Static task
static1
Behavioral task
behavioral1
Sample
dffc44bfb215fbfe43e7d4f7f141baf927687d54277e0d75b3f48a7c488e99f8.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
dffc44bfb215fbfe43e7d4f7f141baf927687d54277e0d75b3f48a7c488e99f8.exe
Resource
win10v2004-20220812-en
General
-
Target
dffc44bfb215fbfe43e7d4f7f141baf927687d54277e0d75b3f48a7c488e99f8
-
Size
289KB
-
MD5
042b3c3e18b912e89408eed3adbeea30
-
SHA1
5d9ef32afc702daff5c3efaa1ad3da91d24a81e8
-
SHA256
dffc44bfb215fbfe43e7d4f7f141baf927687d54277e0d75b3f48a7c488e99f8
-
SHA512
dc5646752d12ba9c440fa125f76f8864606e62d407eef317e8b145c74a401d5225306c4325708dc0060d52b0f22d4eb07fecb11134ac9303bf0989fed7d34932
-
SSDEEP
3072:CME87tq3Ywm+iW3L2Bp6T7RLdvQHs4H7LOCodLnuDsWVFSymB/0L:Cs7twLnPRqsGLOCodahVFOBML
Malware Config
Signatures
Files
-
dffc44bfb215fbfe43e7d4f7f141baf927687d54277e0d75b3f48a7c488e99f8.exe windows x86
a03fc7b0f8e2a8ca568e7346f7930f1a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegDeleteKeyW
RegCloseKey
RegDeleteValueW
RegEnumValueW
RegSetValueExW
RegCreateKeyExW
RegQueryValueExW
RegOpenKeyExW
RegEnumKeyExW
CloseServiceHandle
ControlService
QueryServiceStatus
ChangeServiceConfigW
QueryServiceConfigW
OpenServiceW
OpenSCManagerW
RegEnumKeyW
RegQueryValueExA
RegOpenKeyExA
RegQueryInfoKeyW
kernel32
GetLastError
WriteFile
SizeofResource
CreateFileW
LoadResource
FindResourceW
GetSystemWindowsDirectoryW
RegisterApplicationRestart
HeapSetInformation
Sleep
GetShortPathNameW
lstrcmpW
FindFirstFileExW
FindNextFileW
SetCurrentDirectoryW
GetCurrentDirectoryW
lstrlenW
RemoveDirectoryW
ExpandEnvironmentStringsW
CloseHandle
CreateFileA
GetFileSize
GetWindowsDirectoryA
GetTempPathA
CreateDirectoryW
GetLocalTime
WritePrivateProfileStringW
GetPrivateProfileStringW
GetProfileStringW
WriteProfileStringW
GetTempPathW
MoveFileW
MoveFileExW
GetModuleFileNameW
CreateDirectoryA
GetSystemDefaultLangID
CopyFileW
GetFileTime
FileTimeToSystemTime
GetTimeZoneInformation
GetWindowsDirectoryW
GetVersionExA
GetVersionExW
GetFileAttributesA
LoadLibraryW
GetProcAddress
FreeLibrary
UnhandledExceptionFilter
SetLastError
DeleteFileW
LCIDToLocaleName
GetUserDefaultLCID
RaiseException
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
QueryPerformanceCounter
GetModuleHandleA
SetUnhandledExceptionFilter
GetStartupInfoA
InterlockedCompareExchange
InterlockedExchange
GetTickCount
FindFirstFileW
FindClose
CreateHardLinkW
SetFileAttributesW
GetSystemDirectoryW
GetFileAttributesW
SetFilePointer
user32
CharNextA
LoadStringW
msvcrt
_lock
__dllonexit
_unlock
_controlfp
_except_handler4_common
?terminate@@YAXXZ
__set_app_type
__p__fmode
__p__commode
__setusermatherr
_initterm
_acmdln
_ismbblead
_XcptFilter
_exit
_cexit
__getmainargs
_onexit
_wtol
mbstowcs
wcsrchr
??_U@YAPAXI@Z
??_V@YAXPAX@Z
memset
wcschr
_wcslwr
wcsstr
_wcsicmp
_wcsnicmp
_vsnwprintf
free
_amsg_exit
_vsnprintf
swscanf
_wtoi
_itow
malloc
memcpy
_wcsupr
iswalnum
iswalpha
exit
ole32
StringFromGUID2
CoCreateGuid
CoUninitialize
CoCreateInstance
CoInitialize
PropVariantClear
oleaut32
SystemTimeToVariantTime
VariantTimeToSystemTime
SysFreeString
SysAllocString
VariantClear
version
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
shell32
SHGetSpecialFolderPathW
SHSetLocalizedName
SHGetPathFromIDListW
SHGetSpecialFolderLocation
SHGetMalloc
ShellExecuteW
SHGetFolderPathW
SHChangeNotify
SHCreateItemFromParsingName
SHGetPathFromIDListA
shlwapi
PathRemoveFileSpecW
PathAppendW
PathIsDirectoryW
PathAddBackslashW
PathUnExpandEnvStringsW
PathAddBackslashA
PathRemoveBlanksW
slc
SLGetWindowsInformationDWORD
wmdrmsdk
WMDRMCreateProvider
Sections
.text Size: 246KB - Virtual size: 246KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 5KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 33KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE