp32Snapshot
Process32First
lstrcmpiA
Process32Next
OpenProcess
CloseHandle
HeapFree
GetProcessHeap
HeapAlloc
GetFileSize
CreateFileA
GetLastError
DeviceIoControl
ReadFile
lstrlenA
SetFilePointer
WriteFile
lstrcpyW
GetStringTypeW
GetStringTypeA
GetStartupInfoA
GetCommandLineA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
HeapReAlloc
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
TlsAlloc
SetLastError
GetCurrentThreadId
TlsFree
TlsSetValue
TlsGetValue
InitializeCriticalSection
RtlUnwind
InterlockedExchange
VirtualQuery
LoadLibraryA
GetACP
GetOEMCP
GetCPInfo
HeapSize
QueryPerformanceCounter
GetSystemTimeAsFileTime
LCMapStringA
MultiByteToWideChar
LCMapStringW
user32
LoadIconA
wsprintfA
advapi32
BuildExplicitAccessWithNameA
ControlService
OpenSCManagerA
OpenServiceA
CreateServiceA
ChangeServiceConfigA
CloseServiceHandle
DuplicateTokenEx
ImpersonateLoggedOnUser
GetKernelObjectSecurity
GetSecurityDescriptorDacl
GetUserNameA
SetEntriesInAclA
MakeAbsoluteSD
SetSecurityDescriptorDacl
SetKernelObjectSecurity
LookupPrivilegeValueA
OpenProcessToken
AdjustTokenPrivileges
shell32
ShellExecuteA
shlwapi
SHSetValueA
Sections
.text Size: 28KB - Virtual size: 26KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 96KB - Virtual size: 98KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ