Static task
static1
Behavioral task
behavioral1
Sample
ddfcb3238a1b5767fea63b7ba8972af24239e4b7ec29f117d715bcc4a336691c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ddfcb3238a1b5767fea63b7ba8972af24239e4b7ec29f117d715bcc4a336691c.exe
Resource
win10v2004-20220812-en
General
-
Target
ddfcb3238a1b5767fea63b7ba8972af24239e4b7ec29f117d715bcc4a336691c
-
Size
315KB
-
MD5
0da3a3ca525ae7487ff80fa95c5883d0
-
SHA1
aea8da7dbd5511a9163a6d62482192cbff9dd902
-
SHA256
ddfcb3238a1b5767fea63b7ba8972af24239e4b7ec29f117d715bcc4a336691c
-
SHA512
d6bf57d8f07050d9dd0578b795dafbbd52df98e9859234b24a6cc33d01befe08208f73478fe423a40db02dbe92096ae9e20f31dc1bd61a79b6c9c5099bf6c856
-
SSDEEP
3072:hlQyKS2v2yP/YVHUv5x7CYIP2wI5NX5anJex46pRhdNV/ysXo34D62xKe1P/uoxT:hB2uyPw/2d5NXcp8wFar
Malware Config
Signatures
Files
-
ddfcb3238a1b5767fea63b7ba8972af24239e4b7ec29f117d715bcc4a336691c.exe windows x86
aea7ec4000ea25c8f07648a3a844869b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetConsoleOutputCP
WriteConsoleW
GetConsoleMode
GetFileType
GetStdHandle
DeviceIoControl
CloseHandle
CreateFileW
GetModuleFileNameW
SetLastError
FreeLibrary
GetProcAddress
LoadLibraryW
LocalFree
FormatMessageW
WideCharToMultiByte
LoadLibraryExW
LoadResource
FindResourceExW
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
GetModuleHandleA
SetUnhandledExceptionFilter
OutputDebugStringA
InterlockedCompareExchange
Sleep
InterlockedExchange
WriteFile
QueryDosDeviceW
GetLastError
CreateFileMappingW
GetVersionExW
GetLocaleInfoW
UnmapViewOfFile
GetSystemDefaultUILanguage
GetUserDefaultUILanguage
SearchPathW
MapViewOfFile
msvcrt
__wgetmainargs
_cexit
_exit
_XcptFilter
exit
_initterm
_amsg_exit
__setusermatherr
__p__commode
__set_app_type
memmove
malloc
free
iswctype
?terminate@@YAXXZ
_controlfp
calloc
isdigit
mbtowc
isleadbyte
isxdigit
localeconv
_snprintf
_itoa
wctomb
ferror
wcstombs
realloc
__badioinfo
__pioinfo
_read
_fileno
_lseeki64
_write
_isatty
ungetc
bsearch
wcsncmp
strncmp
wcsstr
wcsrchr
_iob
__mb_cur_max
_wcsupr
_wcslwr
_errno
_wsetlocale
iswspace
towupper
_vsnwprintf
memcpy
memset
wcschr
_wcsicmp
wcstoul
_wcsnicmp
__p__fmode
ntdll
RtlUnwind
RtlStringFromGUID
NtOpenFile
NtClose
RtlGUIDFromString
RtlDosPathNameToNtPathName_U
RtlInitUnicodeString
RtlFreeUnicodeString
RtlCompareMemory
RtlAllocateHeap
RtlNtStatusToDosError
RtlFreeHeap
NtQuerySystemInformation
NtWaitForSingleObject
NtDeviceIoControlFile
NtCreateEvent
NtOpenKey
NtEnumerateKey
NtQueryKey
NtQueryAttributesFile
NtUnloadKey
NtLoadKey
NtAdjustPrivilegesToken
NtOpenProcessToken
NtOpenThreadToken
RtlFreeSid
RtlSetOwnerSecurityDescriptor
RtlLengthSecurityDescriptor
RtlSetDaclSecurityDescriptor
RtlCreateSecurityDescriptor
RtlAddAccessAllowedAceEx
RtlCreateAcl
RtlLengthSid
RtlAllocateAndInitializeSid
NtSetSecurityObject
NtCreateKey
NtDeleteValueKey
NtQueryValueKey
NtSetValueKey
NtSaveKey
NtCreateFile
NtDeleteKey
LdrGetProcedureAddress
RtlInitAnsiString
LdrGetDllHandle
NtDeleteFile
NtQueryInformationFile
NtQueryVolumeInformationFile
NtResetEvent
RtlGetVersion
NtQuerySymbolicLinkObject
NtOpenSymbolicLinkObject
NtAllocateUuids
advapi32
RegCloseKey
RegOpenKeyExW
RegQueryValueExW
Sections
.text Size: 143KB - Virtual size: 143KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 135KB - Virtual size: 135KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 34KB - Virtual size: 35KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE